Hi, > Why auth and not post-auth? I'm working on the basis that the stuff I do > doesn't have anything to do with the actual auth process, in post-auth I'm > doing things like setting session-timeouts. vlan assignments etc. based upon > whether it's an access-request or an access-reject. > > Is there something wrong with that logic?
no. post-auth in the inner-tunnel is where we do it. alan - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

