OoO Lors de la soirée  naissante du samedi  01  mai 2004, vers  17:47,
Jacco de Leeuw <[EMAIL PROTECTED]> disait:

> In that case I would recommend a _different_ subnet for the wireless
> link.

OK for this solution which sounds reasonable. I suppose that using the
same  subnet for Mac  clients (which was my request,   I don't want to
know what client the users will use) is not an appropriate solution.

> The Mac clients will still receive IP addresses from the L2TP server
> which lies within the interal x.y.u.v subnet, which was the main objective.
> You can assign fixed internal addresses by using this trick in
> /etc/ppp/chap-secrets:

> sam             *       "rumpelstiltskin"       192.168.1.5
> *               sam     "rumpelstiltskin"       192.168.1.5

To avoid the   multiplication of  passwords,  I  would like  to  avoid
assigning a password for each user (each one  has a personal key which
is used for IPsec). The  username/password would be  a generic one for
everyone (something easy like user/pass)  and the IP should be derived
from the  underlying one (the one from  the IPsec link). But again, if
this is not possible, I could juste use the key as a password.

I see that there  is  a compile-time flag  to  let PPP choose  the  IP
address, I am reading  some PPP literature to see  if this would solve
this problem.

> Alternatively, you could use VaporSec instead of L2TP/IPsec. This has the
> advantage that previous MacOS X versions are also supported.
> (http://www.afp548.com/Software/VaporSec/)

Alas, this  program is not open source  and has one  annoying bug : if
the mask for the network  is set to 0 (the  network is 0.0.0.0/0), the
generated racoon.conf is bogus (one field is missing). If I found some
time, I will try to mail the authors to dig out this bug.

Thanks for your answer.
-- 
printk("Illegal format on cdrom.  Pester manufacturer.\n"); 
        2.2.16 /usr/src/linux/fs/isofs/inode.c


Reply via email to