range-start = 192.168.1.1
range-stop = 192.168.1.200
netmask = 255.255.255.255
cache-size = 56
session-db = ${raddbdir}/db.ippool
ip-index = ${raddbdir}/db.ipindex
override = yes
My question is :
- What can a malicious user can do with the secret? Can it alter accounting
and other things? (chillispot uses chap auth-type)
one is spell it out and try rumble it so he forms a new word from it
- Is there a way of maintaining a per hotspot secret with dynamic ip
addresses?
most APs provide a feature wherein you can block certain MAC addr and/or IP
addr not to authenticate from that particular AP.
check its manual. check huntgroup to separate groups.
no need to change the environment. cascading or non-cascading should work
out right.
goodluck
-Original
that simply means you need to call them from Accounting and Post-Auth module
section of radius conf see more of Pool-Name attribute as well
Hello Vertito,
Thanks for your information.But I did not get the meaning of the attributes
in the below sentence,
dont forget to call them from conf
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, September 06, 2005 2:56 PM
To: freeradius-users@lists.freeradius.org
Subject: Script to process authentications accounting
Is there any information about using a script
5 matches
Mail list logo