I guess I would still like a little more information everyone addressed one and two, excellently, I might add, but I guess what I was thinking is that this is just a stepping stone for security...It keeps those who are not trying to forcefully or rather intentionally gain access to your network from doing so.
Now my question becomes if you are trying to build a wireless bridge or accesspoint using linux what are your options for software that would authenticate the allowed clients (#3)? I honestly don't know what the possiblities are for a linux box? would setting up cipe or vtun be sufficient if you block all other traffic or are there better options and if you have done the install how difficult is it to setup a secure solution using linux? Thanks again, Chad > 1. Setup DHCP to only assign IPs to specific MAC Addresses > > 2. Setup IPTABLES to filter on matching MAC / IP Pairs > > 3. Setup Authentication software to authenticate the client. _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list