I guess I would still like a little more information everyone addressed one
and two, excellently, I might add, but I guess what I was thinking is that
this is just a stepping stone for security...It keeps those who are not
trying to forcefully or rather intentionally gain access to your network
from doing so.

Now my question becomes if you are trying to build a wireless bridge or
accesspoint using linux what are your options for software that would
authenticate the allowed clients (#3)?

I honestly don't know what the possiblities are for a linux box? would
setting up cipe or vtun be sufficient if you block all other traffic or are
there better options and if you have done the install how difficult is it to
setup a secure solution using linux?

Thanks again,
Chad

> 1. Setup DHCP to only assign IPs to specific MAC Addresses
>
> 2. Setup IPTABLES to filter on matching MAC / IP Pairs
>
> 3. Setup Authentication software to authenticate the client.



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to