Voytek Eymont wrote:
so what's the best way to have controlled access from dynamic IP ?
Perhaps is it better not to bother with access control but to use authentication and authorisation. If you persist with access control you just end up with some VPN/tunnelling insanity as opposed to something as simple as using HTTPS with PKI and denying access to those that don't hold a certificate signed by you. -- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html