Voytek Eymont wrote:
so what's the best way to have controlled access from dynamic IP ?

Perhaps is it better not to bother with access control but to
use authentication and authorisation.

If you persist with access control you just end up with some
VPN/tunnelling insanity as opposed to something as simple as
using HTTPS with PKI and denying access to those that don't
hold a certificate signed by you.

--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to