2009/5/1 Saša Stjepan Bakša <sasa dash stjepan dot baksa at os dot t dash com dot hr>
> Squid or Squid like software is the best deal. Squid can authenticate
> against the same radius which you
> use to authenticate your hotspot users. Logs can then been transfered to
> database (mysql, postgres, name-your-poison)
> where we can with "simple" SQl query's search trough saved data. Yes, I
> know that require more firepower but
> either that or lobbying against the stupid low.
You mean set up a squid box on every location?