access...
Hi madtomt,
What kind of access do you wish your home workers to have? You say that VPN is not possible, then is it FTP, SSH, web, Calendar, Contacts, ...?
Say your home workers need ssh access which requires strong authentication and encrypts all traffic, but you don't want to open port 22 through your firewall since then the "trial-and-error" hackers will hit on port 22 trying every common username/password in an attempt to break in. One way around this is to obfuscate your SSH port number, that is, pick a different port for ssh (set in the ssh and daemon config files), hopefully one that is not used for something else that is important to you. Your home workers would then have SSH access on a port that is not the standard 22. This will eliminate all of those automated ssh guessing attacks since those are always directed to port 22.
Say your home workers need web access, then use SSL on port 443 (https) and require strong authentication so the home workers must login to gain access to your web server. Once again all traffic is encrypted and thus more secure.
Say your home workers need ftp access, then I would have them use sftp instead (much more secure than ftp) and again change the port from the standard 22 to some non-standard port.
And finally, why not use VPN with its strong authentication and encryption which makes all other types of access much more secure. For instance, say your home workers need jabber access for video conferencing, then if they VPN in to your server and you run your own jabber server (iChat, Messages, XMPP), then the video communication can be encrypted and thus secure. I like VPN as being one of the more secure ways to allow workers through your corporate firewall.
So, I apologize for the longwinded answer, but without further information on the type of access needed then it is difficult for me to answer. As you can see, different types of access may have different solutions.
Lastly, if you only have one worker whose IP address and hostname change, then why not have him get a hostname from Dyn.com or some other dynamic hostname service. His dyndns hostname would then be constant even though his ISP assigned IP and hostname changes. You then allow his constant Dyn.com assigned hostname through your firewall: your firewall checks the IP address assigned to the Dyn.com hostname and then writes a firewall rule allowing this IP address.
Regards,
Switon