Solved

Restrict network access until user authenticated against remote database.

Posted on 2004-03-31
8
150 Views
Last Modified: 2010-04-08
Hi.

I want to set up a wireless network which will allow users to access only one internet website where they can buy surfing time.  Once they have an account, I want the firewall at the access point to allow them to surf the internet freely.

I think this will require rewriting the firewall in the access point restricting access based on MAC address, but how do I go about doing this.  Setting up the central database is no trouble, but how do I get the firewall to talk to it?

Many thanks,

Ben
0
Comment
Question by:benlinton
  • 2
  • 2
  • 2
  • +2
8 Comments
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
Hi benlinton,
Im unsure to be honest but if your using cisco firewall you can certainly get it to authenticate to an RSA Radius server on your network, you just nees to work out how to assign the RSA access licences to the clients?

PeteL
0
 

Author Comment

by:benlinton
Comment Utility
I was wanting to reprogramme a netgear wireless router such as:

http://www.netgear.co.uk/html/prod_routers_adsl_dg834g.htm

but don't know if this is possible.  

Basically, this machine gives you a web based controlpanel where you can add MAC addresses to a trusted list.  I want to allow all MAC address access to my billing website, but then only allow full internet access to MAC addresses I have in my database as having paid.

Is that clearer?!!

Many thanks,

Ben
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
Have you looked at something like this D-Link gateway
http://www.d-link.com/products/?pid=173

0
 
LVL 23

Expert Comment

by:Tim Holman
Comment Utility
You could use one generic SSID that allow users access only to your payment server network - eg 192.168.1.1/32.

Then, another SSID could be used (with authentication) to provide the global Internet access that they require (running on another network, eg 192.168.2.0/24)
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 20

Accepted Solution

by:
What90 earned 500 total points
Comment Utility
Why not just set up a proxy server account for each user once they have joined and paided?
They enter a username and password (on the proxy server of your choice) once they connect to the default web page.

That way the proxy server authenicates the user and allows them access to the Internet.
You can place any further rules on the proxy server.

Most of the hot spot zones ISP's use a similar method.

Saves all this MAC madness ;-)

0
 

Author Comment

by:benlinton
Comment Utility
And is it easy to get the proxy server to talk to a central database?  Sounds promising...!
0
 
LVL 20

Expert Comment

by:What90
Comment Utility
The database I've seen it work with is Active Directory and ISA 2000. Works very nicely. I'm sure there are bespoke apps that fit the picture if you don't want to use the Ms route.
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
Are you still working on this? Do you need more information?
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now