Solved

administering a dialup

Posted on 2004-08-05
7
175 Views
Last Modified: 2010-03-18
hi experts.
I have a small dialup service. I'm interested in controlling the time on my users and also setting up some users as mail only users and others for internet as well. Please help.
0
Comment
Question by:kephillips
  • 4
  • 3
7 Comments
 
LVL 14

Expert Comment

by:pablouruguay
ID: 11727853
you use radius ? tacacs?  

explain more please
0
 

Author Comment

by:kephillips
ID: 11729588
ok. I've got a small dialup server running.  I'd like to keep track of my users (time consumption mostly) and also have the ability to keep some users off of internet (only email).
I'm not using anything at the moment-whatever comes with RH 9- So far I have a simple setup where each user has a static IP address and any login works...i'd like to change this as well.

0
 
LVL 14

Expert Comment

by:pablouruguay
ID: 11730098
radius have this features.

dialup
time to connect
services etc etc etc
is the quicky solution and the most effective  for a small ISP
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 

Author Comment

by:kephillips
ID: 11731042
where can I get radius???
0
 
LVL 14

Accepted Solution

by:
pablouruguay earned 500 total points
ID: 11731523
0
 

Author Comment

by:kephillips
ID: 11735154
ok. Pablo,
Got it. I've installed freeradius seemed to go fine
Now, I've got a dialup_admin thing for php which I was wanting to use, but it's all php3 and my server doesn't seem to like it...what can I do??
0
 

Author Comment

by:kephillips
ID: 11740003
i've changed all the .php3's to .php  and changed all the links accordingly, but it still doesn't work....
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now