Solved

Wi-Fi Network | How show up a page to an "non-authenticaded" user?

Posted on 2004-09-09
3
267 Views
Last Modified: 2010-04-11
I got a network at my apartament, and I wanted to use a hotspot to serve Internet to some friends. I would like that everyone would have access to the netwok, but if the person tryed to browse over the internet, a page would open saying "Contact allanmartins@gmail.com requesting for a user and password", then, with the proper user and password, the user would be able to use internet without problems. Is is possible?

Thx!
0
Comment
Question by:AllanMartins
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Assisted Solution

by:PennGwyn
PennGwyn earned 62 total points
ID: 12020318
I use a BlueSocket appliance for that.  It only cost $10K or so.

0
 
LVL 2

Accepted Solution

by:
DiCeR earned 63 total points
ID: 12024665
To ONLY let through authenticated connections your WiFi must be isolated on its own. Doing what you're outlining very likely requires a well configures gateway/proxy/FireWall that can tell the difference between connections that are authenticated and those that are not - AND supply users with a way to authenticate.

Web connections withouth AUTH is redirected to a web-page locally on the WiFi (cant be externally or on the internet since that means you can surf without AUTH), other connections without AUTH is dropped. Any connections _with_ AUTH goes where it should through a transparent proxy/FW... and so on.

This smells like a VPN solution and I'd suggest you look into software that can supply you with:
- Firewalling (to prevent unautherized access _from_ your WiFi and general protection)
- Proxy (as the gateway for autherized connections and content-filter maybe)
- VPN (for actual authentication and secure tunneling for authenticated users)

A linux-box with two network-cards in it and your LAN on the inside and your WiFi on the outside? The multitude of FW-software for linux-platforms should be manageable to get running.

For instance:
OpenVPN: http://openvpn.sourceforge.net/
Wolverine Commercial VPN/Firewall: http://www.coyotelinux.com/products.php 
Product=wolverine
or its freeware Coyote FW: http://www.coyotelinux.com/products.php?Product=coyote

and Squid/Apache for proxy/webservices.

There are VERY VERY likely commecial boxes and software-setups that can offer you exactly what you want here, but Im (sadly) not familiar with any of those.

I know this is done many places with "open" WiFi hotspots where you pay for access. Getting a signal is free. Getting _actual_ traffic isnt. As a temporary solution, put up a visible WiFi network with your name/number as contact-info and change your WEP/WPA uh.. bi-weekly or so forcing your users to regularly get in touch with you.

0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question