Solved

Wi-Fi Network | How show up a page to an "non-authenticaded" user?

Posted on 2004-09-09
3
269 Views
Last Modified: 2010-04-11
I got a network at my apartament, and I wanted to use a hotspot to serve Internet to some friends. I would like that everyone would have access to the netwok, but if the person tryed to browse over the internet, a page would open saying "Contact allanmartins@gmail.com requesting for a user and password", then, with the proper user and password, the user would be able to use internet without problems. Is is possible?

Thx!
0
Comment
Question by:AllanMartins
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Assisted Solution

by:PennGwyn
PennGwyn earned 62 total points
ID: 12020318
I use a BlueSocket appliance for that.  It only cost $10K or so.

0
 
LVL 2

Accepted Solution

by:
DiCeR earned 63 total points
ID: 12024665
To ONLY let through authenticated connections your WiFi must be isolated on its own. Doing what you're outlining very likely requires a well configures gateway/proxy/FireWall that can tell the difference between connections that are authenticated and those that are not - AND supply users with a way to authenticate.

Web connections withouth AUTH is redirected to a web-page locally on the WiFi (cant be externally or on the internet since that means you can surf without AUTH), other connections without AUTH is dropped. Any connections _with_ AUTH goes where it should through a transparent proxy/FW... and so on.

This smells like a VPN solution and I'd suggest you look into software that can supply you with:
- Firewalling (to prevent unautherized access _from_ your WiFi and general protection)
- Proxy (as the gateway for autherized connections and content-filter maybe)
- VPN (for actual authentication and secure tunneling for authenticated users)

A linux-box with two network-cards in it and your LAN on the inside and your WiFi on the outside? The multitude of FW-software for linux-platforms should be manageable to get running.

For instance:
OpenVPN: http://openvpn.sourceforge.net/
Wolverine Commercial VPN/Firewall: http://www.coyotelinux.com/products.php 
Product=wolverine
or its freeware Coyote FW: http://www.coyotelinux.com/products.php?Product=coyote

and Squid/Apache for proxy/webservices.

There are VERY VERY likely commecial boxes and software-setups that can offer you exactly what you want here, but Im (sadly) not familiar with any of those.

I know this is done many places with "open" WiFi hotspots where you pay for access. Getting a signal is free. Getting _actual_ traffic isnt. As a temporary solution, put up a visible WiFi network with your name/number as contact-info and change your WEP/WPA uh.. bi-weekly or so forcing your users to regularly get in touch with you.

0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month6 days, 14 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question