Wireless Access with HTTP authentication page

Posted on 2007-08-10
Last Modified: 2013-11-09
The PHB wants a wireless router that hijacks the web page and queries for a username and password, like a hotspot.

This is not for a commercial service.  He just doesn't want to make people use a shared key, not charge them.  So accounting is not necessary -- just authentication.

I'm looking for an all in one solution.
Question by:RPPreacher
    LVL 4

    Expert Comment

    LVL 11

    Expert Comment

    I have used PublicIP and it works fantastic. It is a bootable CDrom and runs in memory, so it does not write to the hard drive. there are a couple requirements, first you need a pc to run it on (an old 386 would work just fine, and two nic cards. One nic goes to the router and the other to the Access Point.
    LVL 20

    Author Comment

    Can I do this without a separate server?  I just want a wifi router that hi-jacks the web page and authenticates the user.
    LVL 11

    Accepted Solution

    Probably the only router you will find to do that is one designed for Hotspots, some of them have a built in database for users and authenticates against it.
    There is some firmware out there for some routers such as the wrt54g that "hijacks the page, but I do not believe it has user authentication.

    The PublicIP does not require a server, it will run great on an old slow PC, it just needs to be able to boot from the cdrom.
    LVL 20

    Author Comment

    Your reference to WRT54G got me poking around a bit.  WRT54GL does have several hijack pages with radius authentication.  Kudos.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Multi-source agreements are important because they set standards that all manufacturers should follow to ensure that devices are compatible with multiple vendors. The multi-source agreement (MSA) is an agreement that establishes how multiple vendors…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    6 Experts available now in Live!

    Get 1:1 Help Now