Solved

Wireless - user logon

Posted on 2008-06-11
20
304 Views
Last Modified: 2013-11-09
I am interested in what hardware is needed if I want to create a wireless network, where you have to enter a username/password to go on the internet.
I know the teoritically what needs, but I would like to get a response from people who actually have worked with the setup and which products there have been used. It is a larger area and not just a small house:)
0
Comment
Question by:rossoneris
  • 13
  • 7
20 Comments
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Well not much to say here what you are asking is pretty basic, all wireless routers these days have wep or wpa protection your so called password to the internet. You can pretty much go to your local Best Buy or Circuit City or your choice of technology store and pick up a wireless router. Now mind you they all have different features some offering different speeds if you are looking for range I suggest a mimo router or something along those lines. The setup itsself is very easy all routers come with a cd that will guide you through the install, if you need further help thats what ee is for. If you already have a router then what you would be looking for is a wireless access point.

Jeremy
0
 

Author Comment

by:rossoneris
Comment Utility
OK - think I did explain it a bit wrong. There must be a user management in the "background" - which means, that users have to logon with their own usernames - not mac adress etc. So when you click on the explorer icon an username/password must be typed to get acces.
We are not just talking about acces points here, but to get this solution to work an firewall also will have to be used.
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Well are you wanting users to use there username and password to get on the wireless network or are you trying to get a username and password prompt for internet access for your users already on the network?
0
 

Author Comment

by:rossoneris
Comment Utility
To get on the (wireless) internet and also with "normal" cable users have to enter user and password - so you in behind the system has a user management system, to control the internet use only is possible for people with the right username/password
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Ok I think that this issue is a little misunderstood, I think I get what you are trying to say. Well there are multiple ways you can limit people to the internet. Are you running a Domain Controller?
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Basiclly asking what is your setup now what are you trying to add? do you already have the wireless access point? Are you wanting your users to only have local access to network rescources?
0
 

Author Comment

by:rossoneris
Comment Utility
This is a new installation - the old one had MAC filtering, but it is very difficult to manage this, as this is a place where new people come and go every now and than, so a user management system is needed.
The acces points are there, but the user management system is not
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Well you can setup a wep key or wpa key that users must type in, not sure if there is really a way to use the access point as authentication for user names and passwords I mean how would the access point know to ask for username and password and be able to authenticate with your Server. Basically if you have a access point you either need to leave it open or have mac address filtering or a shared key!
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
What type of firewall and access point are we talking about?
0
 

Author Comment

by:rossoneris
Comment Utility
The current setup doesn´t matter, as this is not usable. As I wrote, I would like to get information from a running installation, which hardware is used etc.
0
Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
http://www.linksys.com/servlet/Satellite?c=L_Product_C2&childpagename=US%2FLayout&cid=1152745215776&pagename=Linksys%2FCommon%2FVisitorWrapper&lid=1577639789B22 This is a product I use but once again there has to be some form of auhentication you cannot use a username or password to authenticate for the wireless access now you can use a shared key and then restrict the internet acces once the user has connected to the acces point
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
I also understand that you are looking for hardware that does all this but the fact is you are not really explaining what you are looking for you want your users to access the internet with a username or password well this is easily done but need to know what you are ruuning do you run a domain over there is this a basic setup with users in a workgroup cant just spout off hardware that is going to solve your issue
0
 

Author Comment

by:rossoneris
Comment Utility
:)

It is quite simple
When People want to enter the internet, they have to enter a username/password. There is no domain, no nothing - a public place where a lot of different enters

And I ask, which hardware is needed to get this working
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
You can also go with something like thishttp://www.firewalls.com/productcart/pc/viewPrd.asp?idcategory=520&idproduct=1026 and create access rules for users
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Well then you have no real control of the internet access unless you do something like the above link Sonicwall would be able to assist you with a product you are looking for, I apologize for the mis communication I see what you are saying now. I run a pro 2040 and can limit people access but I just create a policy in the firewall the one I showed you above will provide you with Comprehensive security and also wireless access make sure you always go with their protection plan as they offer great support. I have a great contact at Sonicwall her name I Erika egoodman@SonicWALL.com email her with what you are trying to achieve and she will be able to turn you in the right direction as far as a product goes. I will also giver her a heads up if you plan on contacting her
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Is that along the lines of what you are looking for or am I way off
0
 

Author Comment

by:rossoneris
Comment Utility
Yes Indeed - but I prefer a bit more known hardware manufactores as Zyxel or Cisco - but thanks for the reply
0
 
LVL 2

Expert Comment

by:AmityNA
Comment Utility
Ok then I can actually turn you to a person who would be able to assist you with that as well, do you have a personal email I can send you his contact info and he will actually get you contected with a cisco engineer so they can set you up with the right product you can email me at jfelton@amitymachine.com and I can foward you his info they are a gold partner with cisco, the reason I turned you to sonicwall is they are a cheap solution and seeing that your current setup is pretty basic you dont need something that is to over the top.
0
 

Author Comment

by:rossoneris
Comment Utility
If the access have to be granted by MAC adresses (not username/password - there are about 15 access points)- how will this solution be as the access points have to replicate information, as it is not very usefull to enter manually static mac adresses on all 15 AP
0
 
LVL 2

Accepted Solution

by:
AmityNA earned 125 total points
Comment Utility
You will not have to use mac adress filtering wth a comprehesive firewall solution, you can do shared keys once the user enters it once on the target pc it will never ask them again unless you change it. Some sort of authentication has to be on the access point unless you want to leave it wide open and seeing that you dont have a domain controller there is no way to prervent access from outside users unless you setup a rule in the unit to allow access to certain ip address. If you have a Security unit like what I showed you it can limit access and you can setup a open network and have all the access points tied into the firewall
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Last Mile Wireless The term last mile wireless is a bit deceptive as it can be much more than a mile. It is also called WiMax and 802.16. It generally refers to relatively short distance point-to-point / point-to-multipoint secure wireless connecti…
I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now