Questions

Guest access configuration

Tags:
+
0 Votes
Locked

Guest access configuration

dgreer
How do I configure guest access, similar to a hotel; with initial acceptance page, etc?

How do I configure printing to work with this configuration?
  • +
    0 Votes
    deity_chooch

    In order to set that up, you'd need a management server of some sort. I'm guessing if it's like a hotel, that each connection (room?) has a cat5 port that connects to switches/hubs and down into a router. The management server will need a web server (to display the acceptance page) and a firewall. The firewall stops those computers that have not yet accepted the terms of use (by entering a password or however you want to work that) because of a default rule that redirects them to the web server. Once the user submits the acceptance, the computer is authorized by adding the MAC address of the computer to the firewall, in order to bypass the redirect.

    +
    0 Votes
    dgreer

    I pretty much figured that was the process. unfortunately, we are being pushed to come up with an implementation solution for it; on the cheap, of course!

    What I am really looking for, is the recommended hardware requirements; and router/firewall configurations for this type of solution. The end user, really is not going to purchase a commercial solution; when we really have all of the hardware and network expertise on hand.

    +
    0 Votes
    deity_chooch

    When we do this, we use a GNU/Linux machine with iptables and apache. The iptables has a chain to redirect all traffic to itself on port 80 for all non-authorized users and all authorized users are allowed past. Just need the hardware to build a simple machine, with two NICs.

  • +
    0 Votes
    deity_chooch

    In order to set that up, you'd need a management server of some sort. I'm guessing if it's like a hotel, that each connection (room?) has a cat5 port that connects to switches/hubs and down into a router. The management server will need a web server (to display the acceptance page) and a firewall. The firewall stops those computers that have not yet accepted the terms of use (by entering a password or however you want to work that) because of a default rule that redirects them to the web server. Once the user submits the acceptance, the computer is authorized by adding the MAC address of the computer to the firewall, in order to bypass the redirect.

    +
    0 Votes
    dgreer

    I pretty much figured that was the process. unfortunately, we are being pushed to come up with an implementation solution for it; on the cheap, of course!

    What I am really looking for, is the recommended hardware requirements; and router/firewall configurations for this type of solution. The end user, really is not going to purchase a commercial solution; when we really have all of the hardware and network expertise on hand.

    +
    0 Votes
    deity_chooch

    When we do this, we use a GNU/Linux machine with iptables and apache. The iptables has a chain to redirect all traffic to itself on port 80 for all non-authorized users and all authorized users are allowed past. Just need the hardware to build a simple machine, with two NICs.