On Thu, Sep 4, 2008 at 8:49 AM, Charles Wyble <[EMAIL PROTECTED]> wrote:
> Andrew Niemantsverdriet wrote:
>> On Wed, Sep 3, 2008 at 4:42 PM, Charles Wyble <[EMAIL PROTECTED]> wrote:
>>
>>> Andrew Niemantsverdriet wrote:
>>>
>>>> How to I prevent SOHO routers from handing out bogus DHCP information
>>>> when they are plugged in backwards?
>>>>
>>>>
>>> Filter them upstream?
>>>
>>>
>>
>> How would I filter upstream? All clients go into a switch so I would
>> have to filter at the switch level, what switches provide this?
>>
>
> So what exactly did you mean by plugged in backwards? The WAN port
> instead of the LAN port?
> Can you explain your architecture  a bit?

Yes, when I say plugged in backwards I mean that a LAN port is plugged
into the WAN cable broadcasting bogus DHCP infomation. Currently the
architecture is bridged. There are three access points (Ubquity NS2)
that all come down to a switch the switch is then connected the
gateway router that is running DHCP.

>>
>> This was more of a WISP dashboard program. The captive portal stuff
>> was secondary the main part of the program was more of an access
>> controller. It allowed the admin to control IP's maintain MAC ACL's
>>
>
> Ah. Well check out ZeroShell for this. Its a very cool distro. Also
> check out Untangle.
>
These are closer to what I want however not the original program that
I am thinking of. The main feature that I am wanting is something that
will allow authorized clients direct access to the internet no
clicking "ok" to continue or anything like that. Un-authorized clients
should be directed to a captive portal type deal.

Thanks
 _
/-\ ndrew


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to