Forum Replies Created
-
AuthorPosts
-
Irie
Memberfulvio, would you be so kind to give short answers to the questions above?
Irie
Membersorry for asking you this one more time, but you didn’t answer yet.
could you please give a short explanation how to add the captive-portal user to the syslog-entries?
would be great, if i could implement this.
thanks a lot π
Irie
Memberthis would be very interesting for me, too
Irie
Memberfulvio, is it possible to give me a date, when the release will come, which would allow to deactiveate SSL?
i’m thinking about buying a certificate..but if it is possible to switch the captive portal from HHTPS to HTTP in nearer future, this wouldn’t be nessesary.thx for answering π
Irie
Memberyou can also order a certificate from a Certificate Authority. that is trusted by the IE. but is is a little expensive.
Irie
Member@fulvio wrote:
maybe its a possibility to add the captive-portal-user-name to the syslog entries?
Yes, it is possible, but in any case, if your LAN produces many connections per second this operation could be a CPU intensive process.
i don’t have a huge server, only a little mini-ITX-PC for zeroshell.
but i don’t think there will be so much connections, cause wo don’t have such a lot of guests^^i think there will never be more than 5 users at the same time surfing over that server and so i think this souldn’t be a problem, even for a 1200mhz single-core processor!?!
it would be great, if you can tell me, how to integrate the captive-portal user-string in the syslog.
thanx π
/edit:
i just remembered the “accounting”-tab in the “captive portal”-menu. will there only be things like cost, duration and traffic or will this allow you to see all connections by a specific user?Irie
Memberoke, thanks, it works….but it isn’t very easy to handle….
can anybody tell me, how to improve the syslog-interpretation?
the zeroshell-server is for our guestnetwork….we want to have a possibility to backtrack, which guest connected which servers or which connection was opened by which guest…..so that in case of abuse we can identify the guest, which is responsible for the traffic.
currently it is not very easy to backtrack….maybe its a possibility to add the captive-portal-user-name to the syslog entries? (only a suggestion).
thanx
irie
Irie
Memberthanks fulvio π
Irie
Memberin my installation, there is still the button with (X.509) on the captive portal site, but he is disabled, you cannot click on it….dunno why, but its ok, cause is don’t want to use this certificates..
i think it is because i removed the certificate of every user.. (but i don’t know exactly)
greetz
Irie
Irie
Memberthis is, what i’m looking for, too.
tomorrow i will install zeroshell on a PC and test it a little bit if it is possible to use it in our guest-network.
i try to install a network, where every guest gets a unique username/password-combination, that is only 24 hours valid. the guest comes to our office, signes a list (which guest-network-access he got) and then he is able to connect to the guest-network with this username/password-combination. when the 24 hours are over, the combination of username and password is expired and he isn’t able to join the network anymore.
so you can exactly backtrack, which guest (name in the list + which guest-login) connected which websites or used which services (in case of abuse)
is this possible somehow?
thanks, i hope zeroshell will be my solution π
PS: ΓΆmm, my english..i’m sorry
-
AuthorPosts