(function(a,e,f,g,b,c,d){a.GoogleAnalyticsObject=b;a[b]=a[b]||function(){(a[b].q=a[b].q||[]).push(arguments)};a[b].l=1*new Date;c=e.createElement(f);d=e.getElementsByTagName(f)[0];c.async=1;c.src=g;d.parentNode.insertBefore(c,d)})(window,document,"script","https://www.google-analytics.com/analytics.js","ga");ga("create","UA-732153-7","auto",{allowLinker:!0,siteSpeedSampleRate:10});ga("set","transport","beacon");ga("set","anonymizeIp",!0);ga("require","linker"); ga("linker:autoLink","askapache.com askapache.net htaccess.io htaccesselite.com askapache.info htaccess.guru".split(" "),!0);ga("send","pageview"); CLASS="ARTICLE" BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF" VLINK="#840084" ALINK="#0000FF" >

Authentication Gateway HOWTO

Nathan Zorn


Revision History
Revision 0.052002-11-05
Revision 0.052002-05-10Revised by: nhz
Revision 0.042002-02-28Revised by: nhz
Revision 0.032001-09-28Revised by: nhz
Revision 0.022001-09-28Revised by: KET
Revision 0.012001-09-06Revised by: nhz

There are many concerns with the security of wireless networks and public access areas such as libraries or dormitories. These concerns are not met with current security implementations. A work around has been proposed by using an authentication gateway. This gateway addresses the security concerns by forcing the user to authenticate in order to use the network.

Table of Contents
1. Introduction
1.1. Copyright Information
1.2. Disclaimer
1.3. New Versions
1.4. Credits
1.5. Feedback
2. What is needed
2.1. Netfilter
2.2. Software for dynamic Netfilter rules.
2.3. DHCP Server
2.4. Authentication mechanism
2.5. DNS Server
3. Setting up the Gateway Services
3.1. Netfilter Setup
3.2. Dynamic Netfilter rules.
3.3. DHCP Server Setup
3.4. Authentication Method Setup
3.5. DNS Setup
4. Using the authentication gateway
5. Concluding Remarks
6. Additional Resources
7. Questions and Answers