That still asks, how to enforce. 802.1x can use MAC based authentication. That would require the customer to supply the MAC address before they can use it. But the whole point is moot since they don't really care who uses it, they just need/want to know how many are using.
Roger Around Sun,Mar 02 2003, at 04:12, Jim K, wrote: > I do not know networking. It was probably a bad idea. could the passwords be > enforced on a box just to the roomside of the firewall perhaps > room network <---> password box<----> firewall<--->www > Jim K > > ----- Original Message ----- > From: "Roger" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Sunday, March 02, 2003 3:58 PM > Subject: Re: [Eug-lug]network monitoring? > > > > So, How do you enforce the password? Is each data port plugged directly > > into a switch where you could activate/deactivate ports? > > > > > > Roger > > > > Around Sun,Mar 02 2003, at 03:53, Jim K, wrote: > > > Would it be easy to seat up a password username combo say based on > room > > > number and billing address zip code or city? (i.e. when the front desk > > > clerk enters the information into the computer have generate an email > > > containing the information for username and password and length of stay > and > > > automatically foreward it to firewall or other system that would read > the > > > information and automatically create an account that closes say 4 hours > past > > > checkout time. > > > This would give the guest a grace period to extend their stay.) > > > This may be a dumb idea. Perhaps the firewall isn't the system > to > > > have the password access on, but it should be a hotel system i would > think. > > > Jim K > > > ----- Original Message ----- > > > From: "Roger" <[EMAIL PROTECTED]> > > > To: <[EMAIL PROTECTED]> > > > Sent: Sunday, March 02, 2003 3:02 PM > > > Subject: Re: [Eug-lug]network monitoring? > > > > > > > > > > > > > > Around Sun,Mar 02 2003, at 02:54, Cory Petkovsek, wrote: > > > > > On Sat, Mar 01, 2003 at 11:09:03PM -0600, Timothy Bolz wrote: > > > > > > Cory & Ben > > > > > > > > > > > > Thank you for responding. I work at a hotel about 2 months back > we > > > got high > > > > > > speed internet for our rooms. It's a homepna system. We have DSL > to > > > the > > > > > > hotel and it's split from there. The company who installed and > > > support it is > > > > > > http://www.trinicor.com . Half the hotel has high speed. They > > > Managers > > > > > > need a usage log to see if a lot of people are using it and if all > the > > > rooms > > > > > > are being used then they would install the rest of the hotel. > > > > > > > > > > > > I talked with trinicor and they can do the logging with the > firewall. > > > I > > > > > > thought since my computer was on all the time I could log it. > > > > > Logging at the firewall is a good place to do it. You could do it > from > > > > > your workstation as long as you plug in your computer into a port on > > > your > > > > > switch that is a monitor port. That is, a port that can see all > > > traffic. > > > > > Then look at projects like snort or ipband on freshmeat.net > > > > > > > > > > Assigning each tenant a username/password is not a practical > solution > > > since > > > > > each one will be there for only a few days. The best way would be > to > > > check > > > > > and see if your switch has snmp/logging statistics available. Then > > > you'll > > > > > get per port usage instead of per ip. However per ip will probably > be > > > good > > > > > enough. It won't tell you which room, but it will tell you a fairly > > > > > accurate number of users. > > > > a low-tech solution could be to ask the customer if they used it, you > > > > could also ask if now that they know the hotel is wired, would they > > > > bring a computer on the next visit. > > > > > > > > -- > > > > Roger > > > > > -------------------------------------------------------------------------- > > > - > > > > [EMAIL PROTECTED] > > > > The more I want to get something done, the less I call it work. > > > > -- Richard Bach, "Illusions" > > > > _______________________________________________ > > > > Eug-LUG mailing list > > > > [EMAIL PROTECTED] > > > > http://mailman.efn.org/cgi-bin/listinfo/eug-lug > > > > > > _______________________________________________ > > > Eug-LUG mailing list > > > [EMAIL PROTECTED] > > > http://mailman.efn.org/cgi-bin/listinfo/eug-lug > > > > -- > > Roger > > -------------------------------------------------------------------------- > - > > [EMAIL PROTECTED] > > Did you hear that two rabbits escaped from the zoo and so far they have > > only recaptured 116 of them? > > _______________________________________________ > > Eug-LUG mailing list > > [EMAIL PROTECTED] > > http://mailman.efn.org/cgi-bin/listinfo/eug-lug > > _______________________________________________ > Eug-LUG mailing list > [EMAIL PROTECTED] > http://mailman.efn.org/cgi-bin/listinfo/eug-lug -- Roger --------------------------------------------------------------------------- [EMAIL PROTECTED] I suppose one could claim that an undocumented feature has no semantics. :-( -- Larry Wall in <[EMAIL PROTECTED]> _______________________________________________ Eug-LUG mailing list [EMAIL PROTECTED] http://mailman.efn.org/cgi-bin/listinfo/eug-lug
