first things first... i would like you to stay away what you are trying to
do due to the fact that mac address can be easily spoof to circumvent your
firewall policy...

to control who can use the internet is to provide an authentication
mechanism... you have three options here...

1. layer 2 authentication (eg. pppoe authentication)
2. layer 3 authentication (eg. vpn authentication)
3. layer 7 authentication (eg. web based authentication)

above options can be use both for wired and wireless medium, allowed time to
login, time duration, what services allowed to access and many more...

This layer 2 authentication (pppoe). How do you do this. Do you need a special switch for this?

_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to