@wispa.org
Subject: Re: [WISPA] Hotel Redirect
How about this?
/ip firewall nat
add chain=dstnat in-interface=ether2 protocol=tcp dst-port=80 action=accept
src-address-list=proxy-bypass
add chain=dstnat in-interface=ether2 protocol=tcp dst-port=80
action=add-src-to-address-list address-list=proxy
We are looking for a way to redirect hotel guests to the hotels home page
on the first page load.
We are looking for something that does this in mikrotik because thats what
we have on location already.
The idea is that the user connects up, Hits the internet and is redirected
to a page. And
1:46 PM
To: WISPA General List
Subject: [WISPA] Hotel Redirect
We are looking for a way to redirect hotel guests to the hotels home page on
the first page load.
We are looking for something that does this in mikrotik because thats what
we have on location already.
The idea is that the user
mode wouldn’t allow the redirect. Bogus. Turned it off and the
calls went away.
*From:* wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] *On
Behalf Of *Nick Olsen
*Sent:* Thursday, January 06, 2011 1:46 PM
*To:* WISPA General List
*Subject:* [WISPA] Hotel Redirect
We
and the
calls went away.
*From:* wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] *On
Behalf Of *Nick Olsen
*Sent:* Thursday, January 06, 2011 1:46 PM
*To:* WISPA General List
*Subject:* [WISPA] Hotel Redirect
We are looking for a way to redirect hotel guests to the hotels
. Was hoping someone had a cleaner way.
Nick Olsen
Network Operations
(855) FLSPEED x106
From: Cameron Crum cc...@wispmon.com
Sent: Thursday, January 06, 2011 2:04 PM
To: WISPA General List wireless@wispa.org
Subject: Re: [WISPA] Hotel Redirect
What
and sell ad's on the splash page.
But it's gone now. Thankfully.
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of Cameron Crum
Sent: Thursday, January 06, 2011 2:05 PM
To: WISPA General List
Subject: Re: [WISPA] Hotel Redirect
What
On Thu, Jan 6, 2011 at 13:31, Nick Olsen n...@flhsi.com wrote:
That would work for some of them, In this case, The hotel management
company has a page that the hotel must redirect to. They get fined if it
doesn't redirect to the companies specific page.
I'm thinking maybe load it in a frame,
systems to punch through a page like that?
I never had the time to get the workaround.
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of Nick Olsen
Sent: Thursday, January 06, 2011 2:31 PM
To: WISPA General List
Subject: Re: [WISPA] Hotel Redirect
On Thu, Jan 6, 2011 at 13:45, Robert West robert.w...@just-micro.comwrote:
The problem that I was seeing was that there are many wireless devices now
that don’t have any “screen” to see a login button. Game systems being the
first on my mind. In hotels, some guests bring their kids game
...@wispa.org] On
Behalf Of Robert West
Sent: Thursday, January 06, 2011 2:46 PM
To: n...@flhsi.com; 'WISPA General List'
Subject: Re: [WISPA] Hotel Redirect
The problem that I was seeing was that there are many wireless devices now
that don't have any screen to see a login button. Game systems being
really
change at all.
Nick Olsen
Network Operations
(855) FLSPEED x106
From: Robert West robert.w...@just-micro.com
Sent: Thursday, January 06, 2011 2:49 PM
To: WISPA General List wireless@wispa.org
Subject: Re: [WISPA] Hotel Redirect
Possibly
...@wispa.org] On
Behalf Of Robert West
Sent: Thursday, January 06, 2011 2:46 PM
To: n...@flhsi.com; 'WISPA General List'
Subject: Re: [WISPA] Hotel Redirect
The problem that I was seeing was that there are many wireless devices now
that don't have any screen to see a login button. Game systems being
On Thu, Jan 6, 2011 at 14:20, Nick Olsen n...@flhsi.com wrote:
Normally Hotspot works with a I accept button on a page, As thats what we
have done in the past. I don't mind getting a call when a user has a
tivo/gamesystem/* that can't login as they can read me the mac and I can
bypass it.
How about this?
/ip firewall nat
add chain=dstnat in-interface=ether2 protocol=tcp dst-port=80 action=accept
src-address-list=proxy-bypass
add chain=dstnat in-interface=ether2 protocol=tcp dst-port=80
action=add-src-to-address-list address-list=proxy-bypass
address-list-timeout=1d
add
Would something like this work?
If you used a large enough pool of IPs.
DHCP with a 24 hour expire time.
Then basically:
1) src-address-list=SEEN and out-interface=INTERNET passthrough=no
action=accept
2) action=add-to-address-list address-list=SEEN address-list-timeout=24h
passthrough=yes
16 matches
Mail list logo