[isf-wifidog] Bypassing Wifidog for One terminal

Dr.Marios Moutzouris m.moutzouris at neuron.gr
Ven 30 Sep 06:21:55 EDT 2005


Okay I have the below setup. How do I tell wifidog, that requests from
192.168.1.10 [voip phone] it should just let through?

M

-----Original Message-----
From: wifidog-bounces at listes.ilesansfil.org
[mailto:wifidog-bounces at listes.ilesansfil.org] On Behalf Of Mina Naguib
Sent: Friday, August 05, 2005 2:04 PM
To: WiFiDog Captive Portal
Subject: Re: [isf-wifidog] Bypassing Wifidog for One terminal


First add the phone's MAC address to /etc/ethers and assign it a  
static IP address:
/etc/ethers:
00:11:22:33:44:55 12.23.34.45

This will make the DHCP server assign the phone that same IP every  
time it requests a lease.

Next create /etc/init.d/S46firewall-custom and add in it:
#!/bin/sh

/usr/sbin/iptables -t filter -I FORWARD 1 -s 12.23.34.45 -j ACCEPT
/usr/sbin/iptables -t filter -I FORWARD 1 -d 12.23.34.45 -j ACCEPT

On 5-Aug-05, at 2:23 AM, Dr. Marios Moutzouris wrote:


> Hello,
>
> I've got a VoIP phone connected to a linksys and I want to bypass  
> wifidog's
> authentication. I suppose I need to add something in IPtables for  
> its MAC
> address? Can someone tell me the line I need to add/subtract.
>
> Thanks
> Mario
>
> -- 
> No virus found in this outgoing message.
> Checked by AVG Anti-Virus.
> Version: 7.0.338 / Virus Database: 267.10.0/63 - Release Date:  
> 3/8/2005
>
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
>



-- 
No virus found in this incoming message.
Checked by AVG Anti-Virus.
Version: 7.0.338 / Virus Database: 267.10.1/64 - Release Date: 4/8/2005
 
  

-- 
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.344 / Virus Database: 267.11.9/115 - Release Date: 29/9/2005
 



More information about the WiFiDog mailing list