If i understand, the URL is: <a href="http://10.11.8.31/">http://10.11.8.31/</a><br><br>Thanks a lot for attention.<br><br><div class="gmail_quote">2008/6/26 Benoit Grégoire <<a href="mailto:benoitg@coeus.ca" target="_blank">benoitg@coeus.ca</a>>:<br>
<blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div>On 26 June 2008, Fábio Ribeiro wrote:<br>
</div><div>>>At what URL do you have your authserver installed?<br>
>><br>
>>What do you have in your AuthServer { } parameter in the gateway<br>
>> configuration file (wifidog.conf)?<br>
><br>
</div><div>> My server has two interface, a local where and another for Internet. I will<br>
> put several access point to authentication customers and browse on the<br>
> website.<br>
<br>
</div>At what URL do you have your authserver?<br>
<br>
Please keep your replies on the list.<br>
<div><div></div><div><br>
> Follow below my the file wifidog.conf<br>
><br>
> root@apollo8:/usr/local/etc# cat wifidog.conf<br>
> # $Id: wifidog.conf 1346 2008-04-21 23:04:40Z acv $<br>
> # WiFiDog Configuration file<br>
><br>
> # Parameter: GatewayID<br>
> # Default: default<br>
> # Optional<br>
> #<br>
> # Set this to the node ID on the auth server<br>
> # this is used to give a customized login page to the clients and for<br>
> # monitoring/statistics purpose<br>
> # If none is supplied, the mac address of the GatewayInterface interface<br>
> will be used,<br>
> # without the : separators<br>
><br>
> GatewayID default<br>
><br>
> # Parameter: ExternalInterface<br>
> # Default: NONE<br>
> # Optional<br>
> #<br>
> # Set this to the external interface (the one going out to the Inernet or<br>
> your larger LAN).<br>
> # Typically vlan1 for OpenWrt, and eth0 or ppp0 otherwise,<br>
> # Normally autodetected<br>
><br>
> ExternalInterface eth0<br>
><br>
> # Parameter: GatewayInterface<br>
> # Default: NONE<br>
> # Mandatory<br>
> #<br>
> # Set this to the internal interface (typically your wifi interface).<br>
> # Typically br0 for OpenWrt, and eth1, wlan0, ath0, etc. otherwise<br>
><br>
> GatewayInterface eth1<br>
><br>
> # Parameter: GatewayAddress<br>
> # Default: Find it from GatewayInterface<br>
> # Optional<br>
> #<br>
> # Set this to the internal IP address of the gateway. Not normally<br>
> required.<br>
><br>
> GatewayAddress <a href="http://10.11.8.31" target="_blank">10.11.8.31</a><br>
><br>
> # Parameter: HtmlMessageFile<br>
> # Default: wifidog-msg.html<br>
> # Optional<br>
> #<br>
> # This allows you to specify a custome HTML file which will be used for<br>
> # system errors by the gateway. Any $title, $message and $node variables<br>
> # used inside the file will be replaced.<br>
> #<br>
> HtmlMessageFile /usr/local/wifidog/wifidog-msg.html<br>
><br>
> # Parameter: AuthServer<br>
> # Default: NONE<br>
> # Mandatory, repeatable<br>
> #<br>
> # This allows you to configure your auth server(s). Each one will be tried<br>
> in order, untill one responds.<br>
> # Set this to the hostname or IP of your auth server(s), the path where<br>
> # WiFiDog-auth resides in and the port it listens on.<br>
> #AuthServer {<br>
> # Hostname (Mandatory; Default: NONE)<br>
> # SSLAvailable (Optional; Default: no; Possible values:<br>
> yes, no)<br>
> # SSLPort (Optional; Default: 443)<br>
> # HTTPPort (Optional; Default: 80)<br>
> # Path (Optional; Default: /wifidog/ Note: The<br>
> path must be both prefixed and suffixed by /. Use a single / for server<br>
> root.)<br>
> # LoginScriptPathFragment (Optional; Default: login/? Note: This is the<br>
> script the user will be sent to for login.)<br>
> # PortalScriptPathFragment (Optional; Default: portal/? Note: This is<br>
> the script the user will be sent to after a successfull login.)<br>
> # MsgScriptPathFragment (Optional; Default: gw_message.php? Note:<br>
> This is the script the user will be sent to upon error to read a readable<br>
> message.)<br>
> # PingScriptPathFragment (Optional; Default: ping/? Note: This is the<br>
> script the user will be sent to upon error to read a readable message.)<br>
> # AuthScriptPathFragment (Optional; Default: auth/? Note: This is the<br>
> script the user will be sent to upon error to read a readable message.)<br>
> #}<br>
><br>
> AuthServer {<br>
> Hostname <a href="http://10.11.8.31" target="_blank">10.11.8.31</a><br>
> SSLAvailable yes<br>
> Path /wifidog/<br>
> }<br>
><br>
> #AuthServer {<br>
> # Hostname <a href="http://auth2.ilesansfil.org" target="_blank">auth2.ilesansfil.org</a><br>
> # SSLAvailable yes<br>
> # Path /<br>
> #}<br>
><br>
> # Parameter: Daemon<br>
> # Default: 1<br>
> # Optional<br>
> #<br>
> # Set this to true if you want to run as a daemon<br>
> Daemon 1<br>
><br>
> # Parameter: GatewayPort<br>
> # Default: 2060<br>
> # Optional<br>
> #<br>
> # Listen on this port<br>
> GatewayPort 2060<br>
><br>
> # Parameter: HTTPDName<br>
> # Default: WiFiDog<br>
> # Optional<br>
> #<br>
> # Define what name the HTTPD server will respond<br>
> HTTPDName WiFiDog<br>
><br>
> # Parameter: HTTPDMaxConn<br>
> # Default: 10<br>
> # Optional<br>
> #<br>
> # How many sockets to listen to<br>
> HTTPDMaxConn 10<br>
><br>
> # Parameter: CheckInterval<br>
> # Default: 60<br>
> # Optional<br>
> #<br>
> # How many seconds should we wait between timeout checks. This is also<br>
> # how often the gateway will ping the auth server and how often it will<br>
> # update the traffic counters on the auth server. Setting this too low<br>
> # wastes bandwidth, setting this too high will cause the gateway to take<br>
> # a long time to switch to it's backup auth server(s).<br>
><br>
> CheckInterval 60<br>
><br>
> # Parameter: ClientTimeout<br>
> # Default: 5<br>
> # Optional<br>
> #<br>
> # Set this to the desired of number of CheckInterval of inactivity before a<br>
> client is logged out<br>
> # The timeout will be INTERVAL * TIMEOUT<br>
> ClientTimeout 5<br>
><br>
> # Parameter: TrustedMACList<br>
> # Default: none<br>
> # Optional<br>
> #<br>
> # Comma separated list of MAC addresses who are allowed to pass<br>
> # through without authentication<br>
> #TrustedMACList 00:00:DE:AD:BE:AF,00:00:C0:1D:F0:0D<br>
><br>
> # Parameter: FirewallRuleSet<br>
> # Default: none<br>
> # Mandatory<br>
> #<br>
> # Groups a number of FirewallRule statements together.<br>
><br>
> # Parameter: FirewallRule<br>
> # Default: none<br>
> #<br>
> # Define one firewall rule in a rule set.<br>
><br>
> # Rule Set: global<br>
> #<br>
> # Used for rules to be applied to all other rulesets except locked.<br>
> FirewallRuleSet global {<br>
> ## To block SMTP out, as it's a tech support nightmare, and a legal<br>
> liability<br>
> #FirewallRule block tcp port 25<br>
><br>
> ## Use the following if you don't want clients to be able to access<br>
> machines on<br>
> ## the private LAN that gives internet access to wifidog. Note that<br>
> this is not<br>
> ## client isolation; The laptops will still be able to talk to one<br>
> another, as<br>
> ## well as to any machine bridged to the wifi of the router.<br>
> # FirewallRule block to <a href="http://192.168.0.0/16" target="_blank">192.168.0.0/16</a><br>
> # FirewallRule block to <a href="http://172.16.0.0/12" target="_blank">172.16.0.0/12</a><br>
> # FirewallRule block to <a href="http://10.0.0.0/8" target="_blank">10.0.0.0/8</a><br>
><br>
> ## This is an example ruleset for the Teliphone service.<br>
> #FirewallRule allow udp to <a href="http://69.90.89.192/27" target="_blank">69.90.89.192/27</a><br>
> #FirewallRule allow udp to <a href="http://69.90.85.0/27" target="_blank">69.90.85.0/27</a><br>
> #FirewallRule allow tcp port 80 to <a href="http://69.90.89.205" target="_blank">69.90.89.205</a><br>
> }<br>
><br>
> # Rule Set: validating-users<br>
> #<br>
> # Used for new users validating their account<br>
> FirewallRuleSet validating-users {<br>
> FirewallRule allow to <a href="http://0.0.0.0/0" target="_blank">0.0.0.0/0</a><br>
> }<br>
><br>
> # Rule Set: known-users<br>
> #<br>
> # Used for normal validated users.<br>
> FirewallRuleSet known-users {<br>
> FirewallRule allow to <a href="http://0.0.0.0/0" target="_blank">0.0.0.0/0</a><br>
> }<br>
><br>
> # Rule Set: unknown-users<br>
> #<br>
> # Used for unvalidated users, this is the ruleset that gets redirected.<br>
> #<br>
> # XXX The redirect code adds the Default DROP clause.<br>
> FirewallRuleSet unknown-users {<br>
> FirewallRule allow udp port 53<br>
> FirewallRule allow tcp port 53<br>
> FirewallRule allow udp port 67<br>
> FirewallRule allow tcp port 67<br>
> }<br>
><br>
> # Rule Set: locked-users<br>
> #<br>
> # Not currently used<br>
> FirewallRuleSet locked-users {<br>
> FirewallRule block to <a href="http://0.0.0.0/0" target="_blank">0.0.0.0/0</a><br>
> }<br>
><br>
> 2008/6/26 Benoit Grégoire <<a href="mailto:benoitg@coeus.ca" target="_blank">benoitg@coeus.ca</a>>:<br>
> > On 26 June 2008, Fábio Ribeiro wrote:<br>
> > > Hi all,<br>
> > > I need to install the OpenWrt-SDK-Linux-i686-1 to correct my error<br>
> > > ((ping_thread.c:224) Auth server did NOT say pong!) ?<br>
> ><br>
> > At what URL do you have your authserver installed?<br>
> ><br>
> > What do you have in your AuthServer { } parameter in the gateway<br>
> > configuration<br>
> > file (wifidog.conf)?<br>
> ><br>
> ><br>
> ><br>
> ><br>
> > --<br>
> > Benoit Grégoire<br>
> > Technologies Coeus inc.<br>
<br>
<br>
<br>
</div></div>--<br>
<div><div></div><div>Benoit Grégoire<br>
Technologies Coeus inc.<br>
</div></div></blockquote></div><br>