Tuesday, August 3, 2010

Chillispot on DD-WRT and remote radius / https server for authentication

This will force users to login (via a captive portal web-page).

Info:

From a previous blog, we used chillispot on a server which
served as our router and captive portal. Radius and Apache
were also installed on the same server.

This time, we will use DD-WRT which is installed on our access
point. DD-WRT has chillispot built-in. Our radius and http services
will remain on the Linux server. This scenario configures chillispot
to authenticate clients (Wireless or Wired) from a remote server.

Same as before, chillispot on DD-WRT creates the virtual tunnel and
other processes as it does on the Linux server. It directs
unauthenticated users to the remote https and radius server.

Again, the steps to be done are the same when you configure radius,
apache and chillispot on CentOS 5. This time, chillispot is not on
the server but on the access point.

1) Install, configure apache to support SSL and update the
hotspotlogin.cgi script
2) Install Radius and update all user and password required
3) Enable chillispot on DD-WRT and supply the required parameters:

uamserver / redirect https://192.168.182.1/cgi-bin/hotspotlogin.cgi
uamsecret ht2eb8ej6s4et3rg1ulp

4) By default, chillispot uses 192.168.182.0/24 as its dhcp range.
You can change this under the "hotspot" menu and supply another
ip range at the "remote network" field. Try putting
192.168.185.0/24 renew your laptop's address.

1 comment:

  1. Hello,
    i want ti know if it is possible to configure AP(with dd-wrt) to redirect authetification to remote RADIUS server with private IP adresse,the aim of this is to manage many APs with the same RADIUS server,

    Thanks for this intereset topic

    ReplyDelete