MT ver 2.9.39
We have a wired network of about 500 in apartment complex. We use a central located 2.9.39 Lev6 MT x86 and using freeradius server located at apartment office to run hotspot, from this we break down into switches and each apartment has wired cat5 connection.
Some clients have started to use or their own routers, usually they plug a wireless linksys, d-link or other brand router into this connection to share the connection among their computers and other devices.
Them needing to share their connection with other devices they have is fine with us BUT
The problem comes into the mix once a client installs their router.
- Client installs linksys (or other brand) router on the cat5 connection from MT
- Linksys router (WAN side) obtains IP from MT Hotspot
- Client connects to linksys router (LAN WLAN side)
- Linksys router hands IP out to client computer
- Client logs into internet using username and password
The problem:::
All other users and/or computers/devices connecting to linksys router after the first client logs in can now get free internet, as they are not prompted with sign in page.
Many of the “younger” residence here have found this out and now one person will sign up for service and then login leaving his connection open so that all their buddies in the other apartments around can get free service by connecting to his wireless signal from his router.
Not even our managed switches seem to be able to stop this.
We have tried installing our own client side equipment in some of these problem areas but they just unplug it and have their own router clone the MAC and IP from our equipment.
We have even had some of the more clever ones use MAC and IP cloning so they can use the same MAC and IP as our Hotspot Gateway so they don’t even have to login with an account at all.
We have set MT DHCP server to alert us if other dhcp servers are found on the network but even this does not see the routers sitting out there 99% of the time.
We have tried blocking the MAC addresses we find as routers in Hotspot IP Binding by adding the MAC and selecting the type as blocked. However as said before 99% of these routers are not even seen by MT to alert us of the device being there.
I did a search here and found a few post about people using MAC and IP cloning to hack hotspot on a wireless AP, but our setup does not use wireless. Our deployment is hard wired.
Does anyone know of a way we can get this under control, or does everyone using MT hotspot just accept this as revenue loss?