Answer the question
In order to leave comments, you need to log in
How do providers do it?
According to the IPoE pseudo-protocol, we are given a dhcp address, but access to the Internet is made only after the mac-address of the equipment is bound. In this case, we observe that in the browser, when you go to any site, you are prompted to enter the username and password of the subscriber. The question is, how is it implemented?
Answer the question
In order to leave comments, you need to log in
At the beginning, when the IP is not authorized, all http requests from it are directed by the firewall to its web server, which issues an authorization page.
After authorization, the firewall is told to route normally.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question