Professional Documents
Culture Documents
3 Sputnik-Powered Devices
5 SputnikNet Express
19 SputnikNet Reports
20 Troubleshooting
Sputnik will email you login and password information so that you can start using your
new SputnikNet account.
Reinforce your brand experience with walled garden sites (web sites that can be viewed
before customers log in), welcome pages (pages that customers see after they log in),
session monitor windows (optional popup windows that display time online to users and
enable them to log out), and more.
For more detail about SputnikNet, see the product pages on Sputnik's web site.
SputnikNet pricing is based on the number of Sputnik-powered access points (APs) and
gateways managed on your network. Pricing for APs and gateways varies based upon
which Sputnik Agent firmware they run.
Choose "Standard" to enable both remote management of the router and user
authentication.
For more information about Sputnik Agent Modes, see the chapter entitled "Sputnik
Agent NMS, Standard, and Pro".
Choose "Pro" to enable both remote management of the router and user authentication.
For more information about Sputnik Agent Modes, see the chapter entitled "Sputnik
Agent NMS, Standard, and Pro".
"SputnikNet Express" uses Sputnik's free service for managing hotspots with branded,
click-through captive portal authentication. For more information about SputnikNet
Express, see the "SputnikNet Express" section.
For this example, we'll use Sputnik Instant Setup. Select it, then click "Apply Settings".
NOTE: Settings for Wifidog, Chilispot, HTTP Redirect and SMTP Redirect (if available)
do not apply to Sputnik, and for the purposes of this documentation, can be ignored.
For more information see the chapter entitled "Subscribing Sputnik-Powered Devices to
your SputnikNet Account with Sputnik Instant Setup".
Wait a few minutes to be sure that your Sputnik-powered device has successfully
registered with your SputnikNet Account.
"State" should show "Running normally - Managed". If it does, you're up and running.
However you can see basic information about the Sputnik Agent's state by clicking on
the "Sys-Info" tab.
Click on the "Hotspot" tab underneath the "Services" tab. Once you have successfully
subscribed your Sputnik-powered device to a SputnikNet Account, you'll see a new
"Use" field. Select it and enter the new SputnikNet Account ID. Click "Save".
NOTE: while it can be possible to download newer versions of DD-WRT firmware from
dd-wrt.com, we strongly recommend that you download from Sputnik's website, as those
versions are fully tested with Sputnik Agent firmware.
If flashing a stock Linksys router, connect to the Linksys control panel on the Sputnik-Powered device.
Associate with the Sputnik-powered device (router) either wired or wirelessly.
Browse to the DD-WRT control panel at http://192.168.180.1 (note: some older versions
use 192.168.1.1).
NOTE: if you see a message "Upgrade are failed" (sorry for the bad grammar, it doesn’t
come from us), you have hit the router's memory limit. In this case, repeat the above
process with DD-WRT mini firmware, and from there, flash again with Sputnik-Powered
DD-WRT firmware. You can obtain DD-WRT mini firmware from DD-WRT's web site, or
at this link (which is subject to change):
http://www.dd-wrt.com/dd-wrtv2/downloads/v24-sp1/Consumer/Linksys/WRT54GL_1.1/d
d-wrt.v24_mini_generic.bin.
"State" should show "Running normally - Managed". If it does, you're up and running.
NOTE: while it can be possible to download newer versions of DD-WRT firmware from
dd-wrt.com, we strongly recommend that you download from Sputnik's website, as those
versions are fully tested with Sputnik Agent firmware.
IMPORTANT: the cabling configuration for tftp flashing from Ubiquiti default firmware to
Sputnik-powered DD-WRT firmware is different from what it will be when you operate the
device as a Sputnik-powered AP.
> cd [path to the directory where you downloaded the Sputnik-powered firmware]
> tftp 192.168.1.20
tftp> binary
tftp> put NS2.dd-wrt.bin [or substitute the appropriate firmware file name]
Your terminal should show bytes being transferred, then return to a "tftp>" prompt.
tftp> q
That will quit tftp. Power cycle your device. Your Sputnik-powered firmware should now
be running.
Select Toolbox.
Click on the "Toolbox" tab next to the "Advanced Settings" tab.
- SputnikNet Express" uses Sputnik's free service for managing hotspots with branded,
click-through captive portal authentication. For more information about SputnikNet
Express, see the "SputnikNet Express" section.
Choose "Bridge" to enable remote management of the router (running in bridge mode)
only. (Elsewhere this is referred to as Sputnik Agent "NMS", for "Network Management
System" only.)
For this example, we'll use Sputnik Instant Setup and run the Sputnik Agent in standard
mode. Click "Save" to save your settings.
NOTE: if the Sputnik Instant Setup page does not appear, power cycle your router by
unplugging it and plugging it back in again.
For more information see the chapter entitled "Subscribing Sputnik-Powered Devices to
your SputnikNet Account with Sputnik Instant Setup".
Wait a few minutes to be sure that your Sputnik-powered device has successfully
registered with your SputnikNet Account.
"State" should show "Running normally - Managed". If it does, you're up and running.
Click on the "Toolbox" tab underneath the "Administrator Options" tab, then select
"Sputnik". Once you have successfully subscribed your Sputnik-powered device to a
SputnikNet Account, you'll see a new "Use" field. Select it and enter the new SputnikNet
Account ID. Click "Save".
Both wired and wireless network users are authenticated by the Sputnik 720, as its LAN and
WLAN interfaces are bridged together. When used as a network gateway, users connected to
third-party wireless hardware (in bridge mode) are routed through the Sputnik 720 for
authentication and tracking. Service providers can leave existing wired and wireless networks in
place--whether Wi-Fi, WiMAX, mesh, or other internet protocol networks--routing traffic through
the Sputnik 720 for management.
- the Ethernet 1 port on the left (next to the DC power port) is for LAN (local area
networking) and PoE (power over Ethernet) connections
- the Ethernet 2 port on the right is for WAN connections (wide area networking, or
broadband backhaul to the internet)
- default LAN IP address is 192.168.180.1; DHCP lease subnet is 192.168.180.x
- WAN is set up as a DHCP client
- AC power adapter plugs into the DC port on the Sputnik 720 (black cable in photo)
- optional LAN cable plugs into the LAN/PoE port on the Sputnik 720 (yellow cable)
- WAN cable goes from the WAN port on the Sputnik 720 to your broadband connection
(red cable)
Otherwise, sign up for SputnikNet, and make sure that you have an available
subscription for your Sputnik 720.
Each Sputnik 720 requires a Sputnik Agent Pro subscription (unless it's being used as a
bridge).
For more information, see the online documentation section titled "SputnikNet: Getting
Started".
To check the Sputnik Agent status, first associate with the Sputnik 720 wired or
wirelessly.
Log into the Sputnik-powered DD-WRT control panel on your Sputnik 720 as follows (if
your Sputnik 720 has already connected to your SputnikNet Account, you will need to log
in through its assigned captive portal, first):
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
Associate with your Sputnik 720 (wired or wirelessly), and open a browser. You should
be directed to the Sputnik Instant Setup page. Enter your SputnikNet ID to "subscribe"
your Sputnik 720 to SputnikNet or SputnikNet Express. For more information, refer to the
online documentation chapter titled "Subscribing Sputnik-Powered Devices to your
SputnikNet Account with Sputnik Instant Setup" or the section titled "SputnikNet
Express".
If you do not see the Sputnik Instant Setup page, refer to the "Troubleshooting" online
documentation chapter.
For more information, see the online documentation section titled "Device Management
with SputnikNet".
For more information, see the various online documentation sections on SputnikNet
Authentication Systems.
For more information, see the online documentation section titled "Branding Networks
with SputnikNet".
For more information, refer to the online documentation chapter titled "SputnikNet
Overview" and the "SputnikNet Network Policies" section.
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
For more detailed information about DD-WRT firmware, refer to the online
documentation posted at www.dd-wrt.com.
What's required.
The Sputnik 720 is a compact, rugged network gateway that, with the addition of up to
two optional 802.11a/b/g radios, becomes a managed wireless router. To add radios and
antennas to the Sputnik 720, you'll need:
Wired and wireless network users can be authenticated by the Sputnik-powered Linksys
device, as its LAN and WLAN interfaces are bridged together. When used as a network
gateway, end-users connected to third-party wireless hardware (in bridge mode) are
routed through the Sputnik-powered device for authentication. Service providers can
leave existing wired and wireless networks in place--whether Wi-Fi, WiMAX, mesh, or
other frequency--routing network traffic through the Sputnik-powered device for
authentication, tracking, and management.
After your Linksys device has been flashed with Sputnik-powered DD-WRT firmware, the
default port behavior will be:
-the RJ-45 Cat5 Ethernet port on the left is for WAN (wide area networking, or
broadband backhaul to the internet)
-the four Ethernet ports on the right are for LAN (local area networking) and PoE (power
over Ethernet)
- default LAN/WLAN IP address is 192.168.180.1; DHCP lease subnet is 192.168.180.x
- WAN is set up as a DHCP client
Otherwise, sign up for SputnikNet, and make sure that you have an available
subscription for your Sputnik-powered Linksys device.
For more information, see the online documentation section titled "SputnikNet: Getting
Started".
Check to see that the Sputnik Agent is running on your Sputnik-powered device.
While the Sputnik Agent should be running by default, it's a good idea to be sure it is
active, and communicating effectively with the Sputnik Instant Setup server (for more
information about Sputnik Instant Setup, see the next step).
To check the Sputnik Agent status, first associate with the Sputnik-powered device wired
or wirelessly.
Log into the Sputnik-powered DD-WRT control panel on your Sputnik-powered device as
follows (if your Sputnik-powered device has already connected to your SputnikNet
Account, you will need to log in through its assigned captive portal, first):
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
Subscribe your Sputnik-powered Linksys device to SputnikNet using Sputnik Instant Setup.
Associate with your Sputnik-powered Linksys device (wired or wirelessly), and subscribe
it to your SputnikNet or SputnikNet Express Account using Sputnik Instant Setup. For
more information, refer to the online documentation chapter titled "Subscribing
Sputnik-Powered Devices to your SputnikNet Account with Sputnik Instant Setup".
If you're using SputnikNet Express, see the chapters in the online documentation section
titled "SputnikNet Express".
For more information, see the online documentation chapter titled "Subscribing
Sputnik-Powered Devices to your SputnikNet Account with Sputnik Instant Setup".
For more information, refer to the online documentation chapter titled "SputnikNet
Overview".
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
Check out www.linksys.com for detailed information about the Linksys hardware.
For more detailed information about DD-WRT firmware, refer to the online
documentation posted at www.dd-wrt.com.
Wired and wireless network users can be authenticated by the Sputnik-powered Linksys
device, as its LAN and WLAN interfaces are bridged together. When used as a network
gateway, end-users connected to third-party wireless hardware (in bridge mode) are routed
through the Sputnik-powered device for authentication. Service providers can leave
existing wired and wireless networks in place--whether Wi-Fi, WiMAX, mesh, or other
frequency--routing network traffic through the Sputnik-powered device for authentication,
tracking, and management.
After your NexConnect has been flashed with Sputnik-powered firmware, the default port
behavior will be:
- the RJ-45 Cat5 Ethernet port on the left is for WAN (wide area networking, or
broadband backhaul to the internet - this is optional, as the NexConnect can get its
backhaul via cellular 3G)
- the Ethernet port on the right is for LAN (local area networking) and PoE (power over
Ethernet)
- default LAN/WLAN IP address is 192.168.123.254; DHCP lease subnet is 192.168.123.x
- WAN is set up as a DHCP client
Otherwise, sign up for SputnikNet, and make sure that you have an available
subscription for your Sputnik-powered NexConnect.
For more information, see the online documentation section titled "SputnikNet: Getting
Started".
Check to see that the Sputnik Agent is running on your Sputnik-powered NexConnect.
While the Sputnik Agent should be running by default, it's a good idea to be sure it is
active, and communicating effectively with the Sputnik Instant Setup server (for more
information about Sputnik Instant Setup, see the next step).
To check the Sputnik Agent status, first associate with the Sputnik-powered NexConnect
wired or wirelessly.
Log into the control panel on your Sputnik-powered NexConnect as follows (if your
NexAira device has already connected to your SputnikNet Account, you will need to log
in through its assigned captive portal, first):
If you're using SputnikNet Express, see the chapters in the online documentation section
titled "SputnikNet Express".
For more information, see the online documentation chapter titled "Subscribing
Sputnik-Powered Devices to your SputnikNet Account with Sputnik Instant Setup".
For more information, refer to the online documentation chapter titled "SputnikNet
Overview".
Check out www.nexaira.com for detailed information about the NexConnect hardware.
Used with Sputnik-powered DD-WRT firmware and SputnikNet, the Ubiquiti NanoStation
becomes an easy-to-deploy Wi-Fi access point for access-controlled networks such as
hotspots or hotzones.
IMPORTANT: the cabling configuration for tftp flashing from Ubiquiti default firmware to
Sputnik-powered DD-WRT firmware is different from what it will be when you operate the
device as a Sputnik-powered AP.
Select "Basic Setup" under the "Setup" menu. For WAN Connection Type, change from
"Disabled" to "Automatic Configuration - DHCP". Click "Apply Settings" at the bottom of
the screen (not shown).
-the RJ-45 Ethernet port on the left is for WAN (wide area networking) and PoE (power
over Ethernet)
-the SMA port on the right is for attaching an optional external antenna
- default WLAN IP address is 192.168.180.1; DHCP lease subnet is 192.168.180.x
- WAN is set up as a DHCP client
Otherwise, sign up for SputnikNet, and make sure that you have an available
subscription for your Sputnik-powered Ubiquiti device.
For more information, see the online documentation section titled "SputnikNet: Getting
Check to see that the Sputnik Agent is running on your Sputnik-powered device.
While the Sputnik Agent should be running by default, it's a good idea to be sure it is
active, and communicating effectively with the Sputnik Instant Setup server (for more
information about Sputnik Instant Setup, see the next step).
To check the Sputnik Agent status, first associate with the Sputnik-powered device wired
or wirelessly.
Log into the Sputnik-powered DD-WRT control panel on your Sputnik-powered device as
follows (if your Sputnik-powered device has already connected to your SputnikNet
Account, you will need to log in through its assigned captive portal, first):
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
Associate with your Ubiquiti device (wired or wirelessly), and open a browser. You
should be directed to the Sputnik Instant Setup page. Enter your SputnikNet ID to
"subscribe" your Ubiquiti device to SputnikNet or SputnikNet Express. For more
information, refer to the online documentation chapter titled "Subscribing
Sputnik-Powered Devices to your SputnikNet Account with Sputnik Instant Setup" or the
section titled "SputnikNet Express".
If you do not see the Sputnik Instant Setup page, refer to the "Troubleshooting" online
documentation chapter.
For more information, see the online documentation chapter titled "Subscribing
Sputnik-Powered Devices to your SputnikNet Account with Sputnik Instant Setup".
For more information, see the various online documentation sections on SputnikNet
Authentication Systems.
For more information, see the online documentation section titled "Branding Networks
with SputnikNet".
For more information, refer to the online documentation chapter titled "SputnikNet
Overview" and the "SputnikNet Network Policies" section.
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
Check out www.ubnt.com for detailed information about the Ubiquiti PowerStation
hardware.
For more detailed information about DD-WRT firmware, refer to the online
documentation posted at www.dd-wrt.com.
Both wired and wireless network users are authenticated by the Sputnik-powered
Ubiquiti device, as its LAN and WLAN interfaces are bridged together. When used as a
network gateway, users connected to third-party wireless hardware (in bridge mode) are
routed through the Ubiquiti device for authentication and tracking. Service providers can
leave existing wired and wireless networks in place--whether Wi-Fi, WiMAX, mesh, or
other internet protocol networks--routing traffic through the Sputnik-powered Ubiquiti
device for management.
IMPORTANT: the cabling configuration for tftp flashing from Ubiquiti default firmware to
Sputnik-powered DD-WRT firmware is different from what it will be when you operate the
device as a Sputnik-powered AP.
-the RJ-45 Cat5 Ethernet port on the left is for LAN (local area networking) and PoE
(power over Ethernet)
-the Ethernet port on the right is for WAN (wide area networking, or broadband backhaul
to the internet)
- default LAN/WLAN IP address is 192.168.180.1; DHCP lease subnet is 192.168.180.x
- WAN is set up as a DHCP client
- AC power goes into the supplied PoE adapter (black cable in photo)
- LAN cable goes from the PoE port on the PoE adapter to the LAN/PoE port on the back
of the Ubiquiti device (green cable in the photo)
- optional second LAN cable goes from LAN port on the PoE adapter to devices on your
local network (PCs, printers, etc.) (yellow cable in the photo)
- WAN cable goes from the WAN port on the back of the Ubiquiti device to your
broadband connection (red cable in the photo)
Otherwise, sign up for SputnikNet, and make sure that you have an available
subscription for your Sputnik-powered Ubiquiti device.
For more information, see the online documentation section titled "SputnikNet: Getting
Started".
To check the Sputnik Agent status, first associate with the Sputnik-powered device wired
or wirelessly.
Log into the Sputnik-powered DD-WRT control panel on your Sputnik-powered device as
follows (if your Sputnik-powered device has already connected to your SputnikNet
Account, you will need to log in through its assigned captive portal, first):
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
Associate with your Ubiquiti device (wired or wirelessly), and open a browser. You
should be directed to the Sputnik Instant Setup page. Enter your SputnikNet ID to
"subscribe" your Ubiquiti device to SputnikNet or SputnikNet Express. For more
information, refer to the online documentation chapter titled "Subscribing
Sputnik-Powered Devices to your SputnikNet Account with Sputnik Instant Setup" or the
section titled "SputnikNet Express".
If you do not see the Sputnik Instant Setup page, refer to the "Troubleshooting" online
documentation chapter.
For more information, see the online documentation chapter titled "Subscribing
Sputnik-Powered Devices to your SputnikNet Account with Sputnik Instant Setup".
For more information, see the various online documentation sections on SputnikNet
Authentication Systems.
For more information, see the online documentation section titled "Branding Networks
with SputnikNet".
For more information, refer to the online documentation chapter titled "SputnikNet
Overview" and the "SputnikNet Network Policies" section.
For more information about the Sputnik-powered DD-WRT control panel, see the online
documentation chapter titled "Using Sputnik-Powered DD-WRT Firmware".
Check out www.ubnt.com for detailed information about the Ubiquiti PowerStation
hardware.
For more detailed information about DD-WRT firmware, refer to the online
documentation posted at www.dd-wrt.com.
WDS is a useful and often very stable way to increase the range of your wireless
network. We have found, however, that sometimes different manufacturers implement
WDS differently, and their devices are not compatible. It is therefore important to test
heterogeneous hardware for WDS compatibility before deploying in the field. Also, while
you can create multiple WDS links, because they are overhead, we suggest that you
limit them to no more than 2-4 per Sputnik-powered device.
In the following example, we'll show how to set up WDS between two Sputnik-powered
devices running DD-WRT firmware. The main Sputnik-powered device has the Sputnik
Agent enabled (for communication with SputnikNet); on the range extender the Sputnik
Agent is disabled.
Select "LAN" from the first pop-up menu under "Wireless MAC".
IMPORTANT: take note of the main Sputnik-powered device's MAC address. It appears
at the top of the page, across from "Wireless MAC".
Take note of the range extender's IP address in case you need to connect to its
web-based control panel in the future, In this example, it will be at http://192.168.180.200.
Under "Network Address Server Settings (DHCP)" click the DHCP Server "Disable" radio
button. Click the "Save" button at the bottom of the screen (not shown). Your connection
to the range extender's control panel will be disrupted.
Associate with your Sputnik-powered device, log into its web-based control panel, and
browse to the Sputnik Agent setup page. For more specific information, see the
appropriate chapter for your device in the section titled: "Sputnik Agent Firmware and
Sputnik-Powered Devices".
Click "Apply Settings" to start the Sputnik Agent with these values.
NOTE: Settings for Wifidog, Chilispot, HTTP Redirect and SMTP Redirect (if available)
do not apply to Sputnik, and for the purposes of this documentation, can be ignored.
Click "Continue".
Click "Continue".
NOTE: if the window doesn't refresh in 10 seconds, click on the "here" link. If you return
to the Default Password page, you may need to set a unique password manually using
your Sputnik-powered device's control panel. To do this, unplug your device's WAN
connection so that you can browse to the local control panel without being redirected to
SputnikNet Express.
- Network Name: the SSID or broadcast name that clients use to connect to your
network.
- Block Private Networks: blocks public access to your private network of computers,
printers, or other devices. For more information, see the chapter titled "Blocking Private
Networks".
- AP Owner E-Mail: the email we will use to validate your account, and to (very
infrequently) update you about SputnikNet Express.
- Address/Address 2/Country: the location of the Sputnik-powered device, used to locate
your hotspot in Google Maps, Yahoo Maps, or MSN Maps
- Time Zone: the time zone where your Sputnik-powered device is located, used to set
the time in bandwidth charges and usage stats
Click "Update".
NOTE: you won't receive this email until you complete your setup of SputnikNet Express.
Until then, full internet access is blocked.
- the splash page is the click-through page that users first see when they access the
internet through your Sputnik-powered device; it includes your brand
- the welcome page is the page that users see after they click through the splash page; it
contains your brand, content pulled from a Google, MSN, Yahoo! or Sputnik theme
(whichever you choose), and advertising
- Venue Name: the title that will appear on your splash and welcome pages.
- Venue Type: the type of venue where the Sputnik-powered device is installed. There
are over 100 possible venue types; try to pick the one that matches best. Venue
information is used, along with location information, to insert ads into the welcome page.
- Portal Theme: select Google, MSN, Yahoo! or Sputnik to define the theme for your
welcome page.
Click "Choose File" to select locally stored graphics for your splash and welcome pages.
Click "Update" to apply your changes to your splash and welcome pages.
For more information and to see what SputnikNet Express splash and welcome pages
look like, see "User Experience: SputnikNet Express Splash and Welcome Page
Themes".
A device's "MAC" address is 12 numbers and letters usually separated by colons (e.g.
00:14:bf:aa:02:3c). It can be found printed on your wireless card, on the back of the
wireless device or can be viewed from a configuration menu on the device.
Add a device's MAC address and give it a name. Click "Update" for your changes to be
applied.
To remove a device from the list, erase its MAC address and click "Update".
Terminate sessions.
If you notice recurring bandwidth hogs, you can terminate their sessions remotely. Check
the box next to the appropriate client and click "Terminate Selected Sessions".
If you need better reporting capability, check out what SputnikNet can do in the section
titled "SputnikNet Reports".
- the splash page is the click-through page that users first see when they access the
internet through your Sputnik-powered device; it includes your brand
- the welcome page is the page that users see after they click through the splash page; it
contains your brand, content pulled from a Google, MSN, Yahoo! or Sputnik theme
(whichever you choose), and advertising
- Venue Name: the title that will appear on your splash and welcome pages.
- Venue Type: the type of venue where the Sputnik-powered device is installed. There
are over 100 possible venue types; try to pick the one that matches best. Venue
information is used, along with location information, to insert ads into the welcome page.
- Portal Theme: select Google, MSN, Yahoo! or Sputnik to define the theme for your
welcome page.
Splash page graphics should be no larger than 640x480 pixels. Welcome page graphics
should be no larger than 300x125 pixels.
If you need more control over captive portal pages, check out SputnikNet's capabilities in
the section titled "Branding Networks with SputnikNet".
The Google page theme includes a map of your location and location-aware links for:
- Weather
- Movies
- Local search
SputnikNet Express welcome pages show advertising from our sponsors. If you want to
control and monetize advertising on your site, see "Advertising with SputnikNet".
Location-aware weather.
For example, if the user clicks on the "Weather" link, they'll see a Google search result
for a weather forecast for your region.
SputnikNet Express welcome pages show advertising from our sponsors. If you want to
control and monetize advertising on your site, see "Advertising with SputnikNet".
- Weather
- Movies
- Local search
SputnikNet Express welcome pages show advertising from our sponsors. If you want to
control and monetize advertising on your site, see "Advertising with SputnikNet".
SputnikNet Express welcome pages show advertising from our sponsors. If you want to
control and monetize advertising on your site, see "Advertising with SputnikNet".
- https://express.sputnik.com/sne/express/MAC/main
where MAC is your Sputnik-powered device's MAC address with the colons removed, all
lower case.
To do this, hold the device's reset button in for 10 seconds. Re-associate with your
Sputnik-powered device and browse to your SputnikNet Express Account home page. (If
you see your SputnikNet Express splash page, click through to log into the internet.)
You will be prompted to log in. Enter the default password (typically, "admin).
To restart the Sputnik Agent, log into your Sputnik-powered device's control panel (using
the default username and password), browse to the appropriate page, click "Enable"
next to the Sputnik Agent, and apply settings. For more information, see the appropriate
chapter for your device in the section titled "Sputnik Agent Firmware and
Sputnik-Powered Devices".
SputnikNet Starter Kits include (1) a SputnikNet Account set-up, (2) a monthly or annual
pre-paid SputnikNet subscription, and, (3 - optional) a Sputnik-powered device.
SputnikNet subscriptions are either standard or pro, depending upon the device.
Intel-class devices such as the Sputnik 720 require a pro subscription; all other devices
require a standard subscription.
Need to add Sputnik-powered devices? You can purchase additional devices from our
online store, or through our partners, such as Streakwave.
Need to add SputnikNet subscriptions for those devices? Add those directly from
SputnikNet. See the online chapter titled: "Adding Sputnik-Powered Device
Subscriptions to your SputnikNet Account".
If the name chosen is not unique, we will contact you for an alternative.
IMPORTANT: Save the email in a safe place as it includes your account name, URL,
and password.
See "Configuring and Managing Sputnik-Powered Devices" for more information about
these features.
- Clicking on "client sessions" displays currently active user sessions across all active
Sputnik-Powered devices
- Clicking on "View more client stats" displays all active and inactive user sessions
across all Sputnik-Powered devices
- Captive Portal "View All" link displays the Captive Portal list. For more information
about this topic, see "Branding your Wi-Fi Network with Captive Portals".
- Network Policy "View All" link displays the Network Policy list. For more information,
see "SputnikNet Network Policies".
- Router "View All" link displays the complete list of Sputnik-Powered devices. For more
information, see "Managing Sputnik-Powered Devices with SputnikNet".
- Session "View All" link displays all active and inactive user sessions across all
Sputnik-Powered devices See "SputnikNet Reports" for more information.
Log into your SputnikNet Account and select "Change Password" from the CONFIG menu.
Type in a new password and re-enter it to make sure there are no typos.
Log into SputnikNet, then select Control Center under the CONFIG menu.
To configure SputnikNet Account options, select "Control Center" from the "CONFIG" menu.
The primary site contact email corresponds to your Sputnik online store account login. If
you need to change it, submit a support request by clicking on "Report a Bug" in the
upper right corner of the page.
If you would like the primary site contact to receive infrequent Sputniknet emails (usually
about software updates), make sure that the "SputnikNet Mailing List" box is checked.
If you would like the site administrator to receive emails if Sputnik-Powered devices
(routers) become inactive, select the checkbox next to "Send Router Inactive E-mails".
NOTE: if a different email is assigned to a particular Sputnik-Powered device, that email
will be used by default. The Site Contact email is used as a backup if a router has no
other email assigned to it.
For accounting purposes, user sessions end when they are terminated, either by the
user via the Session Monitor Window, or by idle timeout.
Note that the idle timeout value should be lower than the Sputnik-Powered device's
DHCP lease period in order to be effective (for devices that utilize DHCP). This is
because a DHCP lease renewal generates network traffic and restarts the idle timeout
clock.
- Retain until AP/Router returns: user sessions will continue after the Sputnik-Powered
device reconnects with SputnikNet
- Terminate after DHCP lease expires: user sessions will be terminated at DHCP lease
Enter the number of Sputnik Agent NMS, Standard, and Pro Subscriptions you wish to assign to your account.
As your network expands or changes, you can increase or decrease the number of
Sputnik-Powered devices subscribed to your SputnikNet Account.
For more information about SputnikNet Subscription levels, see "Sputnik Agent NMS,
Standard, and Pro".
Select users.
Click "Users" in the authentication system main menu.
Log into your SputnikNet Account, then select Control Center under the CONFIG menu.
To configure SputnikNet Account options, select "Control Center" from the "CONFIG" menu.
For more information about SputnikNet Subscription levels, see "Sputnik Agent NMS,
Standard, and Pro"
Unfortunately, the Sputnik Instant Setup server doesn't know whether the ID is valid or not,
and the invalid entry sticks in our database. This renders your Sputnik-Powered device
useless until we reset it to a valid SputnikNet ID.
To recover from this error see "Changing or Correcting your Device's SputnikNet
Subscription".
Check to see that your Sputnik-powered device connects to your SputnikNet Account.
Log in to your SputnikNet Account and look for the Sputnik-powered device to show up on the Router List.
NOTE: If you're using SputnikNet Express, you'll be redirected to the SputnikNet Express configuration pages automatically. See "Creating a new SputnikNet
Express Account" for more information.
Unfortunately, the Sputnik Instant Setup server doesn't know whether the ID is valid or
not, and the invalid entry sticks in our database. This renders your Sputnik-Powered
device useless until we reset it to a valid SputnikNet ID.
IMPORTANT: take note of the AP MAC Address, shown on this page, as you'll need it to
subscribe your Sputnik-powered device to a valid SputnikNet Account.
Gaining Internet access through the Sputnik-powered device until it is re-subscribed to the appropriate server.
This and the next two steps describe how you can open the Sputnik-powered device until your able to correct or change its subscription settings. This involves
disconnecting the Sputnik-powered device from the Internet, disabling the Sputnik Agent, and then using the device as an open AP.
First, disconnect the Sputnik-powered device from the Internet by unplugging the ethernet cable from its WAN (or "Internet") port. Then power cycle the device.
For example, using DD-WRT firmware, select "Disable" next to "Sputnik Agent" and click
"Apply Settings".
Also, be sure to include the name of the SputnikNet site that you want to subscribe the
device to.
Log into SputnikNet, then select Routers under the CONFIG menu.
To configure Sputnik-powered devices, select "Routers" from the "CONFIG" menu.
- Active Since: most recent date/time that the Sputnik-powered device went active
- Sessions: the number of user sessions, if any, that are active on the device
- Location: brief description of where the Sputnik-powered device is located
- Contact: name of the contact person for the device
- Provisioned: date/time that the Sputnik-powered device was first provisioned
- MAC: LAN MAC address of the Sputnik-powered device
- Firmware Version: version of Sputnik Agent software running on the device (if a more
recent version exists, there will be a "Reflash" button on the upper right of the page)
- SSID: the name of the device's wireless network
- Channel: wireless channel on which the Sputnik-powered device is transmitting/receiving
- Interfaces: WAN (wide area network - route to internet) and LAN/WLAN (local area
network/wireless local area network - IP addresses served to clients via DHCP) - the
latter are bridged if there are LAN ports, otherwise just WLAN
NOTE: searches are case-sensitive (e.g. "Foo" is different from "foo"). The wild-card %
can stand for one or more alphanumeric characters.
- Router Name: the name of the Sputnik-powered device that is displayed in SputnikNet
(ignore the "Lock Name?" checkbox as it is not supported by current routers)
- Admin Contact: the name of the administrative contact and his or her email address (if
not supplied, the default email address for the SputnikNet Account is used)
- Location (brief): a brief description of the Sputnik-powered device that is displayed in
SputnikNet
- Venue type: more on that, below
- Address: street address of the Sputnik-powered device
- SSID: the name of the device's wireless network
- Power: ignore this setting; instead, use the power setting in the device's built-in web
management interface
- Portal: the name of the captive portal assigned to the Sputnik-powered device
For more information about captive portals, see "Branding your Wi-Fi Network with
Captive Portals".
Venue information is used, along with location information, to insert ads into the user experience
when using SputnikNet advertising functions. For more information, see "Advertising with SputnikNet
(Beta)".
- Network Policies inherited from the captive portal applied to the device
- Walled Garden Policies, typically applied directly to the device
- Additional Network Policies inherited from authentication systems applied to the device
For more information about policies and walled gardens, see "SputnikNet Network
Policies".
Log into SputnikNet, then select Routers under the CONFIG menu.
To configure Sputnik-powered devices, select "Routers" from the "CONFIG" menu.
If the ping is successful, the button will briefly flash green, stating "ALIVE", then the ping
time in seconds. An unsuccessful ping indicates that there is a network problem
somewhere between the Sputnik-powered device and the SputnikNet server. See
"Troubleshooting" for networking tips.
If the ping is successful, the button will briefly flash green, stating "ALIVE", then the ping
time in seconds.
Log into SputnikNet, then select Routers under the CONFIG menu.
To configure Sputnik-powered devices, select "Routers" from the "CONFIG" menu.
Typically the only type of network policy applied directly to Sputnik-powered devices are
port forwarding rules, which could, for example, enable you to remotely log into the web
management interface of a device (say a security camera) on the Sputnik wireless local
area network.
For more information about network policies, see "SputnikNet Network Policies".
- Quality of Service (QoS) management enables you to stop users running common P2P applications from abusing your bandwidth
- Bandwidth throttling enables you to cap the total amount of bandwidth used by your Sputnik-Powered device, useful if it is part of
a larger network
SputnikNet enables you to utilize these features on Sputnik-powered devices using Sputnik-powered DD-WRT firmware running
Sputnik Agent version 3.3.6.2 or higher. To turn on QoS/Throttling for selected Sputnik-powered devices on your network, log into
SputnikNet and select "Routers".
You can also choose whether or not to view the results of the command. Click the "No"
button next to "Output?" if you do not want to see results. You would do this, for
example, to send a "reboot" command to the Sputnik-powered device; otherwise your
browser would get stuck waiting for results that the device would not return.
- DHCP Config: tells you how many DHCP leases you have, how long they are valid for,
how many clients the router will support
- DHCP Clients: lists active DHCP leases
- DHCP Configs: similar to DHCP Config, but provides raw values, more data
- Dynamic DNS config: parameters used for dynamic DNS registration
- Dynamic DNS log: latest results of dynamic DNS registration
- WAN Details: WAN interface configuration settings
- LAN Details: LAN interface configuration settings
- Custom DDNS Details: similar to Dynamic DNS config, but provides raw values, more
data
- All DDNS Details: same as above, but for all Dynamic DNS settings, not just custom
- Interface Details: shows IP addresses assigned to various interfaces on the
Sputnik-powered device
- Uptime (chosen in this example): how long the device has been up and load averages
- Hosts File: lists entries in Sputnik-powered device's host database (IP addresses and
domain names)
- Hostname: Sputnik-powered device hostname
- Iptables List: firewall rules
- Iptables List No Lookup: firewall rules listed as IP addresses, not domain names
- Iptables NAT: firewall NAT listing
- Iptables NAT No Lookup: firewall NAT listing shown as IP addresses, not domain names
- Iptables MANGLE: firewall mangle listing
- Iptables MANGLE No Lookup: firewall mangle listing shown as IP addresses, not
domain names
- Iptables FILTER No Lookup: firewall filter listing
- NVRAM Show All Sorted: show all Sputnik-powered device settings
- NVRAM Show Sputnik: show all Sputnik Agent configuration settings
Please note: while not required when creating your OpenDNS account, later on you will
need to log into OpenDNS from the same network where you'll be hosting your first
Sputnik-powered device. The reason is that, when you configure your first OpenDNS
network settings, your session's IP address will need to match the network IP that you
are managing.
You can customize the page's logo as we did here with the Sputnik logo. Simply follow
instructions on www.opendns.com to customize your blocked/error page settings. The
search widget and results cannot be replaced however, as they support OpenDNS'
business model-- remember, the service is free.
There is no cost to do this. However, you do need to apply for Nomad status with
OpenDNS. To do this, send an email to nomad at opendns dot com (spelled out to
discourage spam crawlers). The folks at OpenDNS will get back to you about your
account status.
Log into SputnikNet, then select Captive Portals under the CONFIG menu.
To create or modify captive portals, select "Captive Portals" from the "CONFIG" menu.
Note that you can quickly jump to an existing captive portal's assigned router(s) and
authentication system(s) from this page.
- Use (insecure) HTTP: this option is hardly ever used, because it isn't secure. Select it if
you are running your own server (SputnikNet On Site), and don't have an SSL certificate
installed (though we highly recommend you use SSL). Selecting this option means that
user login credentials could be intercepted by a hacker on the wireless network.
- Redirect UR: if supplied, the user will be redirected to this web site after logging in.
- Append session information: this is used in conjunction with the redirect URL. If
selected, session information is appended to the redirect URL. This is used if the site
being redirected to is logging session information.
Click on the name of your new captive portal to continue editing it.
Captive portals are web pages written in HTML, CSS and JavaScript. However,
SputnikNet adds a few additional tags:
- [login] is where the authentication system(s) applied to the captive portal will place a
login form (e.g. the username/password fields, or )
- [style] and [/style] are required to include CSS definitions
- [javascript] and [/javascript] are required to include JavaScript code
None of these additional tags are required. However, if the [login] tag is omitted, the
login form will appear at the bottom of the captive portal page. For more information
about using CSS and JavaScript, see "Advanced Captive Portal Techniques".
The default portal content field illustrates basic HTML, contains an image and login form.
All of these can be modified as needed.
Click the thumbnail of the image you want to add. A reference to the image (i.e. an
<img> tag) will be added at the insertion point. Any selected text will be replaced with the
image reference.
You can iterate the design of the captive portal until you get it exactly right.
In this case, we will assign "Joe's Java Guest" authentication system, and "Allow to
www.joesveryfinecafe.com" walled garden.
The former will place the "Joe's Java Guest" authentication system first (if you have
multiple authentication systems), where the [login] tag appears in the captive portal
content.
The latter adds the sites defined by www.joesveryfinecafe.com to your captive portal's
walled garden. If a user clicks on the link in "Please view our breakfast or lunch menu"
(see above) they will be able to browse walled garden sites, for example, to see the
menu of the day.
In this case, we assign the "Joe's Cafe PayPal" authentication system as the second
option.
In this case, the user can surf for a half hour for free using a guest authentication
system. After that time has expired, she will be required to pay for access using a
PayPal/credit card authentication system.
Log into SputnikNet, then select Captive Portals under the CONFIG menu.
You have full control over the HTML used in captive portal pages, and can use advanced techniques such as CSS, JavaScript, and
Adobe Flash to build extremely sophisticated designs. Here's we'll create a captive portal that utilizes all of these options.
To create or modify captive portals, select "Captive Portals" from the "CONFIG" menu.
Here is the complete captive portal HTML previewed above. We've created an asterisk ("all") CSS selector
to apply styles-- in this case, a dark blue background and white text-- to everything in the captive portal.
[style]
*{
background-color: #071f31;
color: white;
}
[/style]
[login]
For more details on walled garden policies, see online documentation chapter titled "
Branding using Walled Gardens and Redirects".
img#mandan {
position: absolute;
top: 100px;
left: 580px;
}
The following HTML can go anywhere in the content below the closing [/style] tag:
<div align="center">
<table border=0">
<tr>
<td width="200" ><img src="/sputnik/pc/14/36" alt="mandan-tix.png" align="right"></td>
<td width="60"> </td>
<td width="400">[login]</td>
<td><img src="/sputnik/pc/14/34" alt="bareback-horse-rider.png"></td>
</tr>
</table>
</div>
NOTE: since some authentication systems don't include all of these classes, it's a good
idea to use your browser to "view source" of the captive portal under construction. For
example, the guest authentication system doesn't use the "login_submit" class for the
login button, but you can select the element based on input type, as shown below:
p.greeting {
font: normal x-large Georgia, "Times New Roman", Times, serif;
text-align: center;
}
.login_form {
font: large "Lucida Grande", Lucida, Verdana, sans-serif;
}
input[type="button"],input[type="submit"] {
font: small-caps xx-large Georgia, "Times New Roman", Times, serif;
color: white;
background-color: #369;
You have full control over the branding of your captive portal and can create any kind of
customer experience you desire.
input[type="text"] {
font: bold x-large "Lucida Grande", Lucida, Verdana, sans-serif;
padding:3px;
color: yellow;
}
input[type="button"],input[type="submit"]:hover {
font: small-caps xx-large Georgia, "Times New Roman", Times, serif;
color: #369;
background-color: yellow;
}
If you want the welcome page to remain after the user logs in, set the value to 0. This
blocks automatic redirect to the Internet, which means that the page remains in the users
browser. The user can return to the page if they need to pop up a session monitor
window, for example to see their time online, or to log out. The user can also click on the
link embedded in the welcome page to go to their intended page; doing so will spawn a
new window so that the welcome page remains available to them.
Log into your SputnikNet Account and choose "Captive Portals" from the "CONFIG" menu.
Paste the logo graphic path into the "Session Monitor Logo" field.
Paste the path to the logo graphic in the "Session Monitor Logo" field.
Log into SputnikNet, then select Network Policies from the CONFIG menu.
Walled gardens are internet domains that users can access before they log in. Redirects send the user to a specific web site after
they log in. Both present opportunities to put information about your products or services in front of the customer surfs the wider
internet.
Walled gardens are "allow/accept" policies that are applied to captive portals because they take effect before the user
authenticates. To start creating a new Walled Garden, click on "Network Policies".
You'll see a list of available walled gardens. (In this example, there is only one.) Check
the box next to the walled garden you created, and click "Update".
To create a redirect rule, select "Settings" in the "Captive Portal Properties" menu. Enter
the web destination in the "Redirect URL" field. This time the "http://www" is needed.
Click "Save Settings".
Check "Allow Duplicate Logins" if you want multiple users to be able to log in with the
same credentials at the same time. If not checked, older sessions will terminate when a
new login with the same credentials occurs.
Check "Display warning about popup" to show a message to users warning them not to
close the popup window, which they can use to track their time online and to terminate
their session.
Popup warning.
Here is a sample of what the popup warning looks like. It is not editable.
Both enable codes that can be shared by multiple users (Guest example).
You can enable guest authentication codes to be shared by multiple users.
IMPORTANT: use the percent (%) symbol as a wild-card character to enclose the string
you are searching for. For example, if you want to find all of the codes that include "VB",
your search would be "%VB%. Searches are case sensitive.
If you need to delete an access code, select it, then click "Delete Selected Codes".
- access code
- valid from time in the format mm/dd/yy hh:mm:ss
- expire time in the format mm/dd/yy hh:mm:ss
Design your captive portal to pull content from the sponsor's web site.
Here we've added a simple HTML src tag to pull an image from the sponsor's web site.
Any time the sponsor changes the image, the captive portal will update automatically.
Select "Captive Portals" from the CONFIG menu, then click the "Add New Captive Portal" to do just that.
This captive portal will never be seen, so there is no reason to edit its content.
Apply the guest authentication system to the captive portal, then apply the captive portal to Sputnik-powered devices.
Apply the guest authentication system to the captive portal, then apply your captive
portal to one or more Sputnik-powered devices ("routers"). Test your authentication by
associating with the router. You will be logged in automatically.
Don't worry though, your SputnikNet site is still reachable. Simply enter its address into
your browser, log in, and modify authentication settings to restore your network access.
For example, you could create a new device-based authentication system that allows the
MAC address of your computer, and then apply it to the Sputnik-powered device you're
associated with. From then on, you'll bypass the captive portal page and log onto the
internet directly from that location.
If basic QoS management and bandwidth throttling is available for that Sputnik-powered
device, you will see a "QoS/Throttling" checkbox.
For more information, see the online documentation chapter titled "Quality of Service
(QoS) and Bandwidth Limits".
Log into SputnikNet, then navigate to the prepaid authentication system overview.
Log into SputnikNet, then click on "Prepaid" from the Authentication menu.
Note:
- "Continuous" starts the clock when the user first logs in; the clock keeps ticking
continuously until the account time limit is used up regardless of whether the user is
logged in or not
- "Discontinuous" starts the clock when the user first logs in; the clock ticks only when
the user is logged in (has an active session); the account is valid until the account time
limit is used up
- if you set both time and bandwidth limits, the account will expire when either the time or
maximum bandwidth is used up, whichever comes first
- set the bandwidth limit as 0 if you want only time limits to apply
To create prepaid cards in SputnikNet, click "Edit Settings" from the Prepaid
Authentication System menu. Fill out the fields under "Generate Paid Cards" as follows:
- Name for this batch: a unique name for the set of generated prepaid cards that will be
displayed in SputnikNet, and can be used for searching, managing, and downloading
cards
- Username prefix: text that is appended to the beginning of each user ID code
- Starting suffix number: starting number for this batch of prepaid cards, which will be
incremented for each new card
- Number of accounts to create: the number of cards in the new batch
- Number of minutes for each account: the amount of network access time allowed by
the prepaid card
- Amount of upload + download bandwidth allowed for each account, in megabytes
- Continuous/discontinuous: see above
Click "Continue" to save your prepaid cards in SputnikNet. If you do not want to do this,
click on a different link on the page.
- choose a batch from which you will delete one or more cards
- filter by username
- confirm that you want to delete the entire batch (also leave username field blank)
Note:
- "Continuous" starts the clock when the user first logs in; the clock keeps ticking
continuously until the account time limit is used up regardless of whether the user is
logged in or not
- "Discontinuous" starts the clock when the user first logs in; the clock ticks only when
the user is logged in (has an active session); the account is valid until the account time
limit is used up
- if you set both time and bandwidth limits, the account will expire when either the time or
maximum bandwidth is used up, whichever comes first
- set the bandwidth limit as 0 if you want only time limits to apply
- maximum total bandwidth setting is approximately ten exabytes (ten trillion megabytes)
- site code - use if you want to assign prepaid cards to a specific site
- login id - must be unique
- password - should be unique and random - here, left blank for now
- amount of time in minutes - here, 1440 translates to 1 day)
- total bandwidth in megabytes (optional)
- Give your batch a unique name. This name will be displayed in the SputnikNet
administrative interface, and can be used for searching, managing, and downloading
codes.
- Choose the CSV file you created previously.
- Select whether the time should be continuous or discontinuous.
- batch code
- site code
- unique code (login ID)
- password (paste random codes here)
- amount of time in minutes (these are 2 hour cards)
Save your spreadsheet as a CSV file. Important (for Macintosh users): be sure to select
"Windows Comma Separated (.csv)" as both a carriage return and linefeed are required
at the end of each row.
Log into SputnikNet, then navigate to the prepaid authentication system overview.
Log into SputnikNet, then click on "Prepaid" from the Authentication menu.
NOTE: ignore the "M_" string. It simply indicates that the field is a number, and will not
print.
You can have multiple rate plans that you apply to different network locations, of course.
And you can change prices at any time to run specials.
Accounts expire when time or bandwidth limits are reached, whichever comes first.
Maximum bandwidth includes upload plus download. One megabyte equals 2^20 or
1,048,576 bytes.
Note:
- "Continuous" starts the clock when the user first logs in; the clock keeps ticking
continuously until the account time limit is used up regardless of whether the user is
logged in or not
- "Discontinuous" starts the clock when the user first logs in; the clock ticks only when
the user is logged in (has an active session); the account is valid until the account time
limit is used up
- if you set both time and bandwidth limits, the account will expire when either the time or
maximum bandwidth is used up, whichever comes first
- set the bandwidth limit as 0 if you want only time limits to apply
- maximum total bandwidth setting is approximately ten exabytes (ten trillion megabytes)
To create prepaid cards in SputnikNet, click "Edit Settings" from the Prepaid
Authentication System menu. Fill out the fields under "Generate Paid Cards" as follows:
- Name for this batch: a unique name for the set of generated prepaid cards that will be
displayed in SputnikNet, and can be used for searching, managing, and downloading
cards
Apply the prepaid authentication system to captive portal(s) and Sputnik-powered device(s).
Apply the authentication system that includes the prepaid cards to one or more captive
portals. Apply the captive portals to one or more Sputnik-powered devices. Here we
apply both the prepaid and a PayPal authentication system to the "Special Guest"
captive portal, enabling users to pay via prepaid card, credit card, or PayPal account.
Log into SputnikNet, then navigate to the prepaid authentication system overview.
Prepaid cards do not need to be associated with a cash payment. For example, you can hand them out to customers who make a
minimum purchase in a cafe, or to registered guests at a hotel.
To create prepaid cards, log into SputnikNet, then click on "Prepaid" from the Authentication menu.
Note:
- "Continuous" starts the clock when the user first logs in; the clock keeps ticking
continuously until the account time limit is used up regardless of whether the user is
logged in or not
- "Discontinuous" starts the clock when the user first logs in; the clock ticks only when
the user is logged in (has an active session); the account is valid until the account time
limit is used up
- if you set both time and bandwidth limits, the account will expire when either the time or
maximum bandwidth is used up, whichever comes first
- set the bandwidth limit as 0 if you want only time limits to apply
To create prepaid cards in SputnikNet, click "Edit Settings" from the Prepaid
Authentication System menu. Fill out the fields under "Generate Paid Cards" as follows:
- Name for this batch: a unique name for the set of generated prepaid cards that will be
displayed in SputnikNet, and can be used for searching, managing, and downloading
cards
- Username prefix: text that is appended to the beginning of each user ID code
- Starting suffix number: starting number for this batch of prepaid cards, which will be
incremented for each new card
- Number of accounts to create: the number of cards in the new batch
- Number of minutes for each account: the amount of network access time allowed by
the prepaid card
- Amount of upload + download bandwidth allowed for each account, in megabytes
- Continuous/discontinuous: see above
SputnikNet supports both PayPal and WorldPay internet payment systems. SputnikNet works with PayPal Website Payments Standard and PayPal Website
Payments Pro.
-PayPal Website Payments Standard is less expensive, but redirects customers to PayPal's website for payment.
- PayPal Website Payments Pro, using the Direct Payment method, can process credit card transactions "behind the scenes" (without any redirect to PayPal's site)
for U.S. and U.K. service providers. Alternatively, the Express Checkout method allows payment through PayPal, but requires the customer to use their PayPal
account (or sign-up for a new account) if paying by credit card. Both methods are robust and neither is prone to user error.
For best results (especially for U.S. accounts), we recommend Website Payments Pro.
- WorldPay enables customers to pay in 144 local currencies and can be customized to fit the local language in many countries around the world. It's a good choice
if you want to charge customers in a currency that PayPal doesn't support.
- Payment process redirects your customer to the PayPal website and supports the IPN
interface.
- Supports 16 currencies, including U.S. Dollar, Canadian Dollar, Euro, Pound Sterling,
Yen, Australian Dollar, New Zealand Dollar, Swiss Franc, Hong Kong Dollar, Singapore
Dollar, Swedish Krona, Danish Krone, Polish Zloty, Norwegian Krone, Hungarian Forint,
and Czech Koruna.
- Checkout process is completely integrated with your website, without PayPal branding
or redirects, and supports the IPN interface.
- Supports 16 currencies, including U.S. Dollar, Canadian Dollar, Euro, Pound Sterling,
Yen, Australian Dollar, New Zealand Dollar, Swiss Franc, Hong Kong Dollar, Singapore
Dollar, Swedish Krona, Danish Krone, Polish Zloty, Norwegian Krone, Hungarian Forint,
and Czech Koruna.
- Supports both Express Checkout and Direct Payments (U.S. only) methods. Express
Checkout requires your customer to have or sign up for a PayPal account. This method
redirects your customer to PayPal's web site for payment. Direct Payments processes
your customer's credit card on your site without redirecting to PayPal. Your customer
does not need a PayPal account.
- Supports 144 currencies and customized payment to match the language of your
website, enabling your business almost anywhere in the world.
- Completely secure transactions, fraud protection and recognized secure data storage.
You can have multiple rate plans that you apply to different network locations, of course.
And you can change prices at any time to run specials.
Purchased accounts expire when time or bandwidth limits are reached, whichever
comes first. Maximum bandwidth includes upload plus download. One megabyte equals
2^20 or 1,048,576 bytes.
For more information about creating a new authentication system, see the online
documentation chapter titled "Creating a new Authentication System".
- Price Amount: enter amount you want to charge for the product.
- PayPal or WorldPay Currency Code: select the desired currency from the pop-up list
(see next step).
- Hard Expiration Interval: set the amount of time that the account will be valid for,
following creation, in the format hh:mm:ss.
To disable bandwidth limits, leave maximum bandwidth value set to zero (0). Maximum
bandwidth setting is approximately ten exabtyes (ten trillion megabytes).
NOTE: The PayPal and WorldPay authentication systems only support continuous
usage plans that are valid only during the hard expiration interval. Users often neglect to
use the session monitor window to terminate their sessions manually, which means that
the session length tracked by SputnikNet can be greater than the amount of time the
user believes they spent online. It is therefore simpler to offer continuous
hourly/daily/weekly plans that have unambiguous expirations (from the user's
perspective). This approach causes less of a support burden for the service provider and
avoids disputes.
Click the checkbox under "Use?" to make the network access product available to
customers who log in using the authentication system.
In the next two sections we recommend that you set both "Block Non-encrypted Website
Payment" and "PayPal Account Optional" to "Off" to reduce the probability of error.
After confirming, you should have a long Identity Token. Copy your PDT Identity Token.
NOTE: The PayPal and WorldPay authentication systems only support continuous
usage plans that are valid only during the hard expiration interval. Users often neglect to
use the session monitor window to terminate their sessions manually, which means that
the session length tracked by SputnikNet can be greater than the amount of time the
user believes they spent online. It is therefore simpler to offer continuous
hourly/daily/weekly plans that have unambiguous expirations (from the user's
perspective). This approach causes less of a support burden for the service provider and
avoids disputes.
Click the checkbox under "Use?" to make the network access product available to
customers who log in using the authentication system.
To see what users experience when logging in, see the online documentation chapter
titled "User Experience: Paying for Access using the PayPal Authentication System".
Note that if you do not select the Direct Payments checkbox (for example, if you are a
non-U.S.-based service provider), then the Express Checkout path will be used to
process customer purchases and the user will either need a PayPal account or to pay by
credit card while signing up for an account.
NOTE: The PayPal and WorldPay authentication systems only support continuous
usage plans that are valid only during the hard expiration interval. Users often neglect to
use the session monitor window to terminate their sessions manually, which means that
the session length tracked by SputnikNet can be greater than the amount of time the
user believes they spent online. It is therefore simpler to offer continuous
hourly/daily/weekly plans that have unambiguous expirations (from the user's
perspective). This approach causes less of a support burden for the service provider and
avoids disputes.
Click the checkbox under "Use?" to make the network access product available to
customers who log in using the authentication system.
To see what users experience when logging in, see the online documentation chapter
titled "User Experience: Paying for Access using the PayPal Authentication System".
If you don't want this option to appear, from the "Edit Settings" page of the PayPal
authentication system in SputnikNet, check "Disable MAC Authentication".
To do this, Warp 9 uses two authentication systems: prepaid and PayPal. If the customer
has a Warp 9 prepaid card, they simply enter their username and password, as shown
here, and start browsing.
Note: if the customer has pop-up blocking on, they will not see this window unless they click on the "Monitor Session"
button on the previous screen. If the Session Monitor window is not available, the system will log them out automatically
after the idle time configured in SputnikNet.
If you don't want this option to appear, from the "Edit Settings" page of the PayPal
authentication system in SputnikNet, check "Disable MAC Authentication".
To do this, Warp 9 uses two authentication systems: prepaid and PayPal. If the customer
has a Warp 9 prepaid card, they simply enter their username and password, as shown
here, and start browsing.
If you haven't disabled MAC authentication, the user can click on "Automatically
recognize my computer or wireless card" to skip the login process in the future. After
their purchase, they system will recognize the MAC address of their wireless card and
enable them to login automatically.
Payment confirmation.
Once payment is approved, the customer briefly sees a confirmation screen.
Note: if the customer has pop-up blocking on, they will not see this window unless they click on the "Monitor Session"
button on the previous screen. If the Session Monitor window is not available, the system will log them out automatically
after the idle time configured in SputnikNet.
- WorldPay API Method: this will show "Select Junior" by default. It refers to a WorldPay
merchant payment system.
- Test mode?: only check the box if you are using WorldPay's developer sandbox to
process transactions in test mode.
- WorldPay Installation ID: enter your WorldPay Installation ID, available from
WorldPay's merchant control panel.
- Sign-up Prompt: enter the text the user will see on the Captive Portal next to the
sign-up button.
- Sign-up Button Label: enter the text you want to display on the sign-up button.
- Disable MAC authentication: if left unchecked, users with current accounts will be able
to simply click through to log in-- authentication is performed using the client device's
MAC (hardware) address. Check the box if you want to force users to log in every time.
Click the checkbox under "Use?" to make the network access product available to
customers who log in using the authentication system.
For more information about setting up network access products, see the online
documentation chapter titled "Setting up Rate Plans for PayPal or WorldPay".
To see what users experience when logging in, see the online documentation chapter
titled "User Experience: Paying for Access using the WorldPay Authentication System".
- The user log (under the "Users" menu) shows a list of all user accounts in the selected
authentication system
- User details provides information about a specific user account, and lets you modify
basic settings, such as account expiration time, password, and whether the account is
enabled or disabled
- User transactions provides a list of all of the selected user's purchase transactions;
clicking on any one of them provides details about that transaction
- The transaction log ("Transaction Log" menu) shows a list of all transactions in the
selected authentication system
- Clicking on any transaction provides details for that transaction, and a link to the "Edit
Settings" page of the Sputnik-powered device where the purchase transaction occurred
You can browse a list of users who have registered with your PayPal Authentication
System. User accounts are displayed in reverse chronological order from the time they
were created (in other words, most recently created user accounts are on top).
To browse all users, type "%" (wild-card character) into the text field, set the "Display
Limit" to the number of rows you want to view, and click the "Search" button. To narrow
your search, type in a portion of the login ID followed by %. For example, to find all users
with login IDs that start with "Ni", e.g. "Nicholas" or "Nick", search for "Ni%". To find all
matches with the "ic" in them, search for %ic%-- in this case, you'd find both of the
previous login IDs as well as "nicka". Searches are case sensitive.
- Display Name: this is the account name displayed in SputnikNet, along with the
associated Login ID. It is also displayed to the customer on the welcome page they see
after a successful login. You can edit it here.
- Expires: shows the current expiration time of the account, which you can modify.
- New Password: enables you to change the password associated with this login ID.
- Payee ID: the ID assigned to the customer by PayPal (or WorldPay).
- Disabled: check this box if you want to disable the account.
- PayPal (or WorldPay) Transaction ID: matches the corresponding transaction record in
your PayPal (WorldPay) merchant account. Click on a transaction ID to examine details.
- Order Time: time of purchase.
- Assigned Login: the user can have multiple assigned logins - for example, if
MAC-based (automatic) authentication is enabled, their MAC address becomes the
assigned login; further, users can change their login ID at any time. Regardless of login
ID, they are tracked by a single PayPal (WorldPay) payee ID.
- Product/Plan: the product purchased from your rate plan.
- Amount Paid: the price set by you for the network access product.
- Action Taken: indicates the new, post-purchase expiration time for the user's account.
Click on an Assigned Login to view and edit settings for the user account, as shown
above.
- Login ID: the unique case-sensitive ID the user will log in with; once created, it cannot
be edited
- Display Name: the name of the user that appears in the SputnikNet interface and on
the page the user sees after a successful login
- Expires: optional termination date for the account, after which it will no longer be active
- Password: password the user will log in with
- Email address
- Title
- Organization
- Group Identifier: unique name for the group; once created, it cannot be edited
- Description: comments or more details about the group
Network policies are applied to group members in the same order that they are applied
to the group itself. For example, if you want to ensure that "Block Private Nets" policies
apply before "Content filtering" policies, click the checkbox next to "Block Private Nets",
then click the "Update Policies Button". Next, click the checkbox next to "Content
filtering" and click the "Update Policies" button again.
To see more detail about a specific network policy, or to modify a policy setting, click on
its name.
For more information about network policies, see the online documentation section titled
"SputnikNet Network Policies".
Users who log in are automatically assigned to the group(s) of which they are members,
and network policies are applied to them as soon as they authenticate.
Log into SputnikNet, then navigate to the user authentication system overview.
Log into SputnikNet and click on "Users" from the Authentication menu. Or simply click "Authentication" to start with a generic
authentication system which you can configure as a user authentication system.
- Display Name: change the name of the user account displayed in SputnikNet and on
welcome pages, as shown above
- Expires: change expiration date and time of the account (default is "Never")
- Password: note, if changed the new password is not sent to the user
- Email
- Title
- Organization
- Group membership: click checkboxes next to the group(s) you want to assign the user
to; network policies inherited from the group(s) are applied to the user when they log in
By default, self sign-up users are not assigned to any group. However, you can create a
"Guest" group, apply network policies to it, and manually assign self sign-up users to it.
For more information about network policies, see the online documentation section titled
"SputnikNet Network Policies".
Log into SputnikNet, then navigate to the device authentication system overview.
Log into SputnikNet and click on "Devices" from the Authentication menu. Or simply click "Authentication" to start with a generic
authentication system which you can configure as a device authentication system.
Every network device has a MAC address ("media access control") that uniquely
identifies it. You can automatically log in devices by entering their MAC addresses into
the device authentication system. The MAC address format for SputnikNet is six pairs of
hexadecimal digits (lower case), separated by colons (:).
- MAC Address: enter the MAC address of the device you want to grant access to (or of
its wireless card)
- Description: enter a memorable name for the device, which will appear in SputnikNet
To apply a device authentication to a Sputnik-powered device, click on "Routers" from the "CONFIG" menu.
Continue to add the device authentication system to all of the Sputnik-powered devices
where you want it to operate.
User devices with matching MAC addresses bypass captive portal login.
Important: if you want to immediately test device authentication with a client device, turn
off both the client device and the Sputnik-powered device. Turn on the Sputnik-powered
device first, let it boot, and then turn on the client device.This last step is needed
because if a client device already had a DHCP lease with the Sputnik-powered device
when you applied the authentication system, then the device authentication is not
invoked because the only time a MAC address is checked against the database is when
that client device requests an IP address via DHCP. Thus, device authentication does
not work if you assign static IP addresses to client devices-- it only works with DHCP.
Find the MAC address of the device(s) you want to automatically login.
If you need the MAC address of an existing user's device, you can find it in SputnikNet. To do this, click on "Client Sessions" from the
"REPORTS" menu.
NOTE: you can give the device a new name, or keep its current name. Reports
differentiate the device based on the authentication system used. For example, "Bob's
iPhone" manually logged in using the "204 Users" authentication system in the report,
above.
Log into SputnikNet, then navigate to the RADIUS authentication system overview.
SputnikNet RADIUS authentication enables the authentication of accounts (maintained on a separate RADIUS server) on your
Sputnik-powered network.
Log into SputnikNet and click on "RADIUS" from the Authentication menu. Or simply click "Authentication" to start with a generic
authentication system which you can configure as a RADIUS authentication system.
Click on the checkbox next to the RADIUS authentication system(s) you want to apply to
the captive portal. Click "Update" to save your settings. To view more information or to
edit the settings of any authentication system, click on its name in the list.
If applying more than one authentication system, select them, one at a time, in the order
you want them displayed, and click "Update" after each selection.
1. Install IAS by going to Start -> Settings -> Control Panel -> Add/Remove Programs.
2. Once the Add/Remove Programs window is open click the Add/Remove Windows Components Icon in the left side window.
3. When the Windows Components Wizard window opens scroll down the list and highlight Networking Services and then click the Details button.
4. Now check the box for Internet Authentication Services. Then click OK.
5. When you get back to the Windows Components Wizard click next. IAS will then be installed. Click Finish when the installation is complete.
2. Once IAS is open you need to first register it with Active Directory. In the Left window highlight the Root of Internet Authentication Services then click on Action
at the top menu and select "Register Server in Active Directory" from the drop down.
2. Now you will need to enter a friendly name for the client. We use Sputnik.
3. Enter the DNS name of the server. To verify a DNS name click the Verify button. Once verified click the Next button.
5. Enter a pass phrase for the Shared secret and confirm it.
2. Right click on the "Connections to other access servers" policy and select Properties.
4. Go to the Authentication Tab. Check the box for "Unencrypted authentication (PAP, SPAP)".
5. Click OK.
6. At the bottom of the "Connections to other access servers" properties window change the "If a connection request matches the specified conditions:" to "Grant
remote access permission" Then click OK.
5. Supply an administrative and user-visible name and click "Save Changes". You should see your new RADIUS authentication system listed in the authentication
system overview.
8. Enter the DNS name of your RADIUS server. The Authentication and Accounting Servers are one and the same.
9. Set the port for the Authentication Server to 1812 and the port for the Accounting Server to 1813. The Authentication and Accounting Secret will be the same as
the Secret you set up for the RADIUS client in IAS.
10. Set the RADIUS communications timeout to whatever you wish. We use 14000.
13. Click on the name of the captive portal you wish to use with RADIUS authentication, or create a new one.
14. Click on "Walled Garden and Authentication" from the "Captive Portal Properties" menu.
To start using AnchorFree advertising, click on "Advertising" from the "CONFIG" menu.
Use "Search Options" to find a specific Sputnik-powered device or narrow the list. Use
the % symbol to match one or more wild-card characters; searches are case-sensitive.
- SSID: this is typically configured in the Sputnik-powered device's "Edit Settings" page,
however you can change it here
- AF Venue Type: select the type of venue where the Sputnik-powered device is located;
this will help AnchorFree better target ads
- Address/City/State/Postal Code/Country: enter the address where the Sputnik-powered
device is located; again, this helps in ad targeting
- Publish Location: click the checkbox if you want AnchorFree to display your location in
their hotspot directory maps
NOTE: you can click on the "Node Name" link to see or edit additional settings for the
Sputnik-powered device; be sure to save your changes first.
To start using AnchorFree advertising, click on "Advertising" from the "CONFIG" menu.
When you have done this, click on the Sputnik-powered device's name ("router") to view
the AnchorFree network policies.
- AFGL10000491 (or some other number) - this policy proxies web traffic through
AnchorFree for ad insertion
- Sputnik DNAT SCC - ensures that web traffic intended for SputnikNet (e.g. the captive
portal) does not route proxy through AnchorFree - this policy is not needed if AnchorFree
is used at the authentication system level
NOTE: these policies will not be selected if you disabled AnchorFree advertising on the
Sputnik-powered device.
Click the back button on your browser, then click on the "Sputnik DNAT SCC" policy to
view its settings.
Add the authentication system to additional Sputnik-powered devices to use them with
AnchorFree advertising.
Free, advertising-supported Wi-Fi access is sometimes offered with paid access. To set up this kind of model in SputnikNet, first
apply AnchorFree advertising to a guest authentication system. Then apply the guest authentication system together with a paid
authentication system to captive portals.
To start using AnchorFree advertising, click on "Advertising" from the "CONFIG" menu.
When you have done this, click on the Sputnik-powered device's name ("router") to view
its network policies.
- AFGL10000491 (or some other number) - this policy proxies web traffic through
AnchorFree for ad insertion
- Sputnik DNAT SCC - ensures that web traffic intended for SputnikNet (e.g. the captive
portal) does not route proxy through AnchorFree - this policy is not needed if AnchorFree
is used at the authentication system level
NOTE: these policies will not be checked if you disabled AnchorFree advertising on the
Sputnik-powered device. If the checkboxes next to the "AFGL" and "Sputnik DNAT SCC"
policies are checked, uncheck them, then click "Save Overrides".
- Allow/Accept: enable traffic to defined network destinations, often used for walled gardens
- Deny/Reject: disable traffic to defined network destinations, used to block unwanted sites
- Destination NAT: re-routes specified network traffic to a different network destination, used for content filtering
- Port Forward: (sometimes referred to as tunneling) forwards a network port from one network node to another, often used to
allow an external user to reach a port on a private IP address (inside a LAN) from the outside, for example to access a
web-based control panel on a device on a private network
Accessing a private network device from outside via port forwarding rules.
To access a webcam's built-in control panel from outside of the private network it is on,
for example, apply port forwarding policies to an authentication system; then apply the
authentication system directly to the local Sputnik-powered device that the webcam
connects through as an override.
The authentication system and captive portal "links" can be skipped, as noted above. But
generally, this chain of relationships applies in SputnikNet.
Also, except in cases like walled gardens and port forwarding, we recommend that you
apply policies at the highest level of abstraction - i.e. at the authentication system level.
Here is the order in which network policies are applied to a user.
Generally, policies are applied in the order they are added to the device, captive portal,
or authentication system. To establish this sequence, click on the checkbox next to the
first policy, click "Update", then repeat for additional policies in order. The built-in "Block
Private Nets" policy is always applied last.
In the special case of the user authentication system, policies are applied to users who
are members of multiple groups in this order:
To apply authentication system-wide network policies, click on "[Edit]" across from "all" in
the group list.
Select the network policies that you want to apply to that authentication system.
Click the checkbox next to the name of the network policy(ies) you want to apply to all
authenticated users. Click "Update Policies" to save your settings. To view more
information or edit the settings of any network policy on the list, click on its name.
If applying more than one network policy, select them, one at a time, in the order you
want them applied, and click "Update" after each selection.
Log into SputnikNet, then navigate to the user authentication system overview.
SputnikNet's user authentication system is unique in that it can include multiple groups, each with its own set of network policies.
Authenticated users can be assigned to specific groups, and inherit group-specific policies when they log in.
To set up groups and apply network polices to them, log into SputnikNet and click on "Users" from the Authentication menu.
Select groups.
Click on "Groups" from the "Authentication System" menu.
NOTE: if a user is a member of multiple groups, policies are applied in group order,
which is defined by when they are created. In other words, the first group to be created
will apply its network policies first.
Click on "[Edit]" under "Network Policies" for the "all" group. These are policies that apply
to all authenticated users.
Select the network policies that you want to apply to a specific group.
Repeat the process for other groups. Here, we apply the "Block Finance Server" policy
(presumably a deny/reject rule) to the Club Employees group.
NOTE: if you want to control the order that policies apply, select them sequentially, one
by one, and click "Update Policies" after each new policy. In this case, we would want
"Guest Printer Access" to apply first in order to allow connections to the local printer
before the "Block Private Nets" rule restricts local network access. However, there is one
exception: the standard "Block Private Nets" rule defined in SputnikNet is always applied
last. Therefore, in this specific example, we would click both network policies and then
click "Update Policies" once.
As noted, if a user is a member of more than one group, policies are applied to them first
in group order, then in network policy order. In this example, "Club Member" users would
have policies applied to them in the following order: 1. Content filtering (because they
are a member of "all"), 2. Guest Printer Access, 3. Block Private Nets.
To enable some users to access private network resources while blocking others, create
multiple groups (user authentication system only) and apply "Block Private Nets"
selectively. For more information about this, see the online documentation chapter titled
"Applying Network Policies to Groups within a User Authentication System".
Alternatively, create multiple authentication systems and apply "Block Private Nets"
selectively. For example, you could use device authentication for employees, while
applying "Block Private Nets" only to users who log in using a guest authentication
system.
To do this, click on "Captive Portals" from the "CONFIG" menu, select a captive portal,
then click "Walled Garden and Authentication" from the "Captive Portal Properties"
menu. Click the checkbox next to the authentication system(s) you want to apply and
click "Update".
Scroll down to the bottom of the "Edit Settings" page. Under "Network Policies" you will
see a list of policies that apply to users of that Sputnik-powered device (router).
Apply your walled garden policy to captive portals; apply your captive portals to a Sputnik-powered devices.
Select "Captive Portals" from the "CONFIG" menu, then click on the name of the captive
portal you want to edit. Click on "Walled Garden and Authentication" from the "Captive
Portal Properties" menu. Click the checkbox next to the name of the walled garden
policy you want to apply. Click "Update" to save your settings.
Click on "Routers" from the "CONFIG" menu, click on the name of the Sputnik-powered
device ("router") that you want to apply the captive portal to, then select the captive
portal from the "Portal" pop-up list. Click "Save Settings" to do just that.
Click "Walled Garden and Authentication" from the "Captive Portal Properties" menu.
Click the checkbox next to the name of the authentication system containing the content
filtering policy.
Scroll down to the bottom of the "Edit Settings" page. Under "Network Policies" you will
see a list of policies that apply to users of that Sputnik-powered device (router).
To create the first port forwarding policy, click on "Network Policies" from the "CONFIG" menu.
If redirecting a port range, which will redirect the range from the Sputnik-powered device
to the same range on the client device:
- Starting Port: enter starting port number
- Ending Port: enter ending port number
Apply the second port forwarding policy to a different device authentication system.
Follow the above instructions to apply the second port forwarding policy to a second
device authentication system. In this example, "Camera 2 - SW" would include the MAC
address of the second security webcam.
Select the Sputnik-powered device you want to apply the port forwarding policies to.
Click "Routers" from the "CONFIG" menu. Select the Sputnik-powered device (router)
that provides network access to the security webcams.
In this example, the "Camera 1 - NE" device authentication system applies "Security
Camera 1" port forwarding policies; the "Camera 2 - SW" device authentication system
applies "Security Camera 2" port forwarding policies. Based on the policies, port 8080
will forward to port 80 (web traffic) on security camera 1; port 8081 will forward to port 80
on security camera 2. Thus you can access these devices' web-based control panels
from anywhere on the internet.
First, create the port forwarding policy as described above, then apply it to a device
authentication system. Enter the MAC addresses of all of the media controller devices into
the device authentication system, and apply the authentication system to the
Sputnik-powered devices in the field. Whenever you add a new flat-screen display, simply
add its controller's MAC address into the device authentication system, and apply the
authentication system to the local Sputnik-powered device.
To create the network policy, click on "Network Policies" from the "CONFIG" menu.
Select "Group Policies" from the "Authentication System" page. Click on "[Edit]" to
modify the authentication system's group policies.
Click "Walled Garden and Authentication" from the "Captive Portal Properties" menu.
Click the checkbox next to the name of the authentication system containing the content
filtering policy.
Scroll down to the bottom of the "Edit Settings" page. Under "Network Policies" you will
see a list of policies that apply to users of that Sputnik-powered device (router).
You can quickly identify how many client sessions occurred on your Sputnik-powered
network, the longest, shortest, average and total session time. Data is sorted by logout
time, most recent first. NOTE: the Client Summary report only reports completed
sessions, and does not include active sessions. If you want to see active session
information, you can view the Client Sessions report.
Settings are:
- Granularity: enables you to view data by hour, day (default), week, or month
Click "Execute" to refresh the display. Click "Next >" or "< Previous" to scroll through
results. Click on a "Client Login" to see session history for that client.
You can quickly identify how much bandwidth was used across your Sputnik-powered
network, and view total bandwidth sent and received summarized by client login ID, by
whatever time interval you choose.
- Authentication System (1): shows technical information about the authentication system
used (generally not needed except for debugging)
- Active Sessions on/Router (2): shows usage graphs for that Sputnik-powered device
("router")
- Client (3): shows detailed information and usage graphs for that specific client session
First, we'll click on the active client session record to drill into more detailed information.
The first bandwidth plot shows traffic in the last hour, or if the session is less than an hour
long, all traffic since the session began. The second bandwidth plot can be set to display all
traffic (default), the last hour, 30 minutes, 15 minutes, or 5 minutes. Select the appropriate
time interval from the "Zoom" pop-up menu and click "Submit" to refresh the display.
- Session on Router (1): shows usage graphs for that Sputnik-powered device ("router")
- Authenticated Client Login (2): returns to the Session History report (above)
We'll click on the name of the Sputnik-powered device (1) to get more information about its
usage.
The Access Summary report shows the number of sessions, longest, shortest, average
and total session length on each Sputnik-powered device.
Settings are:
- Granularity: enables you to view data by hour, day (default), week, or month
- Router search: enables you to filter the results by the name of the Sputnik-powered
device: searches are case sensitive; use the % symbol as a wild-card character
- Display limit: you can view 10 (default), 25, 50 or all records
Click "Execute" to refresh the display. Click "Next >" or "< Previous" to scroll through
results. Click on the name of a Sputnik-powered device to see bandwidth and session
graphs for that device (see the prior step titled "Sputnik-powered device bandwidth and
session graphs").
- Session State: can display all, active, completed sessions, or sessions pending
If a session is active, you can terminate it by clicking on its checkbox and clicking
"Terminate Selected".
- Click on a "Router" name (1) to see bandwidth and session graphs for that
Sputnik-powered device (see the prior step titled "Sputnik-powered device bandwidth
and session graphs")
- Click on a "Client" (2) or "Display Name" (3) field to see detailed session information
(see the prior step titled "Client Session report")
To do this, click on "Control Center" from the "CONFIG" menu, and scroll down the page
to "Session Archive Period". Options range from "do not archive session data" to one to
twelve months in one-month increments.
To get started, click on "Ad Hoc" from the "REPORTS" menu, then click "Sputnik
Support".
You can enter the SQL commands you want to use, or if you don't know them, describe
the report you want to generate. Please indicate whether you want to generate the report
from SputnikNet only, or whether you also want reports to be emailed to you periodically.
We will notify you if a Professional Support Incident is required. If so, purchase the
incident from our online store.
You will receive an email when the query has been added to your SputnikNet Account.
To export the data to your computer, click the checkbox next to "Export?" and click
"Execute".
"State" should show "Running normally - Managed". If it does, you're up and running. If
not, review the error messages below.
Trying 206.223.158.30
Connected to wifi.sputnik.com
Escape character is '^]'.
If you do not see this, then you need to open high-numbered ports on the upstream
firewall.
DD-WRT is factory set to allow 50 DHCP leases with 24-hour expiration. This is not enough for
a typical hotspot.
NOTE: do not allow DHCP lease addresses outside the range of 2-254. (Here the start
address is 10, and 240 addresses are allowed. That means the highest possible value is 250,
which is in range.) If you do, you may need to reset the device to restore functionality.
Click "Save" to apply and save your new settings. For good measure, reboot the router after
saving settings to make sure they are applied.