<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hoaxing DNS, or equivalent to effectively block internet access? in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26619#M5242</link>
    <description>Some kind of messing with default gateways?</description>
    <pubDate>Thu, 12 Dec 2013 09:59:25 GMT</pubDate>
    <dc:creator>sven_jaanson</dc:creator>
    <dc:date>2013-12-12T09:59:25Z</dc:date>
    <item>
      <title>Hoaxing DNS, or equivalent to effectively block internet access?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26618#M5241</link>
      <description>On occasions, I would like to effectively block all internet access on devices connected to a particular WLAN.  If I simply turn off the WLAN, then cellular data takes over, so I'd like to keep the WLAN "connected" to the devices, but direct the device to a fake page, faulty page or similar.  (It won't fool everyone during exams, quizzes, etc - but it will fool some!)
&lt;BR /&gt;&lt;BR /&gt;
I can see that, if the ZD was a DHCP server, then I could possibly change the DNS, but that would only take effect when new IPs were handed out and anyhow, We don't use the ZD for a DHCP server.
&lt;BR /&gt;&lt;BR /&gt;
I've tried using Device policies to shove devices onto a fake VLAN, but that actually just reverts to cellular data on devices.
&lt;BR /&gt;&lt;BR /&gt;
Any thoughts would be appreciated - I have 2 hours before a school-wide quiz takes place, and I'd love to have it "in place" then</description>
      <pubDate>Wed, 11 Dec 2013 19:31:47 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26618#M5241</guid>
      <dc:creator>martin_kane</dc:creator>
      <dc:date>2013-12-11T19:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Hoaxing DNS, or equivalent to effectively block internet access?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26619#M5242</link>
      <description>Some kind of messing with default gateways?</description>
      <pubDate>Thu, 12 Dec 2013 09:59:25 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26619#M5242</guid>
      <dc:creator>sven_jaanson</dc:creator>
      <dc:date>2013-12-12T09:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: Hoaxing DNS, or equivalent to effectively block internet access?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26620#M5243</link>
      <description>have your DHCP server point clients to a DNS server that you control.
&lt;BR /&gt;
Then reconfigure your DNS server to redirect all queries to a captive portal. (via a wildcard feature)
&lt;BR /&gt;
when you want things to work, change your DNS configs back.</description>
      <pubDate>Fri, 10 Jan 2014 03:17:58 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26620#M5243</guid>
      <dc:creator>bill_burns_6069</dc:creator>
      <dc:date>2014-01-10T03:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: Hoaxing DNS, or equivalent to effectively block internet access?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26621#M5244</link>
      <description>Thanks for the help.  I wonder if I just set up VLAN Tag to a non-existant VLAN whether that would quickly stop them in their tracks?</description>
      <pubDate>Fri, 10 Jan 2014 08:46:29 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26621#M5244</guid>
      <dc:creator>martin_kane</dc:creator>
      <dc:date>2014-01-10T08:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Hoaxing DNS, or equivalent to effectively block internet access?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26622#M5245</link>
      <description>Not likely.
&lt;BR /&gt;
A newly associating wifi device would realize right away that it was not issued an IP address.
&lt;BR /&gt;
It might take a pre-associated device longer to give up on your wifi.
&lt;BR /&gt;&lt;BR /&gt;
A better approach would be to change the VLAN to another one that has the "wildcard" DNS server on it. That server would refer all traffic to a single "portal" web server.
&lt;BR /&gt;&lt;BR /&gt;
So, on this secondary VLAN, the "wildcard" DNS server would have to have the same IP as your regular caching DNS server. You'd also have to have a DHCP server out there to continue to issue IP addresses.
&lt;BR /&gt;&lt;BR /&gt;
That secondary DNS/DHCP/WEB-server + VLAN should be a "complete" solution that would give you some hope of fooling your wifi devices into thinking they still had a working internet connection.</description>
      <pubDate>Fri, 10 Jan 2014 15:34:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26622#M5245</guid>
      <dc:creator>bill_burns_6069</dc:creator>
      <dc:date>2014-01-10T15:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: Hoaxing DNS, or equivalent to effectively block internet access?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26623#M5246</link>
      <description>Don't know if this helps, but here it is:
&lt;BR /&gt;&lt;BR /&gt;
Minimal DNS spoofing daemon
&lt;BR /&gt;
&lt;A href="http://dachary.org/?p=1947" rel="nofollow"&gt;http://dachary.org/?p=1947&lt;/A&gt;</description>
      <pubDate>Wed, 22 Jan 2014 18:53:12 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26623#M5246</guid>
      <dc:creator>bill_burns_6069</dc:creator>
      <dc:date>2014-01-22T18:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Hoaxing DNS, or equivalent to effectively block internet access?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26624#M5247</link>
      <description>Thanks, Bill.  That looks perfect - and easy!</description>
      <pubDate>Wed, 22 Jan 2014 19:03:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Hoaxing-DNS-or-equivalent-to-effectively-block-internet-access/m-p/26624#M5247</guid>
      <dc:creator>martin_kane</dc:creator>
      <dc:date>2014-01-22T19:03:40Z</dc:date>
    </item>
  </channel>
</rss>

