How was the auth done? And for that matter what logic did the traffic shaping use?
Auth is username/password over captive portal. You could pay for more bandwidth. The system was so pwned I ended up giving myself unlimited bandwidth.