• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

IP or MAC passthrough didn't work

Captive Portal
6
19
1.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    dikkie21
    last edited by May 30, 2023, 10:23 AM

    Since about 1.5 years after an update, we have had problems with the captive portal on a campsite. Some devices with MAC or IP pass-through are still unable to access the Internet. There will also be no login page as with normal hotspot users. If we disable the captive portal, there will be connectivity for the affected devices, so I'm sure we should look for the problem around the captive portal.

    There is now more information about this issue on this forum, all proposed changes to the captiveportal script have already been incorporated into the current version 2.6.0.

    Can someone help me further with this?

    K G 2 Replies Last reply May 31, 2023, 10:02 AM Reply Quote 0
    • K
      kabeda @dikkie21
      last edited by May 31, 2023, 10:02 AM

      @dikkie21
      Hi,
      How and where did you set the id (mac or ip) to allow the access to these devices.
      I ask because it works perfectly with my config.

      1 Reply Last reply Reply Quote 0
      • D
        dikkie21
        last edited by May 31, 2023, 1:57 PM

        Passthrough MAC addresses and IP addresses on the Captive Portal...

        1 Reply Last reply Reply Quote 0
        • G
          Gertjan @dikkie21
          last edited by May 31, 2023, 3:34 PM

          @dikkie21

          There might have been some issue with an client version .... I don't recall what it was.
          But your not saying what pfSense version you use, so I can't tell more.

          What I can say : use the latest : 23.05.
          That works, and I'm sure, as I just tested it;

          I selected my captive portal wifi : I had to authenticate.
          I didn't do so.
          I added my phone's MAC to the list :

          login-to-view

          I selected my captive portal wifi : no need to authenticate - I was connected - no limits (TCP, UDP, ICMP, whatever, but only IPv4, of course).

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          1 Reply Last reply Reply Quote 0
          • N
            net-mas
            last edited by net-mas Jun 1, 2023, 8:23 AM Jun 1, 2023, 8:12 AM

            Hello, I have the same problem. The IP address passthrough went for years. I upgraded from CE to v23.05 last week. Since then, the settings under Captive Portal - allowed IP addresses are no longer used by the system.

            I noticed that I allowed both directions in the settings, but in contrast to before, the two double arrows in the overview of the allowed IP addresses are no longer visible.

            The same effect can be seen under allowed hostnames. At least old host names are still there with a double arrow on the left in the overview, but newly added host names with permitted directions both no longer have double arrows.

            even if I set the direction to "from" or "to", double arrows no longer appear in the overview list.

            what can I do so that the permitted IP addresses bypass the captive portal registration again and are not always directed to the captive portal registration mask after 1 hour?
            login-to-view
            login-to-view
            login-to-view
            even deleting an entry from PfSense CE and creating it again in PFSense+ 23.05 does not change anything. The entry "Allow in both directions" is saved, is also visible when the entry is called up again, but is apparently not used (anymore) in the system.

            F 1 Reply Last reply Jun 2, 2023, 8:14 AM Reply Quote 0
            • F
              FSC830 @net-mas
              last edited by Jun 2, 2023, 8:14 AM

              @net-mas : at least at a NetGate appliance SG-3100 the entry works.

              login-to-view

              The appliance new installed with 22..05 and updated -> 23.01 -> 23.05.

              Regards

              1 Reply Last reply Reply Quote 0
              • N
                net-mas
                last edited by Jun 2, 2023, 11:46 AM

                @FSC830 :
                I have created a new captive portal "test" and released an IP address in it. Unfortunately it does not work.
                In contrast to your appliance, my PFSense has only been upgraded from CE to 23.01 to 23.05.

                login-to-view
                login-to-view `

                what can I do?

                1 Reply Last reply Reply Quote 0
                • F
                  FSC830
                  last edited by Jun 2, 2023, 12:21 PM

                  Strange, but my guess its an individual issue.
                  I just updated my test VM to 23.05 and it works:
                  login-to-view
                  The entry was just created.
                  History of this VM is v2.6.0 CE -> 22.05-> 23.01 -> 23.05.

                  May be someone else has an idea...

                  Regards

                  G 1 Reply Last reply Jun 2, 2023, 1:53 PM Reply Quote 0
                  • D
                    dikkie21
                    last edited by Jun 2, 2023, 1:08 PM

                    We were still running on pfSense CE version 2.0.6. After an upgrade to pfSense+ 23.05 the problem is solved! Finally after 1.5 years!!

                    Thanks for helping and the right suggesion!

                    1 Reply Last reply Reply Quote 0
                    • N
                      net-mas
                      last edited by Jun 2, 2023, 1:28 PM

                      Unfortunately I still have the problem. I don't know what to do here. I can't fix it. No matter what I do, I don't get the two arrows to the left of the line and the entries don't work either. Apart from the update from CE to 23.05 nothing has changed. I urgently ask for help.

                      1 Reply Last reply Reply Quote 0
                      • G
                        Gertjan @FSC830
                        last edited by Jun 2, 2023, 1:53 PM

                        @FSC830 said in IP or MAC passthrough didn't work:

                        May be someone else has an idea...

                        More a suggestion.

                        What about the manual ? There is one called "Troubleshooting Captive Portal".
                        Only valid for pfSense+, I guess, as "2.6.0 CE" still uses the now abandoned ipfw firewall.

                        This command :

                        pfSsh.php playback pfanchordrill
                        

                        shows a lot.
                        If an IP or MAC isn't listed : normal that 'it' doesn't work.

                        Also, Diagnostics > Limiter Info should show a Limiter and scheduler for every connection.
                        2.6.0 had an issue with that, but, if I recall well, the system patches packages resolved that.

                        Btw : what is 172.18.1.128 ? It isn't RFC1918 .... (is it ?) - Can't route to it.

                        login-to-view

                        host names are like aliases, and regularly refreshed (== resolved, as a firewall can't use host names, only IPs) - you should be able to resolve theme manually : Diagnostics DNS Lookup
                        These host names should resolve to just one ( 1 ) IPv4.


                        My captive portal - I removed all connectd users.
                        There are no "allowed host names"
                        No MAC's ...
                        3 "Allowed IP Addresses" : 192.168.2.2 - 192.168.2.3 - 192.168.2.4, these are my AP, so they can do their stuff on the Internet (mostly NTP and syslogging to a syslog server on my LAN).

                        [23.05-RELEASE][root@pfSense.local.tld]/root: pfSsh.php playback pfanchordrill
                        
                        cpzoneid_2_allowedhosts rules/nat contents:
                        
                        cpzoneid_2_allowedhosts/hostname_0 rules/nat contents:
                        pfctl: DIOCGETETHRULES: No such file or directory
                        
                        cpzoneid_2_allowedhosts/192.168.2.2_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.2 tag cpzoneid_2_auth dnpipe 2000
                        ether pass in quick proto 0x0800 l3 from 192.168.2.2 to any tag cpzoneid_2_auth dnpipe 2001
                        
                        cpzoneid_2_allowedhosts/192.168.2.3_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.3 tag cpzoneid_2_auth dnpipe 2002
                        ether pass in quick proto 0x0800 l3 from 192.168.2.3 to any tag cpzoneid_2_auth dnpipe 2003
                        
                        cpzoneid_2_allowedhosts/192.168.2.4_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.4 tag cpzoneid_2_auth dnpipe 2004
                        ether pass in quick proto 0x0800 l3 from 192.168.2.4 to any tag cpzoneid_2_auth dnpipe 2005
                        
                        cpzoneid_2_allowedhosts/hostname_0 rules/nat contents:
                        pfctl: DIOCGETETHRULES: No such file or directory
                        
                        ipsec rules/nat contents:
                        
                        natearly rules/nat contents:
                        
                        natrules rules/nat contents:
                        
                        openvpn rules/nat contents:
                        
                        tftp-proxy rules/nat contents:
                        
                        userrules rules/nat contents:
                        
                        cpzoneid_2_allowedhosts rules/nat contents:
                        
                        cpzoneid_2_allowedhosts/hostname_0 rules/nat contents:
                        pfctl: DIOCGETETHRULES: No such file or directory
                        
                        cpzoneid_2_allowedhosts/192.168.2.2_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.2 tag cpzoneid_2_auth dnpipe 2000
                        ether pass in quick proto 0x0800 l3 from 192.168.2.2 to any tag cpzoneid_2_auth dnpipe 2001
                        
                        cpzoneid_2_allowedhosts/192.168.2.3_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.3 tag cpzoneid_2_auth dnpipe 2002
                        ether pass in quick proto 0x0800 l3 from 192.168.2.3 to any tag cpzoneid_2_auth dnpipe 2003
                        
                        cpzoneid_2_allowedhosts/192.168.2.4_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.4 tag cpzoneid_2_auth dnpipe 2004
                        ether pass in quick proto 0x0800 l3 from 192.168.2.4 to any tag cpzoneid_2_auth dnpipe 2005
                        
                        cpzoneid_2_allowedhosts/192.168.2.2_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.2 tag cpzoneid_2_auth dnpipe 2000
                        ether pass in quick proto 0x0800 l3 from 192.168.2.2 to any tag cpzoneid_2_auth dnpipe 2001
                        
                        cpzoneid_2_allowedhosts/192.168.2.3_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.3 tag cpzoneid_2_auth dnpipe 2002
                        ether pass in quick proto 0x0800 l3 from 192.168.2.3 to any tag cpzoneid_2_auth dnpipe 2003
                        
                        cpzoneid_2_allowedhosts/192.168.2.4_32 rules/nat contents:
                        ether pass in quick proto 0x0800 l3 from any to 192.168.2.4 tag cpzoneid_2_auth dnpipe 2004
                        ether pass in quick proto 0x0800 l3 from 192.168.2.4 to any tag cpzoneid_2_auth dnpipe 2005
                        
                        cpzoneid_2_auth rules/nat contents:
                        
                        cpzoneid_2_passthrumac rules/nat contents:
                        

                        I guess "DIOCGETETHRULES" means : it's reboot time.

                        Not sure why the same line "ether pass in quick proto 0x0800 l3 from any to 192.168.2.2 tag cpzoneid_2_auth dnpipe 2000" is listed 3 times ....

                        This instance is running :

                        46557  -  Is       0:00.01 /usr/local/sbin/filterdns -p /var/run/filterdns-cpzone1-cpah.pid -i 300 -c /var/etc/filterdns-cpzone1-captiveportal.conf -d 1
                        

                        But where is the resolved IP ?
                        Hummmm.

                        For now : my advice : if needed : use the IP, not the host name.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        N 1 Reply Last reply Jun 5, 2023, 9:04 AM Reply Quote 0
                        • N
                          net-mas @Gertjan
                          last edited by net-mas Jun 5, 2023, 9:24 AM Jun 5, 2023, 9:04 AM

                          @Gertjan
                          Thanks for your Support.
                          I tested. My cell phone is in the IP subnet, which should go past the captive login mask. It still got the login mask. Here is the relevant output of your command:

                          cpzoneid_2_auth/172.18.7.152_32 rules/nat contents:
                          ether pass in quick proto 0x0800 l3 from 172.18.7.152 to any tag cpzoneid_2_auth dnpipe 2050
                          ether pass out quick proto 0x0800 l3 from any to 172.18.7.152 tag cpzoneid_2_auth dnpipe 2051
                          her is complete Output.txt

                          to your other question, I have two IP networks for the clients, 172.18.7.0/25 for clients with a login mask and 172.18.7.128/25 for clients without a login mask.
                          and that for different subnets - i.e. two WLANs - one as a guest WLAN without a key, the other as a WLAN with a key but without a login mask
                          login-to-view

                          1 Reply Last reply Reply Quote 0
                          • N
                            net-mas
                            last edited by net-mas Jun 5, 2023, 9:22 AM Jun 5, 2023, 9:11 AM

                            My problem is that since the update to PFSense+ I can no longer record "positive entries" and the existing entries are no longer accepted.
                            In the detailed view I allow the IP addresses in both directions, but this is not shown in the overview.
                            login-to-view

                            The double arrows are missing and it is not used
                            login-to-view

                            I can also set the direction from "both" to "from" or "to", the result is the same - no arrows appear in the overview and the entry is also ignored - i.e. does not work. This happens with allowed IP addresses and allowed host names. With one small difference - with the allowed host names, entries before the update to PFSense+ still work, only new entries are created without arrows. With the permitted IP addresses, both the old addresses and the new ones no longer work.
                            See also my screenshots above.
                            This circumstance is also the case when I set up a completely new captive portal. I don't know what to do here.

                            G 1 Reply Last reply Jun 5, 2023, 10:22 AM Reply Quote 0
                            • G
                              Gertjan @net-mas
                              last edited by Jun 5, 2023, 10:22 AM

                              @net-mas

                              Allowed IP Address is an IP address - not a network (/25).

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              N 1 Reply Last reply Jun 5, 2023, 12:19 PM Reply Quote 0
                              • N
                                net-mas @Gertjan
                                last edited by net-mas Jun 5, 2023, 12:20 PM Jun 5, 2023, 12:19 PM

                                @Gertjan : with PFSense CE networks. I can also record a network.
                                As you can see, there is an IP address at the bottom - this doesn't work either.
                                IP addresses can also be recorded in a new, empty captive portal, but they do not work because there are no arrows in the overview.
                                In the screenshot of the entry mask, it is also clearly visible at the top right that it is possible to enter subnets.
                                The whole thing doesn't work in allowed host names either.
                                This hint is nice, but I don't think it will be the cause.

                                G 1 Reply Last reply Jun 9, 2023, 8:24 AM Reply Quote 0
                                • G
                                  Gertjan @net-mas
                                  last edited by Jun 9, 2023, 8:24 AM

                                  @net-mas

                                  2.6.0 is ipfw based, a firewall that doesn't exists anymore.
                                  I advise you to test drive the upcoming 2.7.0, as it is close to release now.

                                  It will take care of any MAC / IP pass though issues.

                                  On the other hand : I was using 2.6.0 for a long time, and I needed the portal as I needed it for a hotel.
                                  When 2.6.0 came out, I had some issues, but was resolved very soon. All details are here in the forum.
                                  I always had some IP pass throughs for my APs, and some MAC passes, they worked.
                                  But trying to work with /25 - I never did that.

                                  No "help me" PM's please. Use the forum, the community will thank you.
                                  Edit : and where are the logs ??

                                  1 Reply Last reply Reply Quote 0
                                  • N
                                    net-mas
                                    last edited by Jun 9, 2023, 2:16 PM

                                    @Gertjan
                                    Thank you for your support. I have now rolled back to version 2.6.0 (reinstalling, reinstall PfBlockerNG and restoring AutoConfigBackup with a version before the update).
                                    Now everything works again as desired.
                                    When 2.7.0 is released, I will update there and see what else is possible after that.

                                    What I did notice, however, was that the double arrows were again in front of the allowed IP entries, but when I added a single additional allowed IP as a test, all double arrows disappeared. However, all entries apply and are processed correctly.
                                    There is a similar behavior with the allowed host names. All entries have the double arrows but as soon as I add one, it no longer has the arrows in the list. However, the existing double arrows remain until I open the entry once and close it again without making any changes.
                                    The whole thing is definitely a bug that was added with an unspecified release, but my attempt to officially report this bug was unfortunately dismissed as a configuration problem. So I don't even know how to report bugs like this if the developers don't think it's a bug. It's really a pity... I can only hope that other users will notice this too, so that it might be recognized as a bug and eliminated.

                                    But a freshly set up 2.6.0 system with an official config restore can't be a configuration error for my taste...

                                    susobacoS 1 Reply Last reply Jul 3, 2023, 10:40 AM Reply Quote 0
                                    • F FSC830 referenced this topic on Jul 3, 2023, 10:34 AM
                                    • susobacoS
                                      susobaco @net-mas
                                      last edited by Jul 3, 2023, 10:40 AM

                                      @net-mas Hello, I think I have a similar problem.
                                      link text

                                      N 1 Reply Last reply Jul 3, 2023, 11:22 AM Reply Quote 0
                                      • N
                                        net-mas @susobaco
                                        last edited by Jul 3, 2023, 11:22 AM

                                        @susobaco
                                        I answered you in your post. Please create a bug yourself - maybe you can better convey to the developers with your words that it is a regression of this current firmware.
                                        Then note the device key under "AutoConfigBackup" and reinstall to 2.6.0 and restore a config from 2.6.0 with the device key. Then we'll be right back.
                                        Let's hope that the developers will adjust the firmware and get the captive portal up and running again.

                                        1 Reply Last reply Reply Quote 0
                                        • N net-mas referenced this topic on Jul 3, 2023, 1:28 PM
                                        5 out of 19
                                        • First post
                                          5/19
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.