Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive portal allows communication between guests

    Scheduled Pinned Locked Moved Captive Portal
    15 Posts 3 Posters 784 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      robsonvitorm
      last edited by

      Hey guys! I have a request, so that two guests connected to the captive portal, in the same zone, can communicate. Analyzing, I didn't find anything firewall about this. When curling http://IP2, from IP1, the message is displayed that there is no route to that destination. On the guest with IP2 there is an http service on port 80. When capturing with tcpdump, the packet arrives at the firewall, but is not forwarded. Something related to ARP. Has anyone ever had a request like this? I don't know where to adjust to allow this communication between two guests. The aps for wireless network are unifi uap-ac-pro. In their configuration, the isolation option is not activated. Thank you for any help.

      M GertjanG 2 Replies Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @robsonvitorm
        last edited by

        @robsonvitorm
        Are we talking about hosts in the same vlan (broadcast domain) ?

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        R 1 Reply Last reply Reply Quote 1
        • R
          robsonvitorm @michmoor
          last edited by

          @michmoor yep, in the same broadcast domain, same vlan...thanks

          M R 2 Replies Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @robsonvitorm
            last edited by

            @robsonvitorm
            So there is no routing here therefore nothing to do with the firewall.
            Hosts cant talk on the same vlan i would make sure that

            1. IP subnet masks are the same or correct (we're not crossing boundaries due to misconfig)
            2. If Windows machines, ensure the Windows firewall is disabled for troubleshooting

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 1
            • GertjanG
              Gertjan @robsonvitorm
              last edited by

              @robsonvitorm said in Captive portal allows communication between guests:

              I have a request, so that two guests connected to the captive portal, in the same zone, can communicate.

              The important missing info is : get a pfSense, or whatever router you have laying around, hook up a switch, some access points and connect everything togerher.
              As soon as every device has a DHCP lease, you can remove the pfSense (router).
              You'll notice that traffic from to the internet isn't possible anymore. And I presume that I don't have to explain why.
              You'll notice also that all your network devices can still communicate among each other just fine.
              This is because : example : device on 192.168.1.2 doesn't need a router to interaction with for example 192.168.1.3.

              This is something you don't want on networks like a captive portal network.
              So, check your access points, and activate AP Isolation Mode. This mode will make inter device communication impossible. Devices can only communicate with the gateway == the router.

              This mode is very comparable with what Microsoft "Windows" calls Private versus Public network mode. When Public mode is active, you can't share anything, neither see other shares. The only thing that works is the Internet access.

              ** Actually : on a captive portal, you don't care. It's a non trusted network, full with unknown devices, and they are connected just to have an internet access. If Billy with device X want to attack Willy with device Z on the portal network, then that is their affair ^^

              Also : hosting a web server on a captive portal ? Are you sure ?

              @robsonvitorm said in Captive portal allows communication between guests:

              When curling http://IP2, from IP1, the message is displayed that there is no route to that destination. On the guest with IP2 there is an http service on port 80. When capturing with tcpdump, the packet arrives at the firewall, but is not forwarded. Something related to ARP.

              What ARP does : device with IP1 uses the arp protocol on the local network to ask : who has IP2 ?
              IP2 then will reply : It's me : here is my MAC.
              And then IP1 connect to IP2 directly using their MAC addresses, and all of this doesn't involve the firewall at all. proof : power down the firewall, and you can still connect.
              If IP2 (the web server) doesn't reply, go talk again to the admin (you didn't fire him yet ?) and ask him to finish his work.

              @robsonvitorm said in Captive portal allows communication between guests:

              I don't know where to adjust to allow this communication between two guests

              Very basic "your very first network ever" == two PC and a cross Ethernet cable.
              Assign a static IP and /mask to the first PC. Example 192.168.1.10/24
              Assign a static IP and /mask to the second PC Example 192.168.1.11/24.
              Now your network works : they can communicate. No firewall. No router / nos witch : nothing. Try it !?!

              @robsonvitorm said in Captive portal allows communication between guests:

              he aps for wireless network are unifi uap-ac-pro. In their configuration, the isolation option is not activated.

              Ah, ok, so you know about Isolation mode .....

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 1
              • R
                robsonvitorm @robsonvitorm
                last edited by

                @robsonvitorm Both guests are Linux without firewall rules and policies like ACCEPT. In pfsense, I created a rule allowing everything (protocol, port and src and dst). What I forgot to mention is that the APs network is different, and is in another VLAN and broadcast. However, I pass the VLANS of each SSID, including guests. The netmasks on both are correct, as it is a medium network, using /22, delivered via DHCP on pfsense itself.

                M 1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @robsonvitorm
                  last edited by

                  @robsonvitorm said in Captive portal allows communication between guests:

                  In pfsense, I created a rule allowing everything (protocol, port and src and dst).

                  why? traffic doesn't go through pfsense if they are in the same vlan?
                  There is something blocking on the hosts themselves.

                  APs having different management IPs is fine. traffic is not routed across the management interface

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  R 2 Replies Last reply Reply Quote 1
                  • R
                    robsonvitorm @michmoor
                    last edited by

                    This post is deleted!
                    1 Reply Last reply Reply Quote 0
                    • R
                      robsonvitorm @michmoor
                      last edited by

                      @michmoor just to rule out any possibility of the firewall blocking these connections... but there is still something blocking this communication.

                      GertjanG M R 3 Replies Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @robsonvitorm
                        last edited by Gertjan

                        @robsonvitorm
                        tcpdump on the IP2 host and you'll understand what happens ^^

                        edit : Who listens on port '80' :

                        netstat -naptul | grep ':80'
                        

                        Check also the firewall on that IP2 device.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        1 Reply Last reply Reply Quote 1
                        • M
                          michmoor LAYER 8 Rebel Alliance @robsonvitorm
                          last edited by

                          @robsonvitorm
                          I agree. wireshark/tcpdump on each client. Perhaps application-related.
                          Are you able to ping each client?
                          Can you see other mac addresses from your client?

                          For example, on my linux hosts

                          arp -a
                          ? (10.105.1.15) at 28:8a:1c:45:fa:c0 [ether] on ens192
                          ? (10.105.1.27) at <incomplete> on ens192
                          ? (10.205.1.90) at 00:94:a1:12:39:82 [ether] on ens160
                          ? (10.205.1.32) at <incomplete> on ens160
                          ? (10.105.1.112) at 00:13:c6:01:5c:7d [ether] on ens192
                          ? (10.105.1.23) at 00:01:d7:ed:5e:c1 [ether] on ens160
                          ? (10.105.1.118) at 00:cc:34:56:59:12 [ether] on ens192
                          ? (10.205.1.90) at 00:94:a1:12:39:82 [ether] on ens192
                          

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          R 1 Reply Last reply Reply Quote 1
                          • R
                            robsonvitorm @robsonvitorm
                            last edited by

                            @robsonvitorm the firewall is disabled in both iptables without any rules and policies in accept

                            1 Reply Last reply Reply Quote 0
                            • R
                              robsonvitorm @michmoor
                              last edited by

                              @michmoor see arp, only gateway. ICMP also no communication

                              2024-03-15_15-41.png

                              2024-03-15_15-42.png

                              R 1 Reply Last reply Reply Quote 0
                              • R
                                robsonvitorm @robsonvitorm
                                last edited by

                                @robsonvitorm tcpdump

                                tcpdump does not capture anything on the ICMP target host, as if nothing reached it.

                                root@XXX54:~# tcpdump -i wls2 host 10.17.200.14
                                tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
                                listening on wls2, link-type EN10MB (Ethernet), snapshot length 262144 bytes
                                ^C
                                0 packets captured
                                0 packets received by filter
                                0 packets dropped by kernel
                                
                                
                                M 1 Reply Last reply Reply Quote 0
                                • M
                                  michmoor LAYER 8 Rebel Alliance @robsonvitorm
                                  last edited by michmoor

                                  @robsonvitorm
                                  You dont need to obfuscate private addresses (RFC1918) or mac addresses generally.
                                  If you don't see packets leaving then you have a problem on the host level. Either your network stack on the host is corrupted or you got something else going on.

                                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                  Routing: Juniper, Arista, Cisco
                                  Switching: Juniper, Arista, Cisco
                                  Wireless: Unifi, Aruba IAP
                                  JNCIP,CCNP Enterprise

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.