• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Captive portal allows communication between guests

Captive Portal
3
15
769
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R
    robsonvitorm
    last edited by Mar 15, 2024, 5:16 PM

    Hey guys! I have a request, so that two guests connected to the captive portal, in the same zone, can communicate. Analyzing, I didn't find anything firewall about this. When curling http://IP2, from IP1, the message is displayed that there is no route to that destination. On the guest with IP2 there is an http service on port 80. When capturing with tcpdump, the packet arrives at the firewall, but is not forwarded. Something related to ARP. Has anyone ever had a request like this? I don't know where to adjust to allow this communication between two guests. The aps for wireless network are unifi uap-ac-pro. In their configuration, the isolation option is not activated. Thank you for any help.

    M G 2 Replies Last reply Mar 15, 2024, 5:32 PM Reply Quote 0
    • M
      michmoor LAYER 8 Rebel Alliance @robsonvitorm
      last edited by Mar 15, 2024, 5:32 PM

      @robsonvitorm
      Are we talking about hosts in the same vlan (broadcast domain) ?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      R 1 Reply Last reply Mar 15, 2024, 5:35 PM Reply Quote 1
      • R
        robsonvitorm @michmoor
        last edited by Mar 15, 2024, 5:35 PM

        @michmoor yep, in the same broadcast domain, same vlan...thanks

        M R 2 Replies Last reply Mar 15, 2024, 5:38 PM Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @robsonvitorm
          last edited by Mar 15, 2024, 5:38 PM

          @robsonvitorm
          So there is no routing here therefore nothing to do with the firewall.
          Hosts cant talk on the same vlan i would make sure that

          1. IP subnet masks are the same or correct (we're not crossing boundaries due to misconfig)
          2. If Windows machines, ensure the Windows firewall is disabled for troubleshooting

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          1 Reply Last reply Reply Quote 1
          • G
            Gertjan @robsonvitorm
            last edited by Mar 15, 2024, 5:40 PM

            @robsonvitorm said in Captive portal allows communication between guests:

            I have a request, so that two guests connected to the captive portal, in the same zone, can communicate.

            The important missing info is : get a pfSense, or whatever router you have laying around, hook up a switch, some access points and connect everything togerher.
            As soon as every device has a DHCP lease, you can remove the pfSense (router).
            You'll notice that traffic from to the internet isn't possible anymore. And I presume that I don't have to explain why.
            You'll notice also that all your network devices can still communicate among each other just fine.
            This is because : example : device on 192.168.1.2 doesn't need a router to interaction with for example 192.168.1.3.

            This is something you don't want on networks like a captive portal network.
            So, check your access points, and activate AP Isolation Mode. This mode will make inter device communication impossible. Devices can only communicate with the gateway == the router.

            This mode is very comparable with what Microsoft "Windows" calls Private versus Public network mode. When Public mode is active, you can't share anything, neither see other shares. The only thing that works is the Internet access.

            ** Actually : on a captive portal, you don't care. It's a non trusted network, full with unknown devices, and they are connected just to have an internet access. If Billy with device X want to attack Willy with device Z on the portal network, then that is their affair ^^

            Also : hosting a web server on a captive portal ? Are you sure ?

            @robsonvitorm said in Captive portal allows communication between guests:

            When curling http://IP2, from IP1, the message is displayed that there is no route to that destination. On the guest with IP2 there is an http service on port 80. When capturing with tcpdump, the packet arrives at the firewall, but is not forwarded. Something related to ARP.

            What ARP does : device with IP1 uses the arp protocol on the local network to ask : who has IP2 ?
            IP2 then will reply : It's me : here is my MAC.
            And then IP1 connect to IP2 directly using their MAC addresses, and all of this doesn't involve the firewall at all. proof : power down the firewall, and you can still connect.
            If IP2 (the web server) doesn't reply, go talk again to the admin (you didn't fire him yet ?) and ask him to finish his work.

            @robsonvitorm said in Captive portal allows communication between guests:

            I don't know where to adjust to allow this communication between two guests

            Very basic "your very first network ever" == two PC and a cross Ethernet cable.
            Assign a static IP and /mask to the first PC. Example 192.168.1.10/24
            Assign a static IP and /mask to the second PC Example 192.168.1.11/24.
            Now your network works : they can communicate. No firewall. No router / nos witch : nothing. Try it !?!

            @robsonvitorm said in Captive portal allows communication between guests:

            he aps for wireless network are unifi uap-ac-pro. In their configuration, the isolation option is not activated.

            Ah, ok, so you know about Isolation mode .....

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 1
            • R
              robsonvitorm @robsonvitorm
              last edited by Mar 15, 2024, 5:54 PM

              @robsonvitorm Both guests are Linux without firewall rules and policies like ACCEPT. In pfsense, I created a rule allowing everything (protocol, port and src and dst). What I forgot to mention is that the APs network is different, and is in another VLAN and broadcast. However, I pass the VLANS of each SSID, including guests. The netmasks on both are correct, as it is a medium network, using /22, delivered via DHCP on pfsense itself.

              M 1 Reply Last reply Mar 15, 2024, 5:57 PM Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @robsonvitorm
                last edited by Mar 15, 2024, 5:57 PM

                @robsonvitorm said in Captive portal allows communication between guests:

                In pfsense, I created a rule allowing everything (protocol, port and src and dst).

                why? traffic doesn't go through pfsense if they are in the same vlan?
                There is something blocking on the hosts themselves.

                APs having different management IPs is fine. traffic is not routed across the management interface

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                R 2 Replies Last reply Mar 15, 2024, 6:06 PM Reply Quote 1
                • R
                  robsonvitorm @michmoor
                  last edited by Mar 15, 2024, 6:06 PM

                  This post is deleted!
                  1 Reply Last reply Reply Quote 0
                  • R
                    robsonvitorm @michmoor
                    last edited by Mar 15, 2024, 6:08 PM

                    @michmoor just to rule out any possibility of the firewall blocking these connections... but there is still something blocking this communication.

                    G M R 3 Replies Last reply Mar 15, 2024, 6:16 PM Reply Quote 0
                    • G
                      Gertjan @robsonvitorm
                      last edited by Gertjan Mar 15, 2024, 6:19 PM Mar 15, 2024, 6:16 PM

                      @robsonvitorm
                      tcpdump on the IP2 host and you'll understand what happens ^^

                      edit : Who listens on port '80' :

                      netstat -naptul | grep ':80'
                      

                      Check also the firewall on that IP2 device.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      1 Reply Last reply Reply Quote 1
                      • M
                        michmoor LAYER 8 Rebel Alliance @robsonvitorm
                        last edited by Mar 15, 2024, 6:18 PM

                        @robsonvitorm
                        I agree. wireshark/tcpdump on each client. Perhaps application-related.
                        Are you able to ping each client?
                        Can you see other mac addresses from your client?

                        For example, on my linux hosts

                        arp -a
                        ? (10.105.1.15) at 28:8a:1c:45:fa:c0 [ether] on ens192
                        ? (10.105.1.27) at <incomplete> on ens192
                        ? (10.205.1.90) at 00:94:a1:12:39:82 [ether] on ens160
                        ? (10.205.1.32) at <incomplete> on ens160
                        ? (10.105.1.112) at 00:13:c6:01:5c:7d [ether] on ens192
                        ? (10.105.1.23) at 00:01:d7:ed:5e:c1 [ether] on ens160
                        ? (10.105.1.118) at 00:cc:34:56:59:12 [ether] on ens192
                        ? (10.205.1.90) at 00:94:a1:12:39:82 [ether] on ens192
                        

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        R 1 Reply Last reply Mar 15, 2024, 6:44 PM Reply Quote 1
                        • R
                          robsonvitorm @robsonvitorm
                          last edited by Mar 15, 2024, 6:39 PM

                          @robsonvitorm the firewall is disabled in both iptables without any rules and policies in accept

                          1 Reply Last reply Reply Quote 0
                          • R
                            robsonvitorm @michmoor
                            last edited by Mar 15, 2024, 6:44 PM

                            @michmoor see arp, only gateway. ICMP also no communication

                            login-to-view

                            login-to-view

                            R 1 Reply Last reply Mar 15, 2024, 6:49 PM Reply Quote 0
                            • R
                              robsonvitorm @robsonvitorm
                              last edited by Mar 15, 2024, 6:49 PM

                              @robsonvitorm tcpdump

                              tcpdump does not capture anything on the ICMP target host, as if nothing reached it.

                              root@XXX54:~# tcpdump -i wls2 host 10.17.200.14
                              tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
                              listening on wls2, link-type EN10MB (Ethernet), snapshot length 262144 bytes
                              ^C
                              0 packets captured
                              0 packets received by filter
                              0 packets dropped by kernel
                              
                              
                              M 1 Reply Last reply Mar 15, 2024, 10:01 PM Reply Quote 0
                              • M
                                michmoor LAYER 8 Rebel Alliance @robsonvitorm
                                last edited by michmoor Mar 15, 2024, 10:03 PM Mar 15, 2024, 10:01 PM

                                @robsonvitorm
                                You dont need to obfuscate private addresses (RFC1918) or mac addresses generally.
                                If you don't see packets leaving then you have a problem on the host level. Either your network stack on the host is corrupted or you got something else going on.

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                1 Reply Last reply Reply Quote 0
                                9 out of 15
                                • First post
                                  9/15
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.