Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive Portal, Ruckus hotspot setup and POST request to a return URL question

    Scheduled Pinned Locked Moved General pfSense Questions
    16 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • getcomG
      getcom @stephenw10
      last edited by

      @stephenw10 I could not figure it out on Ruckus unleashed how to redirect to the pfSense captive portal if using a regular guest net.
      From my point of view this is only working if I configure a hotspot/WISPr WLAN in Ruckus unleashed but it does not provide a voucher login. The idea is to redirect to the pfSense for voucher login and after successful login on pfSense send a POST request to Ruckus with the needed information.
      Then the user is authorized and can hopefully use the internet.
      Do you have another idea to get this up and running as exprected?

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Just have a guest SSID on a separate VLAN and enable the captive portal on that VLAN in pfSense. No need to authenticate on the AP.

        getcomG 1 Reply Last reply Reply Quote 0
        • getcomG
          getcom @stephenw10
          last edited by

          @stephenw10
          A guest SSID is not working because Ruckus blocks the access to the private networks and also if I set a rule for accepting the pfsense IP and put it on top, Ruckus is still blocking. I set up a normal SSID and created the rules for blocking internal IPs except the pfSense IP then I will get the captive portal login page, can login with a voucher, and get internet access. I first try it with a guest SSID, then with a Hotspot/WISPr, first without the login page, second with the auth redirection URL POST issue. I will ask the Ruckus people why rules for the guest SSID is not working.

          1 Reply Last reply Reply Quote 1
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Sounds like 'guest ssid' implies some special setup in Ruckus world. But I'd expect just any additional SSID that can be tied to a VLAN would work.

            getcomG 1 Reply Last reply Reply Quote 0
            • getcomG
              getcom @stephenw10
              last edited by

              @stephenw10
              yes, this is what I have done now. It is working with a regular SSID with VLAN tag.
              There is a default check box for guest SSIDs to avoid traffic/access between clients. I assume that this is the reason why I could not get access to the pfSense captive portal even with setup a rule for it.
              The Ruckus world is sometimes special. I have used now the unleashed version for testing.
              The unleashed version is the cheaper one without a licence needed.
              I had implemented this setup together with the pfSense captive portal in the past for two hotels with the licenced version of the Ruckus access points plus a ZoneDirector controller. This was no problem at all.
              This behavior could also be related to the current firmware version. Doesn't matter, it is working now.
              Thank you for your time.

              stephenw10S 1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator @getcom
                last edited by

                @getcom said in Captive Portal, Ruckus hotspot setup and POST request to a return URL question:

                There is a default check box for guest SSIDs to avoid traffic/access between clients.

                That would normally only prevent access between wireless clients and not between wireless clients and wired hosts.

                1 Reply Last reply Reply Quote 0
                • S
                  sash11
                  last edited by

                  Hello. I am trying to configure captive portal on pfsense with Ruckus AP in the back end. I am struggling how to modify the authentication response. Can somedody help me, please? How should I modify the noauth.html with proper POST response for Ruckus to accept authenticated client? Where do these responses go?

                  https://${RuckusUnleashedFQDN}:9998/login
                  username=${USERNAME}
                  password=${PASSWORD}
                  client_mac=${client_mac}
                  uip=${uip}
                  url=${RETURN_URL}

                  getcomG 1 Reply Last reply Reply Quote 0
                  • getcomG
                    getcom @sash11
                    last edited by

                    @sash11 said in Captive Portal, Ruckus hotspot setup and POST request to a return URL question:

                    Hello. I am trying to configure captive portal on pfsense with Ruckus AP in the back end. I am struggling how to modify the authentication response. Can somedody help me, please? How should I modify the noauth.html with proper POST response for Ruckus to accept authenticated client? Where do these responses go?

                    https://${RuckusUnleashedFQDN}:9998/login
                    username=${USERNAME}
                    password=${PASSWORD}
                    client_mac=${client_mac}
                    uip=${uip}
                    url=${RETURN_URL}

                    This was also my fault. What you want to do is not working.

                    You do not need to setup anything special on Ruckus.
                    Just create a new ESSID without authentication in Ruckus unleashed and add a VLAN to this.
                    Then create this VLAN on pfSense, setup a DHCP server, add this VLAN to your managed switches, setup the ports where the Ruckus APs are connected to trunk ports, join the VLAN on this ports. Rest is done in pfSense in the Captive Portal section without anything special except that you use the configured VLAN as interface.
                    If you need screenshots then I can do that next few days.

                    Ralf

                    S 1 Reply Last reply Reply Quote 1
                    • S
                      sash11 @getcom
                      last edited by sash11

                      @getcom
                      The config out of the box does not seem to work. Ruckus ends up blocking all traffic but the local subnet, since clients are not authorized. Here is how I have it configured:
                      Ruckus Unleashed side:

                      Screenshot 2024-11-27 at 10.34.04.jpg

                      Screenshot 2024-11-27 at 10.35.00.jpg

                      Screenshot 2024-11-27 at 10.35.53.jpg

                      Pfsense side:
                      Screenshot 2024-11-27 at 10.47.53.jpg

                      Client is not authorized in unleashed:
                      Screenshot 2024-11-27 at 10.49.15.jpg

                      The work around I am using now is to allow everything to pass in pre authorization in walled garden. But I would like to have it working properly if possible....
                      Screenshot 2024-11-27 at 10.56.11.jpg

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Hmm, you seem to be trying to run two captive portals there. I'm no sure why you're trying to run CP in pfSense if the AP is already redirecting traffic. or conversely why the AP is redirceting traffic if pfSense is running CP, it should just pass all traffic to pfSense.

                        S 1 Reply Last reply Reply Quote 0
                        • S
                          sash11 @stephenw10
                          last edited by

                          @stephenw10
                          If I choose hotspot wifi type on AP, I have to use external portal. It can be any external portal. It just happens that pfsense has one already built-in, so I am trying to use that.
                          If I choose Guest type of wifi network, I can utilize built-in portal on Ruckus AP. But nowhere I am using two CP at the same time.

                          1 Reply Last reply Reply Quote 1
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Well disable that 'smart client' redirect stuff then. No redirect of any of the pfSense details should be required. It should just pass traffic at layer 2 and pfSense does all the authentication/login.

                            getcomG 1 Reply Last reply Reply Quote 0
                            • getcomG
                              getcom @stephenw10
                              last edited by

                              @sash11

                              This is the correct setup on Ruckus:

                              7c05d5ce-61af-42aa-862d-ed3fce0e8241-grafik.png

                              Just setup a standard WiFi with VLAN XXX, then add this VLAN to your switches, change the switch ports of your Ruckus APs from "access" to "trunk" and join the ports as tagged VLAN.
                              Next setup is on the pfSense site: add this VLAN, setup an interface for this VLAN, setup DHCP on this interface, add a Captive Portal for this interface.
                              In Captive Portal check follwing:

                              • Reset waiting period
                              • Preserve users database
                              • Reauthenticate Users
                              • Local Authentication Privileges
                              • Login

                              Add a HTTPS server name, e.g. guestlogin.yoursite.tld and add a host override in DNS resolver with IP of your VLAN interface.
                              Choose your certificate (we are using letsencrypt).

                              Done. It is working then.

                              Next would be a custom login site...

                              S 1 Reply Last reply Reply Quote 1
                              • S
                                sash11 @getcom
                                last edited by sash11

                                @getcom
                                Thank you! That worked!

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.