Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    If one pass captive portal and the other is pass (no need auth) ??

    Scheduled Pinned Locked Moved Captive Portal
    14 Posts 5 Posters 6.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      buraglio
      last edited by

      What is your wireless Access point that the clients are associating to?  Some consumer grade hardware will masquerade the MAC address making it seem that all clients are coming from the same MAC, so, when the first client authenticated, his MAC is added to the pass list, and any subsequent connections are passed because they are sourced with the same MAC.

      nb

      https://www.forwardingplane.net/

      1 Reply Last reply Reply Quote 0
      • J
        jet0202ttt
        last edited by

        thank your replay ….
                    | wan
                    |
                pfsense
                    |  lan
                    |
                    |  wan 
                  wireless ap
                    |
                    | lan (enable dhcp)
              client1  client2
        I think the key point is wreless ap wan gateway is point to pfsense lan,
        clinet1 and client2 have the same ip (wireless wan ) when they
        connect to pfsense captive portal, so if one have pass through authenticated
        the other is pass without authentication

        so why can i do, to make every client connet to pfsense have themself ip address
        , use NAT or another ??????

        1 Reply Last reply Reply Quote 0
        • B
          buraglio
          last edited by

          It sounds like you're using another router with wireless built into it for your wireless access, which also means you're likely also doing dual PAT.  I always recommend against any kind of dual PAT/NAT because it adds levels of unnecessary complexity, but if you're willing to support it, have at it. 
          Personally, I'd switch to a real access point that just bridges wireless traffic.  You could probably do some 1:1 NAT trickery on the wireless router and maybe make it work but thats not really a best practice solution or something I want to get into on so you're on your own with that one.

          I'd recommend something like this:

          WAN
                      |
                      |
                pfsense
                      | (dhcp server)
                      | (LAN)
                Switch
                |        |
                |        |
                |    Wireless AP
                |                    |
            Wired LAN Clients  |
                                      |
                                Wireless LAN clients

          nb

          https://www.forwardingplane.net/

          1 Reply Last reply Reply Quote 0
          • J
            jet0202ttt
            last edited by

            thank you any way :

            | wan (to internet)
                      pfsense
                        | lan (enable captive portal)
                        |
                        |  wan
                      wireless ap

            client1  client2

            client1 and client2 all is wireless client

            1 Reply Last reply Reply Quote 0
            • J
              joe_adk
              last edited by

              I have a similar problem with guests adding their own wireless routers, and leaving it unsecured. This bypasses captive portal for 2-n users, as long as the guest logs in the first time. Anyone know how to stop that?

              1 Reply Last reply Reply Quote 0
              • B
                buraglio
                last edited by

                That is a tough one especially if they do NAT.  Low timeout values on the login page and a lot of user education is the real way to handle it.  A lot of stumbling for the locations of rogue access points, etc.  It's a pain. 
                I had to deal with it a little and basically went around shutting down ports on the switches (after using flow data / arp to determine best guess which port(s) they are coming from).  It's a bit of a "sledgehammer to kill a fly" way of doing it but it works.  No one plugs that crap in anymore or else they get shut down till I feel like turning them back on.

                https://www.forwardingplane.net/

                1 Reply Last reply Reply Quote 0
                • T
                  tomdchi
                  last edited by

                  What I am attempting to do and I think it should work in your case also is this.  Don't have a login page on the captive portal.  Authenticate via mac address only.  The captive portal can have sign up info and you can set the ip's to your website for ordering in the allow ip's section.

                  One other thing to try is to map the known mac addresses to a static ip's for your dhcp server.  Then set a allias for the dhcp addresse range.  use the alias in the traffic shapper with the penalize function and throttle the bandwidth way down.  This one would be the easiest to try and while it would not stop the problem the connection they get while using a wireless router will be crap.

                  1 Reply Last reply Reply Quote 0
                  • B
                    buraglio
                    last edited by

                    This would work, in a way, but most of the wireless broadband routers will clone MACs (if they are worth a darn) and the bandwidth may not (read: won't be) be the issue.  The amount of flows generated, in my experience, is almost always more of an issue.  Too many flows can crumble a lower end router/firewall/etc.

                    https://www.forwardingplane.net/

                    1 Reply Last reply Reply Quote 0
                    • E
                      eri--
                      last edited by

                      There is a software called p0f which claims to identify NAT and other things.
                      Part of it is implemented in pf for OS detection but not for the NAT part and i do not know how successful it is at finding such things.
                      AFAIK the technique it uses to find NATed traffic is reliable especially when the NATed environment is from inexperienced users.

                      1 Reply Last reply Reply Quote 0
                      • J
                        joe_adk
                        last edited by

                        Thanks, everyone, for replying. p0f http://lcamtuf.coredump.cx/p0f.shtml sounds like what I would want (and what I was hoping was available). I currently use the buraglio method, but it is time consuming.

                        1 Reply Last reply Reply Quote 0
                        • E
                          eri--
                          last edited by

                          Do a feature request for this and comment if you are willing to test and support this in any way so i doesn't get forgotten.

                          1 Reply Last reply Reply Quote 0
                          • B
                            buraglio
                            last edited by

                            I've used p0f for some other stuff (baselining active OSs on the networ, etc) but it does seem like a good package to have in pfsense.  I've had mixed results using it to "discover" NAT, it may have improved since I last used it.  I ran it off of an optical tap and a copper SPAN, it may work better inline (although I don't see why it would really make a difference).  I've been wrong before.

                            I'd be willing to test this and help in making it a package as time permits.

                            nb

                            https://www.forwardingplane.net/

                            1 Reply Last reply Reply Quote 0
                            • E
                              eri--
                              last edited by

                              I replied at this other post.
                              http://forum.pfsense.org/index.php/topic,10392.0.html

                              Please, keep this under the same thread so it can be tracked easily.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.