Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [SOLVED] CP not working (1.2.3) - passes ALL traffic without auth

    Captive Portal
    5
    13
    7.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      luken
      last edited by

      Hello,

      I have a clean install pfSense 1.2.3-RELEASE (from liveCD).

      CP enabled on LAN (fxp1) iface with local user manager and a list allowed IP (3 x AP not in list)

      
      $ ipfw list
      00030 skipto 50000 ip from any to any in via fxp0 keep-state
      00500 allow pfsync from any to any
      00500 allow carp from any to any
      00500 allow ip from 10.22.21.1 to any out via fxp1
      00501 allow ip from any to 10.22.21.1 in via fxp1
      01000 skipto 50000 ip from any to any not layer2 not via fxp1
      01001 allow ip from any to any layer2 not via fxp1
      01100 allow ip from any to any layer2 mac-type 0x0806
      01100 allow ip from any to any layer2 mac-type 0x888e
      01100 allow ip from any to any layer2 mac-type 0x88c7
      01100 allow ip from any to any layer2 mac-type 0x8863
      01100 allow ip from any to any layer2 mac-type 0x8864
      01100 allow ip from any to any layer2 mac-type 0x8863
      01100 allow ip from any to any layer2 mac-type 0x8864
      01100 allow ip from any to any layer2 mac-type 0x888e
      01101 deny ip from any to any layer2 not mac-type 0x0800
      01102 skipto 20000 ip from any to any layer2
      01200 allow udp from any 68 to 255.255.255.255 dst-port 67 in
      01201 allow udp from any 68 to 10.22.21.1 dst-port 67 in
      01202 allow udp from 10.22.21.1 67 to any dst-port 68 out
      01203 allow icmp from 10.22.21.1 to any out icmptypes 8
      01204 allow icmp from any to 10.22.21.1 in icmptypes 0
      01300 allow udp from any to 10.22.21.1 dst-port 53 in
      01300 allow udp from any to 10.22.21.1 dst-port 53 in
      01301 allow udp from 10.22.21.1 53 to any out
      01301 allow udp from 10.22.21.1 53 to any out
      01302 allow tcp from any to 10.22.21.1 dst-port 8000 in
      01302 allow tcp from any to 10.22.21.1 dst-port 8000 in
      01303 allow tcp from 10.22.21.1 8000 to any out
      01303 allow tcp from 10.22.21.1 8000 to any out
      10000 skipto 50000 ip from 10.22.21.11 to any in
      10000 skipto 50000 ip from any to 10.22.21.11 out
      10001 skipto 50000 ip from 10.22.21.12 to any in
      10001 skipto 50000 ip from any to 10.22.21.12 out
      10002 skipto 50000 ip from 10.22.21.13 to any in
      10002 skipto 50000 ip from any to 10.22.21.13 out
      10003 skipto 50000 ip from 10.22.21.14 to any in
      10003 skipto 50000 ip from any to 10.22.21.14 out
      10004 skipto 50000 ip from 10.22.21.15 to any in
      10004 skipto 50000 ip from any to 10.22.21.15 out
      10005 skipto 50000 ip from 10.22.21.16 to any in
      10005 skipto 50000 ip from any to 10.22.21.16 out
      10006 skipto 50000 ip from 10.22.21.17 to any in
      10006 skipto 50000 ip from any to 10.22.21.17 out
      10007 skipto 50000 ip from 10.22.21.18 to any in
      10007 skipto 50000 ip from any to 10.22.21.18 out
      10008 skipto 50000 ip from 10.22.21.19 to any in
      10008 skipto 50000 ip from any to 10.22.21.19 out
      10009 skipto 50000 ip from 10.22.21.2 to any in
      10009 skipto 50000 ip from any to 10.22.21.2 out
      10010 skipto 50000 ip from 10.22.21.20 to any in
      10010 skipto 50000 ip from any to 10.22.21.20 out
      10011 skipto 50000 ip from 10.22.21.21 to any in
      10011 skipto 50000 ip from any to 10.22.21.21 out
      10012 skipto 50000 ip from 10.22.21.22 to any in
      10012 skipto 50000 ip from any to 10.22.21.22 out
      10013 skipto 50000 ip from 10.22.21.23 to any in
      10013 skipto 50000 ip from any to 10.22.21.23 out
      10014 skipto 50000 ip from 10.22.21.24 to any in
      10014 skipto 50000 ip from any to 10.22.21.24 out
      10015 skipto 50000 ip from 10.22.21.25 to any in
      10015 skipto 50000 ip from any to 10.22.21.25 out
      10016 skipto 50000 ip from 10.22.21.26 to any in
      10016 skipto 50000 ip from any to 10.22.21.26 out
      10017 skipto 50000 ip from 10.22.21.27 to any in
      10017 skipto 50000 ip from any to 10.22.21.27 out
      10018 skipto 50000 ip from 10.22.21.28 to any in
      10018 skipto 50000 ip from any to 10.22.21.28 out
      10019 skipto 50000 ip from 10.22.21.29 to any in
      10019 skipto 50000 ip from any to 10.22.21.29 out
      10020 skipto 50000 ip from 10.22.21.30 to any in
      10020 skipto 50000 ip from any to 10.22.21.30 out
      10021 skipto 50000 ip from 10.22.21.31 to any in
      10021 skipto 50000 ip from any to 10.22.21.31 out
      10022 skipto 50000 ip from 10.22.21.32 to any in
      10022 skipto 50000 ip from any to 10.22.21.32 out
      10023 skipto 50000 ip from 10.22.21.33 to any in
      10023 skipto 50000 ip from any to 10.22.21.33 out
      10024 skipto 50000 ip from 10.22.21.34 to any in
      10024 skipto 50000 ip from any to 10.22.21.34 out
      10025 skipto 50000 ip from 10.22.21.35 to any in
      10025 skipto 50000 ip from any to 10.22.21.35 out
      10026 skipto 50000 ip from 10.22.21.36 to any in
      10026 skipto 50000 ip from any to 10.22.21.36 out
      10027 skipto 50000 ip from 10.22.21.37 to any in
      10027 skipto 50000 ip from any to 10.22.21.37 out
      10028 skipto 50000 ip from 10.22.21.38 to any in
      10028 skipto 50000 ip from any to 10.22.21.38 out
      10029 skipto 50000 ip from 10.22.21.39 to any in
      10029 skipto 50000 ip from any to 10.22.21.39 out
      10030 skipto 50000 ip from 10.22.21.40 to any in
      10030 skipto 50000 ip from any to 10.22.21.40 out
      10031 skipto 50000 ip from 10.22.21.41 to any in
      10031 skipto 50000 ip from any to 10.22.21.41 out
      10032 skipto 50000 ip from 10.22.21.42 to any in
      10032 skipto 50000 ip from any to 10.22.21.42 out
      10033 skipto 50000 ip from 10.22.21.43 to any in
      10033 skipto 50000 ip from any to 10.22.21.43 out
      10034 skipto 50000 ip from 10.22.21.44 to any in
      10034 skipto 50000 ip from any to 10.22.21.44 out
      10035 skipto 50000 ip from 10.22.21.45 to any in
      10035 skipto 50000 ip from any to 10.22.21.45 out
      10036 skipto 50000 ip from 10.22.21.46 to any in
      10036 skipto 50000 ip from any to 10.22.21.46 out
      10037 skipto 50000 ip from 10.22.21.47 to any in
      10037 skipto 50000 ip from any to 10.22.21.47 out
      10038 skipto 50000 ip from 10.22.21.48 to any in
      10038 skipto 50000 ip from any to 10.22.21.48 out
      10039 skipto 50000 ip from 10.22.21.49 to any in
      10039 skipto 50000 ip from any to 10.22.21.49 out
      10040 skipto 50000 ip from 10.22.21.50 to any in
      10040 skipto 50000 ip from any to 10.22.21.50 out
      10041 skipto 50000 ip from 212.191.64.10 to any in
      10041 skipto 50000 ip from any to 212.191.64.10 out
      10042 skipto 50000 ip from any to 212.191.64.10 in
      10042 skipto 50000 ip from 212.191.64.10 to any out
      10043 pipe 50543 ip from 10.22.21.7 to any in
      10043 pipe 55543 ip from any to 10.22.21.7 out
      19902 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
      19903 allow tcp from any 80 to any out
      19904 deny ip from any to any
      29900 allow ip from any to any layer2
      65535 allow ip from any to any
      

      and.. there is NO login page. Users from AP (10.22.21.3 ,6 ,7) can access internet unrestricted.

      I belive this is not the way how CP should work..

      I would be grateful for any help you could give me.

      1 Reply Last reply Reply Quote 0
      • GruensFroeschliG
        GruensFroeschli
        last edited by

        Did you make sure that your APs don't NAT?
        If you allow traffic from the IPs/MACs of the APs and your APs do NAT, then all traffic from your clients will appear as if from the AP.

        We do what we must, because we can.

        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

        1 Reply Last reply Reply Quote 0
        • L
          luken
          last edited by

          Thanks for the reply.

          APs do NAT.

          192.168.1.0/24 <-> AP1 (10.22.21.3) <-> Gateway (10.22.21.1)

          ..but 10.22.21.3 is NOT on allowed list, so users should be redirected to CP.

          Please correct me, if I'm wrong..

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by

            Hummm.

            My C.P. IP (on Opt1) is 192.168.2.1
            I have 5 Ap's : 192.168.2.2 - 3 -4 - 5 - 6
            The DHCP server running on the C.P. is throwing out IP's on requests from 192.168.2.10 up untill 192.168.2.200
            My AP do not NAT neither.
            It works a published.

            YOU :
            @luken:

            192.168.1.0/24 <-> AP1 (10.22.21.3) <-> Gateway (10.22.21.1)

            192.168.1.0/24 is the IP set given to your clients ??
            Your clienst should have an IP that runs from 10.22.21.10 (or more) up untill 10.22.21.254 - the 192.168.1.0 seems wrong to me here.
            Who converts from 192.168.1.0/24 to 10.22.21.1 (btw : this is called NATting  :D)

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • L
              luken
              last edited by

              @Gertjan:

              192.168.1.0/24 is the IP set given to your clients ??
              Your clienst should have an IP that runs from 10.22.21.10 (or more) up untill 10.22.21.254 - the 192.168.1.0 seems wrong to me here.
              Who converts from 192.168.1.0/24 to 10.22.21.1 (btw : this is called NATting  :D)

              Yes. Once again:

              
              wifi-client1 (192.168.1.53 via DHCP )---<>
                                                                         (192.168.1.1) AP1 (NAT) (10.22.21.3 static)  <> (10.22.21.1) Gateway
              wifi-client2 (192.168.1.78 via DHCP )---<>
              
              

              Wi-fi clients network shouldn't be a problem when they are translating on AP.. (Am I wrong?)

              Today I checked again. Strange, but sometimes wifi client is redirected to login page, sometimes - not.  ???
              Please, help me diagnose this.

              1 Reply Last reply Reply Quote 0
              • GruensFroeschliG
                GruensFroeschli
                last edited by

                The CP will show up for the first client to authenticate.
                After that the MAC/IP of the AP is authenticated and all further clients can just go online.

                Wi-fi clients network shouldn't be a problem when they are translating on AP.. (Am I wrong?)

                Yes you are wrong.
                NAT breaks the CP functionality.
                (This is not a pfSense limitation. This is just how CPs work)

                We do what we must, because we can.

                Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                1 Reply Last reply Reply Quote 0
                • L
                  luken
                  last edited by

                  Many thanks GruensFroeschli! :) I undarstand now.

                  What should I do to auth client connecting from APs (WRT320N) on pfSense?

                  Thanks again.

                  EDIT:
                  PS: Since this is not CP-related problem I'm not sure is this a right place for my topic. Anyway modarators decide :)

                  1 Reply Last reply Reply Quote 0
                  • 0
                    0tt0
                    last edited by

                    @luken:

                    Many thanks GruensFroeschli! :) I undarstand now.

                    What should I do to auth client connecting from APs (WRT320N) on pfSense?

                    Thanks again.

                    EDIT:
                    PS: Since this is not CP-related problem I'm not sure is this a right place for my topic. Anyway modarators decide :)

                    You should use an access point and not a NAT-router which you are using now, yours just happen to have an built-in access point. If your router can be set to AP mode (some can) use that (will bridge clients onto local net) otherwise buy a real access point and add that to your network. Now your built-in access point in the router is bridging clients onto the local net behind the router itself.

                    Apart from this issue with router/ap, you may also have the same problem that I have with CP, providing that you're not mistaken in your info regarding allowed list. Indeed you should see logon page at least once.

                    Some of my posts regarding my problems with CP: http://forum.pfsense.org/index.php/topic,20206.0.html

                    Cheers,

                    1 Reply Last reply Reply Quote 0
                    • C
                      capnsteve
                      last edited by

                      You can do this just fine with a WRT320N, I'm using one on my home pfSense server.  Just disable the DHCP server on the Router and set it up with a static IP outside pfSense's DHCP range.  Works without issue for me.

                      1 Reply Last reply Reply Quote 0
                      • GruensFroeschliG
                        GruensFroeschli
                        last edited by

                        @capnsteve:

                        You can do this just fine with a WRT320N, I'm using one on my home pfSense server.  Just disable the DHCP server on the Router and set it up with a static IP outside pfSense's DHCP range.  Works without issue for me.

                        In your case you must be routing and not NATing.
                        If you NAT it wouldn't work.

                        We do what we must, because we can.

                        Asking questions the smart way: http://www.catb.org/esr/faqs/smart-questions.html

                        1 Reply Last reply Reply Quote 0
                        • C
                          capnsteve
                          last edited by

                          @GruensFroeschli:

                          @capnsteve:

                          You can do this just fine with a WRT320N, I'm using one on my home pfSense server.  Just disable the DHCP server on the Router and set it up with a static IP outside pfSense's DHCP range.  Works without issue for me.

                          In your case you must be routing and not NATing.
                          If you NAT it wouldn't work.

                          I was providing specific-case instructions from my own experience.  In the standard issue Linksys firmware you just disable the DHCP server and set it to do DHCP forwarding pointed at the pfSense box.  That will also disable the NAT leaving the routing functions.

                          1 Reply Last reply Reply Quote 0
                          • 0
                            0tt0
                            last edited by

                            @capnsteve:

                            @GruensFroeschli:

                            @capnsteve:

                            You can do this just fine with a WRT320N, I'm using one on my home pfSense server.  Just disable the DHCP server on the Router and set it up with a static IP outside pfSense's DHCP range.  Works without issue for me.

                            In your case you must be routing and not NATing.
                            If you NAT it wouldn't work.

                            I was providing specific-case instructions from my own experience.  In the standard issue Linksys firmware you just disable the DHCP server and set it to do DHCP forwarding pointed at the pfSense box.  That will also disable the NAT leaving the routing functions.

                            In your specific case that may be correct but generally no. Many SOHO routers have the ability to shut down DHCP service but that don't have to imply that NAT is also turned off, it's a separate setting, if available.

                            Neither is the same workings as a standard bridging AP though. Bridging is not the same as routing and in general terms they are very different, the former is data link and the latter is network.

                            Cheers,

                            1 Reply Last reply Reply Quote 0
                            • L
                              luken
                              last edited by

                              Thanks.

                              I've just disabled DHCP server on wrt320n (and also wrt610n) and changed plug with inet source from WAN to LAN.
                              IP list based pass through -> mac list (for wired network)

                              CP works like a charm. :)

                              SOLVED.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.