Not redirecting to login page
-
The allowedip section is just a list of IPs / subnets that I want my clients behind the Captive Portal to be able to access even if not logged in.
Yes, 192.168.3.1 is my LAN. I'm connected via a wired cable and I have a 192.168.3.x IP address.
The captive portal works as it should only the redirecting to the login page doesnt.
-
On your PC, type
ipconfig /all
Is the DNS (IPv4) the same as the gateway (and server DHCP): 192.168.3.1 (and only that one) ? -
Yup, only that one.
And it isn't a DNS problem too, cause if I open like Google's IP address directly in the browser, I still get no redirect.
-
Ok.
Lets focus on the fact that your LAN (which has its own firewall and normally its own interface) is also your captive portal interface, using a different firewall.
Mine are seperated -> far more easy to handle.What are your LAN Firewall rules ?
Note that the LAN interface uses pf (Packet Filter). Your troubles must be related to a conflict some conflict.
https://doc.pfsense.org/index.php/How_can_I_see_the_full_PF_ruleset
-
One important thing to note is that this problem started after I upgraded pfSense w/ the multi instance captive portal.
Before that, everything was working fine.
In my LAN interface, I have a rule for WAN failover to a gateway group.
-
Multiple multi instance captive portal is a relative new thing.
A lot of work has been done last year, and their is no guarantee that every configuration type is upgraded correctly. This can explain unique (thus: hard to find) issues.Note down your basic config lines, and do what works great: reset all to default and reconfig your system step by step.
Normally, good setups are easy to setup (I guess I cans setup mine from scrath in about 20 minutes if I don't count the user database).Boot from Installer Live CD - re-install from zero.
-
same problem here with pfsense 2.1.3-RELEASE (i386)
built on Thu May 01 15:52:17 EDT 2014
FreeBSD 8.3-RELEASE-p16Authentification works when pointing to pfsense-ip on port 8000 but login page does not popup on client (navigation works on them)
here my $ ipfw -x zlycee show
65291 0 0 allow pfsync from any to any
65292 0 0 allow carp from any to any
65301 1339 50326 allow ip from any to any layer2 mac-type 0x0806,0x8035
65302 0 0 allow ip from any to any layer2 mac-type 0x888e,0x88c7
65303 0 0 allow ip from any to any layer2 mac-type 0x8863,0x8864
65307 53862 2477652 deny ip from any to any layer2 not mac-type 0x0800,0x86dd
65310 4344 534258 allow ip from any to { 255.255.255.255 or 192.168.100.1 } in
65311 6453 4800905 allow ip from { 255.255.255.255 or 192.168.100.1 } to any out
65312 0 0 allow icmp from { 255.255.255.255 or 192.168.100.1 } to any out icmptypes 0
65313 0 0 allow icmp from any to { 255.255.255.255 or 192.168.100.1 } in icmptypes 8
65314 49183 5707857 pipe tablearg ip from table(3) to any in
65315 0 0 pipe tablearg ip from any to table(4) in
65316 0 0 pipe tablearg ip from table(3) to any out
65317 88454 104014630 pipe tablearg ip from any to table(4) out
65318 0 0 pipe tablearg ip from table(1) to any in
65319 0 0 pipe tablearg ip from any to table(2) out
65532 0 0 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
65533 0 0 allow tcp from any to any out
65534 67 8004 deny ip from any to any
65535 0 0 allow ip from any to anyany help is welcome
-
@pietropaolo:
any help is welcome
As said, don't put the portal Interface on the LAN network.
Start from default settings, pfSense-out-of-the-box works.Btw:
fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
This means:
All TCP traffic coming IN on the interface,
Using port 80 as a destination,
Coming from everywhere,
Going where ever,
Will be forwarded to 127.0.0.1:8000
….. and from there the Portal Interface, listening on port 8000, will pick up.Note: Starting with https (port 443) like https://google.com or https://www.facebook.com will not works - this is by design ;)
The issue is - for both - that the ipfw rules don't seem to be used.
Like: conflict - wrong interface ...When I have some time this afternoon (GMT+1), I'll activate the Portal Interface on my LAN (didn't even knew that was possible).
I'll see what happens. -
As said, don't put the portal Interface on the LAN network.
Can you explain this further?
All the clients connected to the LAN interface are the clients I want to filter internet access using a captive portal. If I move my captive portal to OPT1 then I would have to move all my clients to OPT1. The setup would be exactly the same and the interface being the "LAN" interface shouldn't make a difference right?
-
….If I move my captive portal to OPT1 then I would have to move all my clients to OPT1.
My portal clients are hotel clients.
They don't know nothing about me using pfSense, my DNS, my DHCP, my Gateway (portal) IP, or what so ever.
The only thing they 'see' are these Wifi 'radio' names:
HotelWifi-1
HotelWifi-2
HotelWifi-3
etc.
Sometimes, the phone rings in the reception, and the client asks: Which one shall I chose ?
The answer is "What about the one with the strongest power ?" ;DWhat I want to say is: I never ever setup anything on a PC or other Wifi device of a client.
So, why should you ?
The setup would be exactly the same and the interface being the "LAN" interface shouldn't make a difference right?
Just one difference.
The one you looking for.
It will work because you will have the setup that we all use ….Normally, the LAN interface is for you own private access, other private PC's and network devices like your NAS, printer, whatever.
People that you don't "trust", like clients or other invited connections that you want to propose a Free Wifi network (Internet) access, you put them a separate LAN segment (OPT1), and special firewall rules on the OPT1 interface, like no netbios & Windows scatter, no connection to 'LAN', scripple P2P connection, limit bandwidth, etc etc.
This is what I think, the normal, standard setup. -
I just try pfsense live 2.0.3 and it works fine using LAN interface as the captive portal interface..except for the problem of https first page
Another problem i have to fix now..with certificate may be..let see.
-
I activated the Portal Interface on the my LAN - I merely activated Local User Manager, not touching any other settings.
This means I had two portal interfaces, one on OPT1, and one on the LAN.Just to be sure, I added the MAC of my PC to the MACC pass through page.
I switch on another PC on the LAN and launched a navigator.
Guess what popup up ? this one: http://www.test-domaine.fr/Capture-portal.PNG
I had access to the net after authentication …
I didn't really tested it for a long time, but a Portal Interface on LAN, it seems to work.