Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Not redirecting to login page

    Scheduled Pinned Locked Moved Captive Portal
    14 Posts 3 Posters 4.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      engwan
      last edited by

      The allowedip section is just a list of IPs / subnets that I want my clients behind the Captive Portal to be able to access even if not logged in.

      Yes, 192.168.3.1 is my LAN. I'm connected via a wired cable and I have a 192.168.3.x IP address.

      The captive portal works as it should only the redirecting to the login page doesnt.

      1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan
        last edited by

        On your PC, type
        ipconfig /all
        Is the DNS (IPv4) the same as the gateway (and server DHCP): 192.168.3.1 (and only that one) ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • E
          engwan
          last edited by

          Yup, only that one.

          And it isn't a DNS problem too, cause if I open like Google's IP address directly in the browser, I still get no redirect.

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by

            Ok.
            Lets focus on the fact that your LAN (which has its own firewall and normally its own interface) is also your captive portal interface, using a different firewall.
            Mine are seperated -> far more easy to handle.

            What are your LAN Firewall rules ?

            Note that the LAN interface uses pf (Packet Filter). Your troubles must be related to a conflict some conflict.

            https://doc.pfsense.org/index.php/How_can_I_see_the_full_PF_ruleset

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • E
              engwan
              last edited by

              One important thing to note is that this problem started after I upgraded pfSense w/ the multi instance captive portal.

              Before that, everything was working fine.

              In my LAN interface, I have a rule for WAN failover to a gateway group.

              1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan
                last edited by

                Multiple multi instance captive portal is a relative new thing.
                A lot of work has been done last year, and their is no guarantee that every configuration type is upgraded correctly. This can explain unique (thus: hard to find) issues.

                Note down your basic config lines, and do what works great: reset all to default and reconfig your system step by step.
                Normally, good setups are easy to setup (I guess I cans setup mine from scrath in about 20 minutes if I don't count the user database).

                Boot from Installer Live CD - re-install from zero.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 0
                • ?
                  A Former User
                  last edited by

                  same problem here with pfsense 2.1.3-RELEASE (i386)
                  built on Thu May 01 15:52:17 EDT 2014
                  FreeBSD 8.3-RELEASE-p16

                  Authentification works when pointing to pfsense-ip on port 8000 but login page does not popup on client (navigation works on them)

                  here my $ ipfw -x zlycee show
                  65291    0        0 allow pfsync from any to any
                  65292    0        0 allow carp from any to any
                  65301  1339    50326 allow ip from any to any layer2 mac-type 0x0806,0x8035
                  65302    0        0 allow ip from any to any layer2 mac-type 0x888e,0x88c7
                  65303    0        0 allow ip from any to any layer2 mac-type 0x8863,0x8864
                  65307 53862  2477652 deny ip from any to any layer2 not mac-type 0x0800,0x86dd
                  65310  4344    534258 allow ip from any to { 255.255.255.255 or 192.168.100.1 } in
                  65311  6453  4800905 allow ip from { 255.255.255.255 or 192.168.100.1 } to any out
                  65312    0        0 allow icmp from { 255.255.255.255 or 192.168.100.1 } to any out icmptypes 0
                  65313    0        0 allow icmp from any to { 255.255.255.255 or 192.168.100.1 } in icmptypes 8
                  65314 49183  5707857 pipe tablearg ip from table(3) to any in
                  65315    0        0 pipe tablearg ip from any to table(4) in
                  65316    0        0 pipe tablearg ip from table(3) to any out
                  65317 88454 104014630 pipe tablearg ip from any to table(4) out
                  65318    0        0 pipe tablearg ip from table(1) to any in
                  65319    0        0 pipe tablearg ip from any to table(2) out
                  65532    0        0 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
                  65533    0        0 allow tcp from any to any out
                  65534    67      8004 deny ip from any to any
                  65535    0        0 allow ip from any to any

                  any help is welcome

                  1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan
                    last edited by

                    @pietropaolo:

                    any help is welcome

                    As said, don't put the portal Interface on the LAN network.
                    Start  from default settings, pfSense-out-of-the-box works.

                    Btw:

                    fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
                    

                    This means:
                    All TCP traffic coming IN on the interface,
                    Using port 80 as a destination,
                    Coming from everywhere,
                    Going where ever,
                    Will be forwarded to 127.0.0.1:8000
                    ….. and from there the Portal Interface, listening on port 8000, will pick up.

                    Note: Starting with https (port 443) like https://google.com or https://www.facebook.com will not works - this is by design  ;)

                    The issue is - for both - that the ipfw rules don't seem to be used.
                    Like: conflict - wrong interface ...

                    When I have some time this afternoon (GMT+1), I'll activate the Portal Interface on my LAN (didn't even knew that was possible).
                    I'll see what happens.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    1 Reply Last reply Reply Quote 0
                    • E
                      engwan
                      last edited by

                      As said, don't put the portal Interface on the LAN network.

                      Can you explain this further?

                      All the clients connected to the LAN interface are the clients I want to filter internet access using a captive portal. If I move my captive portal to OPT1 then I would have to move all my clients to OPT1. The setup would be exactly the same and the interface being the "LAN" interface shouldn't make a difference right?

                      1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan
                        last edited by

                        @engwan:

                        ….If I move my captive portal to OPT1 then I would have to move all my clients to OPT1.

                        My portal clients are hotel clients.
                        They don't know nothing about me using pfSense, my DNS, my DHCP, my Gateway (portal) IP, or what so ever.
                        The only thing they 'see' are these Wifi 'radio' names:
                        HotelWifi-1
                        HotelWifi-2
                        HotelWifi-3
                        etc.
                        Sometimes, the phone rings in the reception, and the client asks: Which one shall I chose ?
                        The answer is "What about the one with the strongest power ?"  ;D

                        What I want to say is: I never ever setup anything on a PC or other Wifi device of a client.

                        So, why should you ?

                        @engwan:

                        The setup would be exactly the same and the interface being the "LAN" interface shouldn't make a difference right?

                        Just one difference.
                        The one you looking for.
                        It will work because you will have the setup that we all use ….

                        Normally, the LAN interface is for you own private access, other private PC's and network devices like your NAS, printer, whatever.
                        People that you don't "trust", like clients or other invited connections that you want to propose a Free Wifi network (Internet) access, you put them  a separate LAN segment (OPT1), and special firewall rules on the OPT1 interface, like no netbios & Windows  scatter, no connection to 'LAN', scripple P2P connection, limit bandwidth, etc etc.
                        This is what I think, the normal, standard setup.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        1 Reply Last reply Reply Quote 0
                        • ?
                          A Former User
                          last edited by

                          I just try pfsense live 2.0.3 and it works fine using LAN interface as the captive portal interface..except for the problem of https first page

                          Another problem i have to fix now..with certificate may be..let see.

                          1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan
                            last edited by

                            I activated the Portal Interface on the my LAN - I merely activated Local User Manager, not touching any other settings.
                            This means I had two portal interfaces, one on OPT1, and one on the LAN.

                            Just to be sure, I added the MAC of my PC to the MACC pass through page.

                            I switch on another PC on the LAN and launched a navigator.
                            Guess what popup up ? this one: http://www.test-domaine.fr/Capture-portal.PNG
                            I had access to the net after authentication …
                            I didn't really tested it for a long time, but a Portal Interface on LAN, it seems to work.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.