Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Not redirecting to login page

    Scheduled Pinned Locked Moved Captive Portal
    14 Posts 3 Posters 4.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      engwan
      last edited by

      Yup, only that one.

      And it isn't a DNS problem too, cause if I open like Google's IP address directly in the browser, I still get no redirect.

      1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan
        last edited by

        Ok.
        Lets focus on the fact that your LAN (which has its own firewall and normally its own interface) is also your captive portal interface, using a different firewall.
        Mine are seperated -> far more easy to handle.

        What are your LAN Firewall rules ?

        Note that the LAN interface uses pf (Packet Filter). Your troubles must be related to a conflict some conflict.

        https://doc.pfsense.org/index.php/How_can_I_see_the_full_PF_ruleset

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • E
          engwan
          last edited by

          One important thing to note is that this problem started after I upgraded pfSense w/ the multi instance captive portal.

          Before that, everything was working fine.

          In my LAN interface, I have a rule for WAN failover to a gateway group.

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by

            Multiple multi instance captive portal is a relative new thing.
            A lot of work has been done last year, and their is no guarantee that every configuration type is upgraded correctly. This can explain unique (thus: hard to find) issues.

            Note down your basic config lines, and do what works great: reset all to default and reconfig your system step by step.
            Normally, good setups are easy to setup (I guess I cans setup mine from scrath in about 20 minutes if I don't count the user database).

            Boot from Installer Live CD - re-install from zero.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • ?
              A Former User
              last edited by

              same problem here with pfsense 2.1.3-RELEASE (i386)
              built on Thu May 01 15:52:17 EDT 2014
              FreeBSD 8.3-RELEASE-p16

              Authentification works when pointing to pfsense-ip on port 8000 but login page does not popup on client (navigation works on them)

              here my $ ipfw -x zlycee show
              65291    0        0 allow pfsync from any to any
              65292    0        0 allow carp from any to any
              65301  1339    50326 allow ip from any to any layer2 mac-type 0x0806,0x8035
              65302    0        0 allow ip from any to any layer2 mac-type 0x888e,0x88c7
              65303    0        0 allow ip from any to any layer2 mac-type 0x8863,0x8864
              65307 53862  2477652 deny ip from any to any layer2 not mac-type 0x0800,0x86dd
              65310  4344    534258 allow ip from any to { 255.255.255.255 or 192.168.100.1 } in
              65311  6453  4800905 allow ip from { 255.255.255.255 or 192.168.100.1 } to any out
              65312    0        0 allow icmp from { 255.255.255.255 or 192.168.100.1 } to any out icmptypes 0
              65313    0        0 allow icmp from any to { 255.255.255.255 or 192.168.100.1 } in icmptypes 8
              65314 49183  5707857 pipe tablearg ip from table(3) to any in
              65315    0        0 pipe tablearg ip from any to table(4) in
              65316    0        0 pipe tablearg ip from table(3) to any out
              65317 88454 104014630 pipe tablearg ip from any to table(4) out
              65318    0        0 pipe tablearg ip from table(1) to any in
              65319    0        0 pipe tablearg ip from any to table(2) out
              65532    0        0 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
              65533    0        0 allow tcp from any to any out
              65534    67      8004 deny ip from any to any
              65535    0        0 allow ip from any to any

              any help is welcome

              1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan
                last edited by

                @pietropaolo:

                any help is welcome

                As said, don't put the portal Interface on the LAN network.
                Start  from default settings, pfSense-out-of-the-box works.

                Btw:

                fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
                

                This means:
                All TCP traffic coming IN on the interface,
                Using port 80 as a destination,
                Coming from everywhere,
                Going where ever,
                Will be forwarded to 127.0.0.1:8000
                ….. and from there the Portal Interface, listening on port 8000, will pick up.

                Note: Starting with https (port 443) like https://google.com or https://www.facebook.com will not works - this is by design  ;)

                The issue is - for both - that the ipfw rules don't seem to be used.
                Like: conflict - wrong interface ...

                When I have some time this afternoon (GMT+1), I'll activate the Portal Interface on my LAN (didn't even knew that was possible).
                I'll see what happens.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 0
                • E
                  engwan
                  last edited by

                  As said, don't put the portal Interface on the LAN network.

                  Can you explain this further?

                  All the clients connected to the LAN interface are the clients I want to filter internet access using a captive portal. If I move my captive portal to OPT1 then I would have to move all my clients to OPT1. The setup would be exactly the same and the interface being the "LAN" interface shouldn't make a difference right?

                  1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan
                    last edited by

                    @engwan:

                    ….If I move my captive portal to OPT1 then I would have to move all my clients to OPT1.

                    My portal clients are hotel clients.
                    They don't know nothing about me using pfSense, my DNS, my DHCP, my Gateway (portal) IP, or what so ever.
                    The only thing they 'see' are these Wifi 'radio' names:
                    HotelWifi-1
                    HotelWifi-2
                    HotelWifi-3
                    etc.
                    Sometimes, the phone rings in the reception, and the client asks: Which one shall I chose ?
                    The answer is "What about the one with the strongest power ?"  ;D

                    What I want to say is: I never ever setup anything on a PC or other Wifi device of a client.

                    So, why should you ?

                    @engwan:

                    The setup would be exactly the same and the interface being the "LAN" interface shouldn't make a difference right?

                    Just one difference.
                    The one you looking for.
                    It will work because you will have the setup that we all use ….

                    Normally, the LAN interface is for you own private access, other private PC's and network devices like your NAS, printer, whatever.
                    People that you don't "trust", like clients or other invited connections that you want to propose a Free Wifi network (Internet) access, you put them  a separate LAN segment (OPT1), and special firewall rules on the OPT1 interface, like no netbios & Windows  scatter, no connection to 'LAN', scripple P2P connection, limit bandwidth, etc etc.
                    This is what I think, the normal, standard setup.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User
                      last edited by

                      I just try pfsense live 2.0.3 and it works fine using LAN interface as the captive portal interface..except for the problem of https first page

                      Another problem i have to fix now..with certificate may be..let see.

                      1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan
                        last edited by

                        I activated the Portal Interface on the my LAN - I merely activated Local User Manager, not touching any other settings.
                        This means I had two portal interfaces, one on OPT1, and one on the LAN.

                        Just to be sure, I added the MAC of my PC to the MACC pass through page.

                        I switch on another PC on the LAN and launched a navigator.
                        Guess what popup up ? this one: http://www.test-domaine.fr/Capture-portal.PNG
                        I had access to the net after authentication …
                        I didn't really tested it for a long time, but a Portal Interface on LAN, it seems to work.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.