Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Solved] Captive Portal question

    Scheduled Pinned Locked Moved Captive Portal
    17 Posts 6 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      thafener
      last edited by

      Thank you folks

      My guest wireless network is in fact a separate network and connected separately to a dedicated interface of the pfsense box.
      The guy was able to browse this network only, of course he was able to see all the guest computers that were online at this time.

      It was irritating to me that he could scan the network as soon as he got a IP address, but it was even more irritating that he
      could open the login page of one of my switches in this guest wifi network.

      It was strange that he could do this with his mobile as the Captive Portal should have caught this attempt with a login request,
      is this correct ?

      I know that I could activate MAC rules but this is unadequate for a guest wifi system, so what could I do ? Are we dealing with
      a malfunction here ?

      cheers

      thafener

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        Completely incorrect.

        The captive portal intercepts attempts to access services on TCP port 80 (and maybe 443) that are coming IN the ethernet interface.

        Anyone can connect, get DHCP, and access anything on that network segment that is available prior to CP login.

        What you need is layer 2 isolation. pfSense is a layer 3 device and is not even aware of the traffic on the network segment until it receives traffic to forward on to somewhere else.  It might also be performing services such as DHCP and DNS, but those have to be allowed for the portal and subsequent access to function properly.

        You might also look at an AP vendor that performs captive portal functions in the AP, such as Ruckus.  They will also do full isolation.

        Your network is functioning as designed.  No bugs or malfunctions.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • T
          thafener
          last edited by

          Thank you derelict

          Ok thank you very much, thought so. I am using Unifi Ap's in combination with PFSense and in this case
          a layer 2 isolation is a little tricky to realize.
          However thank you for all your help

          cheers Till

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            How many APs are we talking and how many switches/wiring closets?

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • T
              thafener
              last edited by

              I have some 24 Unifi Ap's and one Switch (Linksys by Cisco 48 Port), switch is connected to one of the PFSense Interfaces

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                Ok.  That's easy.  What model switch is it?  I'd be happy to look at the docs and see if it'll do something to isolate the APs from each other.  I'm sure you can keep the wireless clients on each AP from talking on the unifis.  You just need to stop inter-AP traffic.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  If your switch does this, turn on wireless isolation in the APs and make the switchports they're connected to "protected."

                  ![Screen Shot 2014-09-05 at 8.03.44 PM.png](/public/imported_attachments/1/Screen Shot 2014-09-05 at 8.03.44 PM.png)
                  ![Screen Shot 2014-09-05 at 8.03.44 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2014-09-05 at 8.03.44 PM.png_thumb)

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • J
                    jaspras
                    last edited by

                    … or

                    simply enable "Guest Policy" to your unifi access points and be done with it. ....

                    Make sure NOT to check guest portal.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      I don't think that will accomplish isolation between users on different APs.  That usually has to be done in the switch.

                      Note that this is why I tend to favor brocade.  The isolation is per-VLAN not per-port so you can have isolated SSIDs and regular SSIDs from your WAPs.  I haven't found anyone else that can do that without going way up the product sheet to something that does VACLs.

                      I know with Ruckus you can enforce full isolation at the APs per SSID but you have to be sure to carve out exceptions for anything on the local LANs that the users need access to, such as the captive portal IP:port.  Not sure about Ubiquiti unifi.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • D
                        dpa
                        last edited by

                        why not use pf as purely firewall/router and use unifi guest portal feature?

                        1 Reply Last reply Reply Quote 0
                        • T
                          thafener
                          last edited by

                          Thank you all  ;)

                          @jaspras : I have tried this but then I do nt get the CP login page of my PFsense Box

                          Well I am using PFSense for almost 5 years now, the CP was the reason why I have
                          implemented it here.
                          Chanknging to the Unifi portal feature would mean to manually migrate some 550
                          wireless accounts to the Unifi System.

                          Howevee I will have a look at the Switch too but I am not sure if he is capable of this

                          Kind regards

                          thafener

                          1 Reply Last reply Reply Quote 0
                          • T
                            thafener
                            last edited by

                            Hi @all

                            Thank you all for your helpful post. I could not solve the problem on the switch side but in the Unifi Controller tool
                            by adding the interface address of the PFSense box to the allowed subnets (sounds unlogical I know).

                            Since then client isolation works in a way that you can still see the ip addresses of logged in devices but you cannot
                            see any open ports and it is impossible to commnicate with these devices.

                            Kind regards

                            thafener

                            1 Reply Last reply Reply Quote 0
                            • GertjanG
                              Gertjan
                              last edited by

                              As said, this isn't a pfsense issues, but an error in the design of the network hooked up to the portal interface.
                              When using more then ONE AP - and these AP's works like switches, this kind of trouble pops up.

                              We are in 2014 now, so some OS's that clients use have this famous question:
                              Is this a private or Company network ? Or a public network ?
                              (I guess we all know now which OS this is  :) )
                              If the clients choses "public", then their PC can communicate ONLY with the gateway, and block ALL other incoming/outgoing connections.
                              Problems solved, the pfsense portal network engineer can go the bed again.

                              But, of course, there are clients that consider the portal Wifi network as their home network - and they share all their holiday photos on the network ("because then it works at home"). They just hit 'Home network' when their OS says "This is a new network, please chose …".
                              The same clients (our Wifi portal network clients) start to yell when they discover that pure strangers are 'surfing' their PC ... ad all their holiday photos are indexed by Google Images a couple of days later on.
                              (You better get a lawyer when you get home, your wife isn't gona like this one)

                              Anyway: I present https://forum.pfsense.org/index.php?topic=66368.msg365658#msg365658
                              It started here https://forum.pfsense.org/index.php?topic=1268.msg7542#msg7542 (even Sullrich was surprised  ;))

                              It all boils down to: activate AP isolation - and route all trafic from clients to gateway - and back. NO CLIENT TO CLIENT communication.
                              The rule to be enforced is "You, as an pfSense operator, do NOT OFFER A LAN PARTY, but Internet Access only".

                              No "help me" PM's please. Use the forum, the community will thank you.
                              Edit : and where are the logs ??

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.