Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    FreeRadius and Basic Clients

    Scheduled Pinned Locked Moved Wireless
    11 Posts 4 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      Guest
      last edited by

      I use no encryption and use  –Static DHCP-- addressing only known MAC addresses. I think this is what your needing to research. Each interface on your box has its own DHCP server settings via a tab at top of screen with -LAN/WAN/OPT or other interfaces if so assigned.

      1 Reply Last reply Reply Quote 0
      • ?
        Guest
        last edited by

        https://doc.pfsense.org/index.php/DHCP_Server

        1 Reply Last reply Reply Quote 0
        • S
          simplei
          last edited by

          Thank you for replies.
          My main intention is to keep security high but allow several passthrough accounts. I thought adding devices to freeradius configuration will allow them to connect evenif it's not capable of connecting to a wpa2 enterprise network …

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            I don't think you understand that if you add some sort of pass through based on MAC addresses, those MAC addresses are always being broadcast in-the-clear so all someone would have to do is sniff them then tell their wireless card to use that MAC and they're on your network.  No security at all.

            If you have a WPA2 Enterprise network and your devices don't support WPA2 Enterprise, they will be unable to join.

            Your choices are to run two wi-fi networks, with segregation, or run two wi-fi networks into the same LAN.  But if you're going to do that, you might as well just forget about running WPA2 Enterprise and just run simple WPA2.

            If you have WEP-only devices or devices that will only connect to open networks, throw them away.

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • ?
              Guest
              last edited by

              You are undoubtedly correct.
              But when you say always broadcast in the clear, wouldn't the DHCP OFFER stage be the only time the MAC address would be broadcast? I was thinking most packets only have the IP info.
              I guess they could crash your wifi network causing machines to renegotiate leases and sniff them easily then, Also on lease renewal. I live in a cozy  cul-de-sac and have no such worries.. What are good sniffers these days. I wanna test it out. I see nutstumbler is still around…

              1 Reply Last reply Reply Quote 0
              • ?
                Guest
                last edited by

                So i fired up netstumbler and first thing i see is my pfwifi access point with its MAC address. I didn't see any clients MAC's but from what i read i need to fire up a Linux/DragonflyBSD and run Wireshark in monitor mode.. When is the client wifi MAC address exposed? Is it broadcasted all the time or just on DHCP lease procedure? So Does it depend on the client O/S used or is it a radio thing used by all for networking-addressing?
                Thanks for sharing.
                Sincerely Frank

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  All the time.  MACs are always in-the-clear - even with WPA2 Enterprise/AES/Whatever.  You just need a wireless adapter in promiscuous mode and wireshark and they're all there.

                  All IP (layer 3 packets) are encapsulated in ethernet/wireless (layer 2) frames all the time.  You have to process the frame to get the IP address.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • ?
                    Guest
                    last edited by

                    So using WEP password 1234 would be safer!!! Just kidding. I had to chuckle at your "throw all WEP gear away"' and was thinking what kind of advice is that!! I guess i need to keep my advice contained to items i know about….
                    Thanks for sharing.

                    1 Reply Last reply Reply Quote 0
                    • P
                      P3R
                      last edited by

                      WEP was deprecated already in 2004. The 10 years following that should really have been enough time to convert to WPA2 and phase all non-upgradeable wireless gear out, even for a very busy network administrator. ;)

                      1 Reply Last reply Reply Quote 0
                      • DerelictD
                        Derelict LAYER 8 Netgate
                        last edited by

                        You'd be surprised.

                        Chattanooga, Tennessee, USA
                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.