Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Firewall rules for radius-captive portal

    Scheduled Pinned Locked Moved Captive Portal
    7 Posts 4 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      johnmulti
      last edited by

      Hi,

      I have on box pf 1.2.3 with lan wan wan2 and opt1 with captive portal enabled on opt1 with external radius from wan gateway. I want to desable the captive portal from that box and use a second box with captive portal enabled, and attached on opt1 as gateway for radius.
      How can i do it ?
      What firewall rules i must do for radius on first and/or on second box?

      Thank you.

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        1.2.3 is positively prehistoric.  Upgrade.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • D
          doktornotor Banned
          last edited by

          @johnmulti:

          I have on box pf 1.2.3

          1 Reply Last reply Reply Quote 0
          • J
            johnmulti
            last edited by

            Ok

            this box is an marine usage firewall on an alix 256mb ram and i cannot upgrade because it is a closed version based on pf sense 1.2.3 . I have some issues with captive portal (wrong billings-slow responses-lags) and i want to keep it as a firewall only and use another pc with latest pfsense for captive portal.Lan and opt1 are vlans and i want to use opt1 as gateway of captive portal of latest pfsense pc. Do i mast make a pass rule from opt1 to wan address on rudius ports (1812-1813) on first box or something else? Some examples please.

            Thank you

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              You're pretty much on your own then.  You might want to call ESF and see if they will accept money to help you.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                pfSense 2.2.x works very much fine on 256MB Alix. Other than that, running dead firewall code with tons of well known security issues is obviously useless.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  why not just replace the ancient machine with this new pc your going to use as your captive portal?  1.2.3 came out what dec 2009 so at best your looking going on 6 year old hardware the thing is running on.. Time to replace!!  Not even taking into account all the concerns of running a firewall code from almost 6 years ago.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.