Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Mac spoofing

    Scheduled Pinned Locked Moved Captive Portal
    4 Posts 4 Posters 797 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jakemuo
      last edited by

      mac spoofing can bypass on my captive portal,, i set ssl-ca in my firewall and ap isolation enabled…
      any suggestions on how to disconnect client using mac spoof..

      1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan
        last edited by

        Client is only known to the portal by its IP and MAC.
        If a client clones (spoofs) both, well … you'll be needing more sophisticated solutions.

        Btw : your Wifi channels are encrypted, right ? If they are, your spoofer will have a hard time to obtain MAC addresses.
        On an AP used for Captive portal connections AP isolation should always be activated - and you should also isolate AP's among them if you have more then one.

        edit : what do you mean by "... i set ssl-ca on my firewall ..." ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Not really. Captive portals are a clever hack at best.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            There is no possible way a firewall can tell two clients apart if they are sharing the same MAC address.
            You have a layer 2 problem, so you need to fix it at layer 2. That's a job for your AP/switches, not a firewall.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.