Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive Portal only shows authenticated users

    Scheduled Pinned Locked Moved Captive Portal
    8 Posts 3 Posters 754 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • tleadleyT
      tleadley
      last edited by tleadley

      I have not read in the online docs anywhere and this forum. I am not 100% sure if this is by design. I have one Mac setup to bypass the portal login page.

      So what I am showing is that only authenticated users show up in the list, I would like to see all active users listed.

      I thought I would be seeing two users, however I only see one even though both users are active and accessing the internet just fine!

      So if a user mac bypasses the portal login that means that user will not show in the status list?

      Am I missing something?

      42a3dcd7-ff72-4468-be9e-cfb95c65cd2e-image.png

      e58a9879-dad5-43c1-a22d-754af89d2fc1-image.png

      I did find something on the forum, kind of a workaround yet not 100% useful!
      https://forum.netgate.com/topic/134048/captive-portal-status-users-not-showing/2

      https://www.netgate.com/docs/pfsense/captiveportal/captive-portal-troubleshooting.html

      ipfw table all list                                                                            
      

      It does show a list of all mac's listed, however not all the associated IP's

      --- table(cp_ifaces), set(0) ---
      em1.50 2100 445576 369047032 1562865062
      --- table(guest_auth_up), set(0) ---
      192.1.50.34/32 00:00:00:00:48:36 2002 2506 242108 1562865062
      --- table(guest_host_ips), set(0) ---
      192.1.50.1/32 0 8412 5118007 1562864776
      --- table(guest_pipe_mac), set(0) ---
       00:00:00:00:a0:40 any 2005 20776 19731461 1562865008
       any 00:00:00:00:a0:40 2004 19874 3277981 1562864812
      --- table(guest_auth_down), set(0) ---
      192.1.50.34/32 2003 2506 2431949 1562864776
      --- table(guest_allowed_up), set(0) ---
      

      "It's not that I'm so smart, it's just that I stay with problems longer" –Albert Einstein

      GertjanG 1 Reply Last reply Reply Quote 0
      • tleadleyT
        tleadley
        last edited by tleadley

        BIOS	Vendor: LENOVO
        Version:	 M05KT60A
        
        Release	 Date: Thu Jul 21 2016 
        Version	2.4.4-RELEASE-p3 (amd64) 
        built on Wed May 15 18:53:44 EDT 2019 
        FreeBSD 11.2-RELEASE-p10
        
        CPU Type	Intel(R) Core(TM) i3-6100 CPU @ 3.70GHz
        Current: 740 MHz, Max: 3700 MHz
        4 CPUs: 1 package(s) x 2 core(s) x 2 hardware threads
        AES-NI CPU Crypto: Yes (active)
        

        "It's not that I'm so smart, it's just that I stay with problems longer" –Albert Einstein

        1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan @tleadley
          last edited by

          @tleadley said in Captive Portal only shows authenticated users:

          I thought I would be seeing two users

          A service who has its MAC address listed on the "MACs" page will no see the authentication process. Packets that match the MAC rule are just passed.

          To be member of the connected user list you should connect using the Captive Login page.

          The MACs page is more for automated devices like APs etc so they can access the Internet for their NTP (example) needs. These devices can't 'login" again a captive portal.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          tleadleyT 1 Reply Last reply Reply Quote 0
          • tleadleyT
            tleadley @Gertjan
            last edited by

            @Gertjan said in Captive Portal only shows authenticated users:

            The MACs page is more for automated devices like APs etc so they can access the Internet for their NTP (example) needs. These devices can't 'login" again a captive portal.

            I get your argument and It makes absolute logical sense yet in the pfSense documentation and on the firewall itself states nothing of the sort for what the absolute purpose is, only what is does or the effect of it's use. this leaves this up to interpretation, so I am not sure I buy in to this completely. I am using Captive portal on an interface that is vlan aware and the captive portal is set for a vlan guest WiFi network.

            So maybe this should be a feature request 😉

            14472f0c-f35e-4949-bddc-0d610855786b-image.png

            dc48a5c0-841e-4723-92fa-1875e9d48fb6-image.png

            "It's not that I'm so smart, it's just that I stay with problems longer" –Albert Einstein

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              That is completely different from adding a MAC address manually to the MAC address pass through.

              When a user authenticates and that checkbox results in a MAC passthrough entry being automatically added, the captive portal process sees the authentication attempt and knows about the user.

              When you just add a MAC passthrough to the table, the traffic is passed but there is no user login to be displayed.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              tleadleyT 1 Reply Last reply Reply Quote 0
              • tleadleyT
                tleadley @Derelict
                last edited by

                @Derelict Like I said before it makes sense, I am thinking outside the box. I think it would be cool to see these devices show up, at the very least as an unauthenticated device or let the login show as the description you choose when you set up a mac manually.

                Otherwsie you would have to be a bit of a slueth to find that device in a sea of possible hundreds of devices. There is no possible way to remember why for each mac address for every device I have done for every customer, on their networks.

                I know it is a small thing, every small thing makes this product even better. I have already made a feature request.

                "It's not that I'm so smart, it's just that I stay with problems longer" –Albert Einstein

                GertjanG 1 Reply Last reply Reply Quote 0
                • GertjanG
                  Gertjan @tleadley
                  last edited by

                  @tleadley said in Captive Portal only shows authenticated users:

                  to find that device in a sea of possible hundreds of devices.

                  On a captive portal their might be devices (or actually users using these devices) that need to connect to the network that is set up as a captive portal, but don't want to be bothered by the 'manual, human based logging portal.

                  Hard to imagine that this could be 'many' devices. In that case, redo you network setup, and build (add) another network for these devices that need a semi permanent access using their MAC address.

                  Captive portals are "guest based", accepting unknown or non trusted devices that should have an Internet access. As said above, exceptions can be made so that your devices (trusted by you - not directly accessible to the network users), can bypass the html login portal page.

                  If you really need to accept a boatload of MAC's, then yes, you'll be handling this load manually.

                  No "help me" PM's please. Use the forum, the community will thank you.
                  Edit : and where are the logs ??

                  tleadleyT 1 Reply Last reply Reply Quote 0
                  • tleadleyT
                    tleadley @Gertjan
                    last edited by

                    This post is pointless if this argument points to rebuilding my network, how else are you going to get 2000 plus users on the same meshed Wifi guest network. I am not sure where your advice is coming from. This is a guest network setup so no mystery here, so if I have a conference center with an event your advice would lead me to believing I would require an astonishing 10 seperate network interfaces and SSID's...

                    Interesting 🤔

                    I would use the UniFi controller for this however it will not work the way I need it to without the USG device in addition to the controller appliance. I would have one interface to control and manage everything. Unifi FW and switches are glitchy and the cpative portal doesn't work as expected which is why I switched. pfSense can handle the throughput better. The captive portal on pfSense is rock solid when used with ubiquity AP's!

                    Except for one little asthetic that I could live without, it would be nice to see. That is the point ☺

                    "It's not that I'm so smart, it's just that I stay with problems longer" –Albert Einstein

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.