• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Captive Portal, Ruckus hotspot setup and POST request to a return URL question

Scheduled Pinned Locked Moved General pfSense Questions
16 Posts 3 Posters 1.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • G
    getcom @stephenw10
    last edited by Oct 26, 2023, 7:50 PM

    @stephenw10
    A guest SSID is not working because Ruckus blocks the access to the private networks and also if I set a rule for accepting the pfsense IP and put it on top, Ruckus is still blocking. I set up a normal SSID and created the rules for blocking internal IPs except the pfSense IP then I will get the captive portal login page, can login with a voucher, and get internet access. I first try it with a guest SSID, then with a Hotspot/WISPr, first without the login page, second with the auth redirection URL POST issue. I will ask the Ruckus people why rules for the guest SSID is not working.

    1 Reply Last reply Reply Quote 1
    • S
      stephenw10 Netgate Administrator
      last edited by Oct 26, 2023, 8:18 PM

      Sounds like 'guest ssid' implies some special setup in Ruckus world. But I'd expect just any additional SSID that can be tied to a VLAN would work.

      G 1 Reply Last reply Oct 27, 2023, 2:05 AM Reply Quote 0
      • G
        getcom @stephenw10
        last edited by Oct 27, 2023, 2:05 AM

        @stephenw10
        yes, this is what I have done now. It is working with a regular SSID with VLAN tag.
        There is a default check box for guest SSIDs to avoid traffic/access between clients. I assume that this is the reason why I could not get access to the pfSense captive portal even with setup a rule for it.
        The Ruckus world is sometimes special. I have used now the unleashed version for testing.
        The unleashed version is the cheaper one without a licence needed.
        I had implemented this setup together with the pfSense captive portal in the past for two hotels with the licenced version of the Ruckus access points plus a ZoneDirector controller. This was no problem at all.
        This behavior could also be related to the current firmware version. Doesn't matter, it is working now.
        Thank you for your time.

        S 1 Reply Last reply Oct 27, 2023, 3:14 AM Reply Quote 0
        • S
          stephenw10 Netgate Administrator @getcom
          last edited by Oct 27, 2023, 3:14 AM

          @getcom said in Captive Portal, Ruckus hotspot setup and POST request to a return URL question:

          There is a default check box for guest SSIDs to avoid traffic/access between clients.

          That would normally only prevent access between wireless clients and not between wireless clients and wired hosts.

          1 Reply Last reply Reply Quote 0
          • S
            sash11
            last edited by Nov 25, 2024, 11:20 PM

            Hello. I am trying to configure captive portal on pfsense with Ruckus AP in the back end. I am struggling how to modify the authentication response. Can somedody help me, please? How should I modify the noauth.html with proper POST response for Ruckus to accept authenticated client? Where do these responses go?

            https://${RuckusUnleashedFQDN}:9998/login
            username=${USERNAME}
            password=${PASSWORD}
            client_mac=${client_mac}
            uip=${uip}
            url=${RETURN_URL}

            G 1 Reply Last reply Nov 27, 2024, 11:10 AM Reply Quote 0
            • G
              getcom @sash11
              last edited by Nov 27, 2024, 11:10 AM

              @sash11 said in Captive Portal, Ruckus hotspot setup and POST request to a return URL question:

              Hello. I am trying to configure captive portal on pfsense with Ruckus AP in the back end. I am struggling how to modify the authentication response. Can somedody help me, please? How should I modify the noauth.html with proper POST response for Ruckus to accept authenticated client? Where do these responses go?

              https://${RuckusUnleashedFQDN}:9998/login
              username=${USERNAME}
              password=${PASSWORD}
              client_mac=${client_mac}
              uip=${uip}
              url=${RETURN_URL}

              This was also my fault. What you want to do is not working.

              You do not need to setup anything special on Ruckus.
              Just create a new ESSID without authentication in Ruckus unleashed and add a VLAN to this.
              Then create this VLAN on pfSense, setup a DHCP server, add this VLAN to your managed switches, setup the ports where the Ruckus APs are connected to trunk ports, join the VLAN on this ports. Rest is done in pfSense in the Captive Portal section without anything special except that you use the configured VLAN as interface.
              If you need screenshots then I can do that next few days.

              Ralf

              S 1 Reply Last reply Nov 27, 2024, 4:03 PM Reply Quote 1
              • S
                sash11 @getcom
                last edited by sash11 Nov 27, 2024, 4:36 PM Nov 27, 2024, 4:03 PM

                @getcom
                The config out of the box does not seem to work. Ruckus ends up blocking all traffic but the local subnet, since clients are not authorized. Here is how I have it configured:
                Ruckus Unleashed side:

                Screenshot 2024-11-27 at 10.34.04.jpg

                Screenshot 2024-11-27 at 10.35.00.jpg

                Screenshot 2024-11-27 at 10.35.53.jpg

                Pfsense side:
                Screenshot 2024-11-27 at 10.47.53.jpg

                Client is not authorized in unleashed:
                Screenshot 2024-11-27 at 10.49.15.jpg

                The work around I am using now is to allow everything to pass in pre authorization in walled garden. But I would like to have it working properly if possible....
                Screenshot 2024-11-27 at 10.56.11.jpg

                1 Reply Last reply Reply Quote 0
                • S
                  stephenw10 Netgate Administrator
                  last edited by Nov 27, 2024, 5:56 PM

                  Hmm, you seem to be trying to run two captive portals there. I'm no sure why you're trying to run CP in pfSense if the AP is already redirecting traffic. or conversely why the AP is redirceting traffic if pfSense is running CP, it should just pass all traffic to pfSense.

                  S 1 Reply Last reply Nov 27, 2024, 11:06 PM Reply Quote 0
                  • S
                    sash11 @stephenw10
                    last edited by Nov 27, 2024, 11:06 PM

                    @stephenw10
                    If I choose hotspot wifi type on AP, I have to use external portal. It can be any external portal. It just happens that pfsense has one already built-in, so I am trying to use that.
                    If I choose Guest type of wifi network, I can utilize built-in portal on Ruckus AP. But nowhere I am using two CP at the same time.

                    1 Reply Last reply Reply Quote 1
                    • S
                      stephenw10 Netgate Administrator
                      last edited by Nov 27, 2024, 11:42 PM

                      Well disable that 'smart client' redirect stuff then. No redirect of any of the pfSense details should be required. It should just pass traffic at layer 2 and pfSense does all the authentication/login.

                      G 1 Reply Last reply Dec 2, 2024, 9:25 AM Reply Quote 0
                      • G
                        getcom @stephenw10
                        last edited by Dec 2, 2024, 9:25 AM

                        @sash11

                        This is the correct setup on Ruckus:

                        7c05d5ce-61af-42aa-862d-ed3fce0e8241-grafik.png

                        Just setup a standard WiFi with VLAN XXX, then add this VLAN to your switches, change the switch ports of your Ruckus APs from "access" to "trunk" and join the ports as tagged VLAN.
                        Next setup is on the pfSense site: add this VLAN, setup an interface for this VLAN, setup DHCP on this interface, add a Captive Portal for this interface.
                        In Captive Portal check follwing:

                        • Reset waiting period
                        • Preserve users database
                        • Reauthenticate Users
                        • Local Authentication Privileges
                        • Login

                        Add a HTTPS server name, e.g. guestlogin.yoursite.tld and add a host override in DNS resolver with IP of your VLAN interface.
                        Choose your certificate (we are using letsencrypt).

                        Done. It is working then.

                        Next would be a custom login site...

                        S 1 Reply Last reply Dec 2, 2024, 2:45 PM Reply Quote 1
                        • S
                          sash11 @getcom
                          last edited by sash11 Dec 2, 2024, 2:57 PM Dec 2, 2024, 2:45 PM

                          @getcom
                          Thank you! That worked!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                            This community forum collects and processes your personal information.
                            consent.not_received