Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive portal allows communication between guests

    Scheduled Pinned Locked Moved Captive Portal
    15 Posts 3 Posters 783 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      robsonvitorm @robsonvitorm
      last edited by

      @robsonvitorm Both guests are Linux without firewall rules and policies like ACCEPT. In pfsense, I created a rule allowing everything (protocol, port and src and dst). What I forgot to mention is that the APs network is different, and is in another VLAN and broadcast. However, I pass the VLANS of each SSID, including guests. The netmasks on both are correct, as it is a medium network, using /22, delivered via DHCP on pfsense itself.

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @robsonvitorm
        last edited by

        @robsonvitorm said in Captive portal allows communication between guests:

        In pfsense, I created a rule allowing everything (protocol, port and src and dst).

        why? traffic doesn't go through pfsense if they are in the same vlan?
        There is something blocking on the hosts themselves.

        APs having different management IPs is fine. traffic is not routed across the management interface

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        R 2 Replies Last reply Reply Quote 1
        • R
          robsonvitorm @michmoor
          last edited by

          This post is deleted!
          1 Reply Last reply Reply Quote 0
          • R
            robsonvitorm @michmoor
            last edited by

            @michmoor just to rule out any possibility of the firewall blocking these connections... but there is still something blocking this communication.

            GertjanG M R 3 Replies Last reply Reply Quote 0
            • GertjanG
              Gertjan @robsonvitorm
              last edited by Gertjan

              @robsonvitorm
              tcpdump on the IP2 host and you'll understand what happens ^^

              edit : Who listens on port '80' :

              netstat -naptul | grep ':80'
              

              Check also the firewall on that IP2 device.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              1 Reply Last reply Reply Quote 1
              • M
                michmoor LAYER 8 Rebel Alliance @robsonvitorm
                last edited by

                @robsonvitorm
                I agree. wireshark/tcpdump on each client. Perhaps application-related.
                Are you able to ping each client?
                Can you see other mac addresses from your client?

                For example, on my linux hosts

                arp -a
                ? (10.105.1.15) at 28:8a:1c:45:fa:c0 [ether] on ens192
                ? (10.105.1.27) at <incomplete> on ens192
                ? (10.205.1.90) at 00:94:a1:12:39:82 [ether] on ens160
                ? (10.205.1.32) at <incomplete> on ens160
                ? (10.105.1.112) at 00:13:c6:01:5c:7d [ether] on ens192
                ? (10.105.1.23) at 00:01:d7:ed:5e:c1 [ether] on ens160
                ? (10.105.1.118) at 00:cc:34:56:59:12 [ether] on ens192
                ? (10.205.1.90) at 00:94:a1:12:39:82 [ether] on ens192
                

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                R 1 Reply Last reply Reply Quote 1
                • R
                  robsonvitorm @robsonvitorm
                  last edited by

                  @robsonvitorm the firewall is disabled in both iptables without any rules and policies in accept

                  1 Reply Last reply Reply Quote 0
                  • R
                    robsonvitorm @michmoor
                    last edited by

                    @michmoor see arp, only gateway. ICMP also no communication

                    2024-03-15_15-41.png

                    2024-03-15_15-42.png

                    R 1 Reply Last reply Reply Quote 0
                    • R
                      robsonvitorm @robsonvitorm
                      last edited by

                      @robsonvitorm tcpdump

                      tcpdump does not capture anything on the ICMP target host, as if nothing reached it.

                      root@XXX54:~# tcpdump -i wls2 host 10.17.200.14
                      tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
                      listening on wls2, link-type EN10MB (Ethernet), snapshot length 262144 bytes
                      ^C
                      0 packets captured
                      0 packets received by filter
                      0 packets dropped by kernel
                      
                      
                      M 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @robsonvitorm
                        last edited by michmoor

                        @robsonvitorm
                        You dont need to obfuscate private addresses (RFC1918) or mac addresses generally.
                        If you don't see packets leaving then you have a problem on the host level. Either your network stack on the host is corrupted or you got something else going on.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.