[pfSense Support] captive portal firewall rules

2011-08-04 Thread Shali K.R.
Dear all,

i am trying to configure captive portal in my network, its working only if i
enabled 'allow from all to all in firewall anybody please tell me whats
ports are using captive portal service.

-- 
Thanks  Regards

Shali K R
Server Administrator
Vidya Academy of Science  Technology
Thrissur,Kerala.
Mob:9846303531


Re: [pfSense Support] Captive portal not redirecting after succesful login

2011-07-11 Thread Giacomo Di Ciocco

Il 08/07/2011 12:22, Giacomo Di Ciocco ha scritto:


After succesful login i'm not being redirected to the website i was
about to visit, when i send the form the browser stays in waiting
response..., however from the pfsense web interface i can see the user
succesfully logged in, and if i reinitiate the connection to the website
i was about to visit it works, other background connection attemps, ie.
irc get their way just after pressing form's send button.


Any hint ?

Thank you,
Giacomo.

--
Giacomo Di Ciocco
Phone: (+39) 0577319407
Fax: (+39) 0577318498
Mobile phone: (+39) 3483867757
Email: ad...@nectarine.info
___
Ship to:
Giacomo Di Ciocco
Via del Pozzo 3/A C/O BRT Telecomunicazioni S.R.L.
53035 Monteriggioni (SI)
Italy

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive portal not redirecting after succesful login

2011-07-11 Thread Giacomo Di Ciocco

Il 08/07/2011 12:22, Giacomo Di Ciocco ha scritto:

Hello everyone,
this is my pfsense version:

2.0-RC3 (i386)
built on Thu Jul 7 00:25:19 EDT 2011


After reboot radiusd gets stuck with 100% CPU load.

Tried to update to latest version built on Jul 8, it wasnt succesful, i 
had to reinstall 2.0-RC1 and recover config.xml.


Did the upgrade, this time was succesful.

radiusd was not recognizing client, client entry was there, edited and 
saved, works fine.


I'm now wondering how to allow clients to reach any dns server, hints ?

Best regards,
Giacomo.

--
Giacomo Di Ciocco
Phone: (+39) 0577319407
Fax: (+39) 0577318498
Mobile phone: (+39) 3483867757
Email: ad...@nectarine.info
___
Ship to:
Giacomo Di Ciocco
Via del Pozzo 3/A C/O BRT Telecomunicazioni S.R.L.
53035 Monteriggioni (SI)
Italy

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive portal not redirecting after succesful login

2011-07-08 Thread Giacomo Di Ciocco

Hello everyone,
this is my pfsense version:

2.0-RC3 (i386)
built on Thu Jul 7 00:25:19 EDT 2011

It is a pretty complex setup however ill try to describe just meaningful 
parts.


Theres a captive portal interface which is on a VLAN, captive portal is 
enabled and auths to local radius, tried with and without transparent 
http proxy, theres only one rule in the interface's firewall 
configuration it is a pass-all rule.


After succesful login i'm not being redirected to the website i was 
about to visit, when i send the form the browser stays in waiting 
response..., however from the pfsense web interface i can see the user 
succesfully logged in, and if i reinitiate the connection to the website 
i was about to visit it works, other background connection attemps, ie. 
irc get their way just after pressing form's send button.


Thank you.

Best regards,
Giacomo.

--
Giacomo Di Ciocco
DVB Project @ BRT Telecomunicazioni S.R.L.
Phone: (+39) 0577319407
Fax: (+39) 0577318498
Mobile phone: (+39) 3483867757
Email: giacomo.dicio...@brttelecomunicazioni.it
___
BRT Telecomunicazioni S.R.L.
Via del Pozzo 3/A
53035 Monteriggioni (SI)
Italy

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal Redirection

2011-06-17 Thread Atkins, Dwane P
I am experiencing an issue again where the Captive Portal is not redirecting 
automatically.  WE can web into http://pfsense.domain.local:8000  and it will 
redirect.  However, if we just click on a browser and go to a homepage, it will 
not redirect.

I have seen this before and thought I had the documentation to fix it, but that 
is not so.

Dwane


[pfSense Support] Captive Portal redirect issues

2011-02-22 Thread Atkins, Dwane P
Not intending to spam---I just wasn't sure the first one went to the proper 
email address.

Good  day all.

I need some troubleshooting assistance.

I am using pfsense 1.2.3 to go across a GRE tunnel.  My set up is pfsense 
device-local router-distant router-user.  From the user device, I can 
actually web into the inside interface of the pfsense device.  However, I 
cannot seem to get the Captive Portal to redirect?   I am sure it is some check 
box, but is there a test or a troubleshooting guideline, I can complete to 
possibly narrow down my issue?

Thank you

Dwane



[pfSense Support] Captive Portal

2010-10-08 Thread Atkins, Dwane P
We are wondering if there is any information available that explains in detail 
how the Captive Portal on pfsense works?  We know it's function, but we are 
wondering what is happening behind the scene?

Any documentation would be nice.

Thank you

Dwane


Re: [pfSense Support] Captive Portal

2010-10-08 Thread Christian Veith

 Hi Dwane,

in my oppinion, there's not much documentation on that topic available. 
But it's working that way:


1. Receives an IP Packet
2. Blocks it until authenticated / Answers with HTML Website if Port 80 
is talked to

3. Receives credentials from User
4. Authenticates with internal Database / Radius Server
5. Stores logon Information ( MAC-Adress / IP Adress / Timestamp) 
internally to revoke access after an configured time

6. Allows Access to requested resource and opens an popup window to logout.

regards

Christian

Am 08.10.2010 16:25, schrieb Atkins, Dwane P:


We are wondering if there is any information available that explains 
in detail how the Captive Portal on pfsense works? We know it’s 
function, but we are wondering what is happening behind the scene?



Any documentation would be nice.


Thank you


Dwane




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal Issues

2010-09-17 Thread Atkins, Dwane P
Good afternoon.

I am trying to install  pfSense-2.0-BETA4-20100915-0900.iso to just run a 
captive portal.  I am having issues even getting the captive portal to work.  
When I initiate a web page, I should get something requesting authentication.  
Instead, I get the web page requested if it is internal, but the page will 
timeout if it is external.

Are there checkboxes that need to be checked or unchecked to just have the 
pfsense default login appear?

Thanks

Dwane


Re: [pfSense Support] captive portal

2010-08-28 Thread Chris Buechler
On Wed, Aug 25, 2010 at 7:19 AM, Hans Maes h...@bitnet.be wrote:
 Hi,

 I'm running a few (6 at the moment) pfsense 1.2.3-RELEASE boxes on a rather
 large scale wireless network, as border routers and firewalls between the
 internet uplinks and the rest of the network. (network background info: +600
 subnets, +150 router nodes, 6 internet uplinks, about 1000 unique
 mac-address clients per 24h, www.wirelessbelgie.be , non-profit organisation
 running on volunteers )

 The traffic shaper is active on the pfsense boxes to allow different
 internet speeds to different subnets on the network.
 I'm currently using very large alias lists to manage the +600 private
 subnets in the traffic shaper.

 We are currently looking at switching to a captive portal + traffic shaper +
 freeradius, so we can set speeds based on user/pass combination in stead of
 IP subnet.
 Tests are successful up till now, and we are going to switch this into
 production pretty soon.

 However, I have one problem:
 The network contains a lot of 'dumb' devices (ipcams, sound encoders,
 serial2ip, ...) which also need internet access, but have no clue on how to
 log in to the captive portal.

 I cannot use mac-authentication with the captive portal and the radius
 server because there are routers in between the pfsense boxes and the
 devices.

 From what I see now the only way to allow these devices access to the
 internet is to add them to the Allowed IP list in the captive portal.
 But managing this list seperately on every box would be a lot of work. I
 would prefer to use an alias containing all my allowed ip's which I can then
 update through the fetch alias list from url package.


 First Question: Is there any way to use aliases in the captive Allowed IP
 list, or to automate managing this list in any way ?

No way to use aliases. Scripting with curl can automate management.


 Second question: Are the devices in the allowed list allowed to pass
 through the captive portal right away, or do they need to open an HTTP
 connection first to 'trigger' the captive portal logic ?


They're automatically allowed through.


 Third Question: I'm currently running 1.2.3 but switching to 2.0 would be
 possible, if this would help me in this situation. What would you guys
 recommend for this situation, 1.2.3 or 2.0 ?


Don't think there would be much difference in this particular scenario
for you. 2.0 may let you push the CP function further upstream since
it can run on multiple interfaces, giving you fewer boxes to manage.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] captive portal

2010-08-25 Thread Hans Maes

Hi,

I'm running a few (6 at the moment) pfsense 1.2.3-RELEASE boxes on a 
rather large scale wireless network, as border routers and firewalls 
between the internet uplinks and the rest of the network. (network 
background info: +600 subnets, +150 router nodes, 6 internet uplinks, 
about 1000 unique mac-address clients per 24h, www.wirelessbelgie.be , 
non-profit organisation running on volunteers )


The traffic shaper is active on the pfsense boxes to allow different 
internet speeds to different subnets on the network.
I'm currently using very large alias lists to manage the +600 private 
subnets in the traffic shaper.


We are currently looking at switching to a captive portal + traffic 
shaper + freeradius, so we can set speeds based on user/pass combination 
in stead of IP subnet.
Tests are successful up till now, and we are going to switch this into 
production pretty soon.


However, I have one problem:
The network contains a lot of 'dumb' devices (ipcams, sound encoders, 
serial2ip, ...) which also need internet access, but have no clue on how 
to log in to the captive portal.


I cannot use mac-authentication with the captive portal and the radius 
server because there are routers in between the pfsense boxes and the 
devices.


From what I see now the only way to allow these devices access to the 
internet is to add them to the Allowed IP list in the captive portal.
But managing this list seperately on every box would be a lot of work. I 
would prefer to use an alias containing all my allowed ip's which I can 
then update through the fetch alias list from url package.



First Question: Is there any way to use aliases in the captive Allowed 
IP list, or to automate managing this list in any way ? (maybe some 
radius attribute I don't know about?)


Second question: Are the devices in the allowed list allowed to pass 
through the captive portal right away, or do they need to open an HTTP 
connection first to 'trigger' the captive portal logic ?


Third Question: I'm currently running 1.2.3 but switching to 2.0 would 
be possible, if this would help me in this situation. What would you 
guys recommend for this situation, 1.2.3 or 2.0 ?


Thanks!

Regards,

Hans

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal Multi-Interface Capabilities

2010-07-30 Thread Atkins, Dwane P
In the release notes for pfsense 2.0, it is mentioned that multi -interface 
capabilities will be a new feature.  Is there a link or can someone better 
explain the terminology to us?  Does this mean that if we have one interface on 
a pfsense 2.0 server, we can have multiple Vlans trunked to that port.  Or does 
it mean that it supports multiple Network interface cards?

If someone can better explain this to me and I maybe a how-to on how to use it.

Thanks

Dwane


Re: [pfSense Support] Captive Portal Multi-Interface Capabilities

2010-07-30 Thread Chris Buechler
On Fri, Jul 30, 2010 at 11:12 AM, Atkins, Dwane P atki...@uthscsa.edu wrote:
 In the release notes for pfsense 2.0, it is mentioned that multi –interface
 capabilities will be a new feature.  Is there a link or can someone better
 explain the terminology to us?  Does this mean that if we have one interface
 on a pfsense 2.0 server, we can have multiple Vlans trunked to that port.
 Or does it mean that it supports multiple Network interface cards?


In a nutshell, it works the same as it does now except rather than a
drop down to pick the interface, limiting you to one interface, it's a
select box where you can pick one or as many interfaces as you want
and it will run on all of those. That's working nicely, we've deployed
it in production for some ISPs.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] captive portal + load balancer clarification

2010-07-28 Thread Zaharioudakis Nikos



On 28 Ιουλ 2010, at 3:25, Chris Buechler cbuech...@gmail.com wrote:

 On Tue, Jul 27, 2010 at 5:48 PM, Nikos Zaharioudakis nza...@gmail.com wrote:
 Greetings everybody and thank you for a so nice product ! :-)
 
 I have a small clarification question though.
 I need to share 2 or more dsl lines behind a pfsense box (it's going to be a
 virtual machine, but let's keep it simple)
 I will have to use the captive portal for some kind of authenticated access
 and the use of the load balancer is a must.
 I have read that the combination of both captive portal  the balancer is
 not functioning in 1.2.3 release series. ( Is it still true? )
 
 
 No. Pre-1.2.3, any rule with a gateway would bypass the portal. It'll
 work fine in 1.2.3.
 
 
 
 Another question that comes to mind is that if I have 3+ dsl lines I have to
 create a policy for all combinations of up / down dsl lines, right.
 
 No, you just need either a failover and/or balancing pool containing
 the interfaces desired. Their status will take care of itself.
 
 -
 To unsubscribe, e-mail: support-unsubscr...@pfsense.com
 For additional commands, e-mail: support-h...@pfsense.com
 
 Commercial support available - https://portal.pfsense.org
 

I appreciate your prompt reply
I would post a howto afterwards

Thnx a lot once again

Nikos
-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] captive portal + load balancer clarification

2010-07-27 Thread Nikos Zaharioudakis
Greetings everybody and thank you for a so nice product ! :-)

I have a small clarification question though.
I need to share 2 or more dsl lines behind a pfsense box (it's going to be a
virtual machine, but let's keep it simple)
I will have to use the captive portal for some kind of authenticated access
and the use of the load balancer is a must.
I have read that the combination of both captive portal  the balancer is
not functioning in 1.2.3 release series. ( Is it still true? )

In that case, an additional scenario comes to my mind. How about using one
pfsense box for the captive portal (2 interfaces) and then use another
pfsense box for the load balancer. In that case, the sticky connections
would give me some good results for users that have some ipsec based vpn
clients and peculiar web sites (web banking for eg) that need to see the
same public ip address to originate from.

Another question that comes to mind is that if I have 3+ dsl lines I have to
create a policy for all combinations of up / down dsl lines, right. That is

DSL1  DSL2   DSL3
up   up   up
down   up   up
down   down   up
-no service --- ;-)
up   down   down
up  updown
up  downup


Any thoughts /  suggestions or howtos  would be highly appreciable

Kind Regards,

Nikos


3
Zaharioudakis Nikos, RHCE, RHCX,RHCI VCP VCI
+30 694 720 40 63
http://zimbra.wikidot.com/zimbra-installations-in-greece


Re: [pfSense Support] captive portal + load balancer clarification

2010-07-27 Thread Chris Buechler
On Tue, Jul 27, 2010 at 5:48 PM, Nikos Zaharioudakis nza...@gmail.com wrote:
 Greetings everybody and thank you for a so nice product ! :-)

 I have a small clarification question though.
 I need to share 2 or more dsl lines behind a pfsense box (it's going to be a
 virtual machine, but let's keep it simple)
 I will have to use the captive portal for some kind of authenticated access
 and the use of the load balancer is a must.
 I have read that the combination of both captive portal  the balancer is
 not functioning in 1.2.3 release series. ( Is it still true? )


No. Pre-1.2.3, any rule with a gateway would bypass the portal. It'll
work fine in 1.2.3.



 Another question that comes to mind is that if I have 3+ dsl lines I have to
 create a policy for all combinations of up / down dsl lines, right.

No, you just need either a failover and/or balancing pool containing
the interfaces desired. Their status will take care of itself.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive portal redirect

2010-06-08 Thread Cristian Del Carlo
Hi,

i use pfsense 2.0 as a captive portal.

Everything works fine except the redirect after user authentication.

I set up captive portal to redirect connections to
http://www.google.it after authentication, but often after giving
username and password correctly the page of the authentication remains
.

What could be the problem?

Thanks in advance.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive Portal redirect problem

2010-05-29 Thread Cristian Del Carlo
Thank you.

2010/5/28 Chris Buechler cbuech...@gmail.com:
 On Fri, May 28, 2010 at 11:53 AM, Cristian Del Carlo
 cristian.delca...@gmail.com wrote:
 Hi,

 I installed for testing PFsense 2.0 on a ALIX.2D13 and I try the
 captive portal function.

 The problem is that the server did not redirect correctly to the
 authentication page, firefox print a message like this This page does
 not redirect correctly. Firefox has detected that the server is
 redirecting the request for this page so that it can never be
 completed. and the user is not redirected in the authentication page.


 That was fixed today.

 -
 To unsubscribe, e-mail: support-unsubscr...@pfsense.com
 For additional commands, e-mail: support-h...@pfsense.com

 Commercial support available - https://portal.pfsense.org





-- 


Cristian Del Carlo

Il testo e gli eventuali documenti trasmessi contengono informazioni
riservate al destinatario indicato. La seguente e-mail è confidenziale e
la sua riservatezza è tutelata legalmente dal Decreto Legislativo 196
del 30/06/2003 (Codice di tutela della privacy). La lettura, copia o
altro uso non autorizzato o qualsiasi altra azione derivante dalla
conoscenza di queste informazioni sono rigorosamente vietate. Qualora
abbiate ricevuto questo documento per errore siete cortesemente pregati
di darne immediata comunicazione al mittente e di provvedere,
immediatamente, alla sua distruzione.



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal redirect problem

2010-05-28 Thread Cristian Del Carlo
Hi,

I installed for testing PFsense 2.0 on a ALIX.2D13 and I try the
captive portal function.

The problem is that the server did not redirect correctly to the
authentication page, firefox print a message like this This page does
not redirect correctly. Firefox has detected that the server is
redirecting the request for this page so that it can never be
completed. and the user is not redirected in the authentication page.

If I write in firefox http://192.168.1.1:8000; I only have blank page.

If someone can give me a clue I thank him in advance, it is my first
configuration of pfsense and i don't know if this is a problem in my
configuration or if it is a problem in the release.

Here i print same info about my configuration.

Thank you.




Config file:

?xml version=1.0?
pfsense
   version6.3/version
   lastchange/
   themepfsense_ng/theme
   sysctl
  item
 descSet the ephemeral port range to be lower./desc
 tunablenet.inet.ip.portrange.first/tunable
 valuedefault/value
  /item
  item
 descDrop packets to closed TCP ports without returning a RST/desc
 tunablenet.inet.tcp.blackhole/tunable
 valuedefault/value
  /item
  item
 descDo not send ICMP port unreachable messages for closed
UDP ports/desc
 tunablenet.inet.udp.blackhole/tunable
 valuedefault/value
  /item
  item
 descRandomize the ID field in IP packets (default is 0:
sequential IP IDs)/desc
 tunablenet.inet.ip.random_id/tunable
 valuedefault/value
  /item
  item
 descDrop SYN-FIN packets (breaks RFC1379, but nobody uses
it anyway)/desc
 tunablenet.inet.tcp.drop_synfin/tunable
 valuedefault/value
  /item
  item
 descEnable sending IPv4 redirects/desc
 tunablenet.inet.ip.redirect/tunable
 valuedefault/value
  /item
  item
 descEnable sending IPv6 redirects/desc
 tunablenet.inet6.ip6.redirect/tunable
 valuedefault/value
  /item
  item
 descGenerate SYN cookies for outbound SYN-ACK packets/desc
 tunablenet.inet.tcp.syncookies/tunable
 valuedefault/value
  /item
  item
 descMaximum incoming/outgoing TCP datagram size (receive)/desc
 tunablenet.inet.tcp.recvspace/tunable
 valuedefault/value
  /item
  item
 descMaximum incoming/outgoing TCP datagram size (send)/desc
 tunablenet.inet.tcp.sendspace/tunable
 valuedefault/value
  /item
  item
 descIP Fastforwarding/desc
 tunablenet.inet.ip.fastforwarding/tunable
 valuedefault/value
  /item
  item
 descDo not delay ACK to try and piggyback it onto a data
packet/desc
 tunablenet.inet.tcp.delayed_ack/tunable
 valuedefault/value
  /item
  item
 descMaximum outgoing UDP datagram size/desc
 tunablenet.inet.udp.maxdgram/tunable
 valuedefault/value
  /item
  item
 descHandling of non-IP packets which are not passed to pfil
(see if_bridge(4))/desc
 tunablenet.link.bridge.pfil_onlyip/tunable
 valuedefault/value
  /item
  item
 descSet to 0 to disable filtering on the incoming and
outgoing member interfaces./desc
 tunablenet.link.bridge.pfil_member/tunable
 valuedefault/value
  /item
  item
 descSet to 1 to enable filtering on the bridge interface/desc
 tunablenet.link.bridge.pfil_bridge/tunable
 valuedefault/value
  /item
  item
 descAllow unprivileged access to tap(4) device nodes/desc
 tunablenet.link.tap.user_open/tunable
 valuedefault/value
  /item
  item
 descVerbosity of the rndtest driver (0: do not display
results on console)/desc
 tunablekern.rndtest.verbose/tunable
 valuedefault/value
  /item
  item
 descRandomize PID's (see src/sys/kern/kern_fork.c:
sysctl_kern_randompid())/desc
 tunablekern.randompid/tunable
 valuedefault/value
  /item
  item
 descMaximum size of the IP input queue/desc
 tunablenet.inet.ip.intr_queue_maxlen/tunable
 valuedefault/value
  /item
  item
 descDisable CTRL+ALT+Delete reboot from keyboard./desc
 tunablehw.syscons.kbd_reboot/tunable
 valuedefault/value
  /item
  item
 descEnable TCP Inflight mode/desc
 tunablenet.inet.tcp.inflight.enable/tunable
 valuedefault/value
  /item
  item
 descEnable TCP extended debugging/desc
 tunablenet.inet.tcp.log_debug/tunable
 valuedefault/value
  /item
  item
 descSet ICMP Limits/desc
 tunablenet.inet.icmp.icmplim/tunable
 

Re: [pfSense Support] Captive Portal redirect problem

2010-05-28 Thread Chris Buechler
On Fri, May 28, 2010 at 11:53 AM, Cristian Del Carlo
cristian.delca...@gmail.com wrote:
 Hi,

 I installed for testing PFsense 2.0 on a ALIX.2D13 and I try the
 captive portal function.

 The problem is that the server did not redirect correctly to the
 authentication page, firefox print a message like this This page does
 not redirect correctly. Firefox has detected that the server is
 redirecting the request for this page so that it can never be
 completed. and the user is not redirected in the authentication page.


That was fixed today.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] captive portal, bypass for certain sites

2010-03-25 Thread Michel Servaes
Hi,


I have an Alix board, with pfsense on it. I could use proxy, but I
feel this is quite a load on the system (even when setting things to
0).
So to avoid people visiting internet, I was thinking on using captive portal...

But for some sites, (fixed ip-adresses) it shouldn't try to
authenticate... can this be achieved by using some kind of ruleset ??
I do have a VLAN capable switch - but again, some ip-adresses need to
be passed (they logon to a citrix site).

Kind regards,
Michel

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] captive portal, bypass for certain sites

2010-03-25 Thread Remko Lodder

Did you read the configuration options from the captive portal?

On my 2.0 machines that means that you can bypass certain IP's for the
captive portal; and even use MAC-bypass to bypass machines based on their
MAC.

Does that answer the question?


On Thu, March 25, 2010 11:08 am, Michel Servaes wrote:
 Hi,


 I have an Alix board, with pfsense on it. I could use proxy, but I
 feel this is quite a load on the system (even when setting things to
 0).
 So to avoid people visiting internet, I was thinking on using captive
 portal...

 But for some sites, (fixed ip-adresses) it shouldn't try to
 authenticate... can this be achieved by using some kind of ruleset ??
 I do have a VLAN capable switch - but again, some ip-adresses need to
 be passed (they logon to a citrix site).

 Kind regards,
 Michel

 -
 To unsubscribe, e-mail: support-unsubscr...@pfsense.com
 For additional commands, e-mail: support-h...@pfsense.com

 Commercial support available - https://portal.pfsense.org




-- 
/\   Best regards,  | re...@freebsd.org
\ /   Remko Lodder   | re...@efnet
 Xhttp://www.evilcoder.org/  |
/ \   ASCII Ribbon Campaign  | Against HTML Mail and News


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] captive portal, bypass for certain sites

2010-03-25 Thread Hans Maes

Remko Lodder wrote:

On my 2.0 machines that means that you can bypass certain IP's for the
captive portal; and even use MAC-bypass to bypass machines based on their
MAC.

  
Related to that, could anybody tell me whether in 2.0 you still need to 
do a web request before the MAC-bypass rule gets applied for your IP 
address ?
This was one of the drawbacks of 1.x's captive portal when using 
'stupid' devices (eg a wireless ipcam) on a captive portal'ed wireless 
subnet.


(I guess I should just install 2.0 and try it out myself, but spare time 
is in short supply lately)



Thanks!

Hans


(Sorry to steal this topic, but it is more or less on topic :-) )

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] captive portal, bypass for certain sites

2010-03-25 Thread Michel Servaes
On Thu, Mar 25, 2010 at 11:23 AM, Remko Lodder re...@elvandar.org wrote:

 Did you read the configuration options from the captive portal?

 On my 2.0 machines that means that you can bypass certain IP's for the
 captive portal; and even use MAC-bypass to bypass machines based on their
 MAC.

 Does that answer the question?


No, that's not what I meant :)
I mean - I don't want to install heavy proxy add-on onto my Alix
board... to block the whole internet (if you didn't logon).

Basically I want to block complete internet, but our own site (to
logon to citrix). (this is a single IP, so that shouldn't be too much
work for me) on several client computers behind the pfsense...
Furthermore I want to only allow certain client computers (but that
can be achieved by adding their mac-adresses), without having to go
through captive portal.
And if possible (that would be the cherry on the pie) - I want to
block only during the weekends.

But I don't think I can add an HTTP/HTTPS rule to circumvent the
captive portal, can I ?

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] captive portal, bypass for certain sites

2010-03-25 Thread Chris Buechler
On Thu, Mar 25, 2010 at 5:25 PM, Michel Servaes mic...@mcmc.be wrote:
 On Thu, Mar 25, 2010 at 11:23 AM, Remko Lodder re...@elvandar.org wrote:

 Did you read the configuration options from the captive portal?

 On my 2.0 machines that means that you can bypass certain IP's for the
 captive portal; and even use MAC-bypass to bypass machines based on their
 MAC.

 Does that answer the question?


 No, that's not what I meant :)

Actually it is, just use the IP bypass for that site's IP.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] captive portal Session-Timeout

2010-03-03 Thread Nikos Vassiliadis

Hi,

I am trying to use the RADIUS attribute Session-Timeout with
the captive portal, but it seems to fail. The captive portal
seems to ignore the attribute. Here is the tcpdump on lo0:

21:09:57.192049 IP (tos 0x0, ttl 64, id 28235, offset 0, flags [none], proto UDP 
(17), length 156) 127.0.0.1.43369  127.0.0.1.1812: RADIUS, length: 128
Access Request (1), id: 0x20, Authenticator: 
fc3d8b1559fb900b455e5e8a56876139
  NAS IP Address Attribute (4), length: 6, Value: 192.168.73.195
  NAS ID Attribute (32), length: 15, Value: pfSense.local
  Username Attribute (1), length: 7, Value: nikos
  Password Attribute (2), length: 18, Value:  [|radius]
21:09:58.297790 IP (tos 0x0, ttl 64, id 61190, offset 0, flags [none], proto UDP 
(17), length 60) 127.0.0.1.1812  127.0.0.1.43369: RADIUS, length: 32
Access Accept (2), id: 0x20, Authenticator: 
aad3d354acb18e87157c9249478683b2
  Session Timeout Attribute (27), length: 6, Value: 01:30 min
  Idle Timeout Attribute (28), length: 6, Value: 01:00 min


The CP configuration is the following:

 captiveportal
page/
timeout/
interfacelan/interface
maxproc/maxproc
idletimeout/
enable/
auth_methodradius/auth_method
radacct_enable/
reauthenticateacct/
httpsname/
bwdefaultdn2000/bwdefaultdn
bwdefaultup100/bwdefaultup
certificate/
private-key/
logoutwin_enable/
redirurl/
radiusip127.0.0.1/radiusip
radiusip2/
radiusport/
radiusport2/
radiusacctport/
radiuskeytstng123/radiuskey
radiuskey2/
radiusvendordefault/radiusvendor
/captiveportal


Thanks for any insights on this, Nikos


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive portal failure with subnets on LAN interface

2010-02-23 Thread Nigel Metheringham
I'm looking at pfsense 1.2.3.

We have a requirement to push several subnets through a captive portal, so 
expected pfsense to be able to do this (with the Disable MAC filtering 
option).

However any clients, other than on the local LAN network, that attempt to route 
through the pfsense box get no packets back at all - no redirect to the portal 
web page, nothing.

This is due to the following pf rule being used to push packets to the captive 
portal stuff:-

pass in quick on $lan from 192.168.50.0/24 to any keep state \
label USER_RULE: Default LAN - any 

I can hack stuff so that things do work by changing /etc/inc/filter.inc (diff 
has been white space mangled to stop it wrapping):-
diff -u filter.inc.orig filter.inc
--- filter.inc.orig 2010-02-23 15:24:02.0 +
+++ filter.inc  2010-02-23 15:24:04.0 +
@@ -1752,7 +1752,7 @@
 $src = $lanip;
 break;
 case 'lan':
-$src = {$lansa}/{$lansn};
+$src = any;
 break;
 case 'pptp':
 $src = {$pptpsa}/{$pptpsn};


which feels like doing surgery with a chainsaw...

Can anyone suggest a better fix for this?  And how do I do a proper bug report 
to get this fixed in the next release...

Nigel.

--
[ Nigel Metheringham nigel.methering...@intechnology.com ]
[ - Comments in this message are my own and not ITO opinion/policy - ]


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive portal failure with subnets on LAN interface

2010-02-23 Thread Remko Lodder

Perhaps it should be optional, I came across this with redirection as well, 
where the interface IP is hardcoded even if you select ''any'' there.
(which doesnt work if you have Squid on a different machine and redirect all 
http traffic towards the squid box :-))

Cheerio,
Remko

On Feb 23, 2010, at 4:26 PM, Nigel Metheringham wrote:

 I'm looking at pfsense 1.2.3.
 
 We have a requirement to push several subnets through a captive portal, so 
 expected pfsense to be able to do this (with the Disable MAC filtering 
 option).
 
 However any clients, other than on the local LAN network, that attempt to 
 route through the pfsense box get no packets back at all - no redirect to the 
 portal web page, nothing.
 
 This is due to the following pf rule being used to push packets to the 
 captive portal stuff:-
 
   pass in quick on $lan from 192.168.50.0/24 to any keep state \
   label USER_RULE: Default LAN - any 
 
 I can hack stuff so that things do work by changing /etc/inc/filter.inc (diff 
 has been white space mangled to stop it wrapping):-
 diff -u filter.inc.orig filter.inc
 --- filter.inc.orig 2010-02-23 15:24:02.0 +
 +++ filter.inc  2010-02-23 15:24:04.0 +
 @@ -1752,7 +1752,7 @@
 $src = $lanip;
 break;
 case 'lan':
 -$src = {$lansa}/{$lansn};
 +$src = any;
 break;
 case 'pptp':
 $src = {$pptpsa}/{$pptpsn};
 
 
 which feels like doing surgery with a chainsaw...
 
 Can anyone suggest a better fix for this?  And how do I do a proper bug 
 report to get this fixed in the next release...
 
   Nigel.
 
 --
 [ Nigel Metheringham nigel.methering...@intechnology.com ]
 [ - Comments in this message are my own and not ITO opinion/policy - ]
 
 
 -
 To unsubscribe, e-mail: support-unsubscr...@pfsense.com
 For additional commands, e-mail: support-h...@pfsense.com
 
 Commercial support available - https://portal.pfsense.org
 

-- 
/\   Best regards,| re...@freebsd.org
\ /   Remko Lodder  | re...@efnet
Xhttp://www.evilcoder.org/|
/ \   ASCII Ribbon Campaign| Against HTML Mail and News


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive portal failure with subnets on LAN interface

2010-02-23 Thread Chris Buechler
On Tue, Feb 23, 2010 at 10:26 AM, Nigel Metheringham
nigel.methering...@dev.intechnology.co.uk wrote:
 I'm looking at pfsense 1.2.3.

 We have a requirement to push several subnets through a captive portal, so 
 expected pfsense to be able to do this (with the Disable MAC filtering 
 option).

 However any clients, other than on the local LAN network, that attempt to 
 route through the pfsense box get no packets back at all - no redirect to the 
 portal web page, nothing.

 This is due to the following pf rule being used to push packets to the 
 captive portal stuff:-

        pass in quick on $lan from 192.168.50.0/24 to any keep state \
        label USER_RULE: Default LAN - any


That has nothing to do with what pushes to captive portal, that's your
LAN rule. Edit that rule under Firewall  Rules, LAN tab.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



RE: [pfSense Support] Captive Portal RADIUS authentication - Authentication error - Username and/or password invalid

2009-12-15 Thread Tancinco, Jon
Hi Mike.

 

The authentication requests go through to the Radius server...and we get
a bad password error.

 

It's weird.  All the same settings work under m0n0wall.  Same IPs, same
radius server.  I'm not sure how different pfSense is compared to the
m0n0wall app.  The Captive Portal setup looks identical to me, unless
there is some underlying difference between the two applications.

 

Thanks your your help.

 

 

-Jon

 

From: Michael Vinocur [mailto:michaelvino...@hotmail.com] 
Sent: Saturday, December 12, 2009 6:31 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal RADIUS authentication -
Authentication error - Username and/or password invalid

 

The external IP of the radius server has to be added to the radius
servers client list or else it will reject authentication requests.

 

Mike 

 

From: Tancinco, Jon mailto:tanci...@humnet.ucla.edu  

Sent: Wednesday, December 09, 2009 5:43 PM

To: support@pfsense.com 

Subject: RE: [pfSense Support] Captive Portal RADIUS authentication -
Authentication error - Username and/or password invalid

 

Secret key works under m0n0wall and the same key is used in pfSense.
Not sure what you mean about the IP of the NAS.

 

Thanks for your help!

 

 

Jon

 

From: Michael Vinocur [mailto:michaelvino...@hotmail.com] 
Sent: Wednesday, December 09, 2009 2:28 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal RADIUS authentication -
Authentication error - Username and/or password invalid

 

Could be the secret key or check is you added the IP of the NAS.

 

Mike

 

From: Tancinco, Jon mailto:tanci...@humnet.ucla.edu  

Sent: Wednesday, December 09, 2009 11:37 AM

To: support@pfsense.com 

Subject: [pfSense Support] Captive Portal RADIUS authentication -
Authentication error - Username and/or password invalid

 

Same error on Versions 1.2.2 and 1.2.3


Using the pfSense Captive Portal. I am getting the Authentication error
- Username and/or password invalid. message when trying to
authenticate. The password is correctly submitted, but get the error
everytime. RADIUS server reports incorrect password. Using m0n0wall,
Captive Portal and RADIUS authentication works with no problems using
the same username, password and RADIUS server.

Any help would be appreciated.

 

 

 

 

Jon

 



Re: [pfSense Support] Captive Portal RADIUS authentication - Authentication error - Username and/or password invalid

2009-12-15 Thread Michael Vinocur
I see. Well the the only other thing I can think of is the password type i.e. 
m5,chap, etc must be different between the moonwall and pfsesnse boxes.

Mike


From: Tancinco, Jon 
Sent: Tuesday, December 15, 2009 11:51 AM
To: support@pfsense.com 
Subject: RE: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid


Hi Mike.

 

The authentication requests go through to the Radius server...and we get a bad 
password error.

 

It's weird.  All the same settings work under m0n0wall.  Same IPs, same radius 
server.  I'm not sure how different pfSense is compared to the m0n0wall app.  
The Captive Portal setup looks identical to me, unless there is some underlying 
difference between the two applications.

 

Thanks your your help.

 

 

-Jon

 

From: Michael Vinocur [mailto:michaelvino...@hotmail.com] 
Sent: Saturday, December 12, 2009 6:31 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid

 

The external IP of the radius server has to be added to the radius servers 
client list or else it will reject authentication requests.

 

Mike 

 

From: Tancinco, Jon 

Sent: Wednesday, December 09, 2009 5:43 PM

To: support@pfsense.com 

Subject: RE: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid

 

Secret key works under m0n0wall and the same key is used in pfSense.  Not sure 
what you mean about the IP of the NAS.

 

Thanks for your help!

 

 

Jon

 

From: Michael Vinocur [mailto:michaelvino...@hotmail.com] 
Sent: Wednesday, December 09, 2009 2:28 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid

 

Could be the secret key or check is you added the IP of the NAS.

 

Mike

 

From: Tancinco, Jon 

Sent: Wednesday, December 09, 2009 11:37 AM

To: support@pfsense.com 

Subject: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid

 

Same error on Versions 1.2.2 and 1.2.3


Using the pfSense Captive Portal. I am getting the Authentication error - 
Username and/or password invalid. message when trying to authenticate. The 
password is correctly submitted, but get the error everytime. RADIUS server 
reports incorrect password. Using m0n0wall, Captive Portal and RADIUS 
authentication works with no problems using the same username, password and 
RADIUS server.

Any help would be appreciated.

 

 

 

 

Jon

 


Re: [pfSense Support] Captive Portal RADIUS authentication - Authentication error - Username and/or password invalid

2009-12-12 Thread Michael Vinocur
The external IP of the radius server has to be added to the radius servers 
client list or else it will reject authentication requests.

Mike 


From: Tancinco, Jon 
Sent: Wednesday, December 09, 2009 5:43 PM
To: support@pfsense.com 
Subject: RE: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid


Secret key works under m0n0wall and the same key is used in pfSense.  Not sure 
what you mean about the IP of the NAS.

 

Thanks for your help!

 

 

Jon

 

From: Michael Vinocur [mailto:michaelvino...@hotmail.com] 
Sent: Wednesday, December 09, 2009 2:28 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid

 

Could be the secret key or check is you added the IP of the NAS.

 

Mike

 

From: Tancinco, Jon 

Sent: Wednesday, December 09, 2009 11:37 AM

To: support@pfsense.com 

Subject: [pfSense Support] Captive Portal RADIUS authentication - 
Authentication error - Username and/or password invalid

 

Same error on Versions 1.2.2 and 1.2.3


Using the pfSense Captive Portal. I am getting the Authentication error - 
Username and/or password invalid. message when trying to authenticate. The 
password is correctly submitted, but get the error everytime. RADIUS server 
reports incorrect password. Using m0n0wall, Captive Portal and RADIUS 
authentication works with no problems using the same username, password and 
RADIUS server.

Any help would be appreciated.

 

 

 

 

Jon

 


RE: [pfSense Support] Captive Portal RADIUS authentication - Authentication error - Username and/or password invalid

2009-12-09 Thread Tancinco, Jon
Secret key works under m0n0wall and the same key is used in pfSense.
Not sure what you mean about the IP of the NAS.

 

Thanks for your help!

 

 

Jon

 

From: Michael Vinocur [mailto:michaelvino...@hotmail.com] 
Sent: Wednesday, December 09, 2009 2:28 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal RADIUS authentication -
Authentication error - Username and/or password invalid

 

Could be the secret key or check is you added the IP of the NAS.

 

Mike

 

From: Tancinco, Jon mailto:tanci...@humnet.ucla.edu  

Sent: Wednesday, December 09, 2009 11:37 AM

To: support@pfsense.com 

Subject: [pfSense Support] Captive Portal RADIUS authentication -
Authentication error - Username and/or password invalid

 

Same error on Versions 1.2.2 and 1.2.3


Using the pfSense Captive Portal. I am getting the Authentication error
- Username and/or password invalid. message when trying to
authenticate. The password is correctly submitted, but get the error
everytime. RADIUS server reports incorrect password. Using m0n0wall,
Captive Portal and RADIUS authentication works with no problems using
the same username, password and RADIUS server.

Any help would be appreciated.

 

 

 

 

Jon

 



[pfSense Support] Captive Portal and Wifi network

2009-06-29 Thread Lunix1618

Hello everybody,

I am in study phase to do a Wireless network and requirement is need to 
force users authenticate first. I figured out that can be done with 
Captive Portal feature of pfsense. However, I want to know if anybody 
did a Wifi network with 1 main access point connect directly to pfsense 
box and expand the wireless signal with some kind of Wifi extender ?


TIA,


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



RE: [pfSense Support] Captive Portal and Wifi network

2009-06-29 Thread Tim Dickson
- Lunix1618 [mailto:lunix1...@gmail.com] 
Hello everybody,

I am in study phase to do a Wireless network and requirement is need to 
force users authenticate first. I figured out that can be done with 
Captive Portal feature of pfsense. However, I want to know if anybody 
did a Wifi network with 1 main access point connect directly to pfsense 
box and expand the wireless signal with some kind of Wifi extender ?

TIA,
-



Yes, absolutely - if your Access Points support it - but you will be chopping 
bandwidth in half at every relay point.
Two hops is probably OK, but I'd reconsider your setup for multiple hops.
-Tim




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal/USB WiFi

2009-05-15 Thread Manny A. Wise

Hello,

I have a pfsense box with (1) WAN and (3) RJ45..
I have a D-link router hanging off one of the RJ45's...
I will like to eliminate the router as only been used as access point
I will like to know if pfsense has support for USB wi-fi  

Thank you!!!

VIA VNT6656 USB WiFi Module, 802.11b/g


-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal Page

2009-05-14 Thread Curtis LaMasters
Does anyone know where I can find a nice templated captive portal
page. Something with a simple header, ULA and Login.  I know it sounds
so simple, but my web skillz are limited...

Curtis LaMasters
http://www.curtis-lamasters.com
http://www.builtnetworks.com

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive Portal Page

2009-05-14 Thread Pete Boyd
 Does anyone know where I can find a nice templated captive portal
 page. Something with a simple header, ULA and Login.

http://thegoldenear.org/toolbox/unices/pfsense-1.2-firewall.html#captive-portal


-- 
Pete Boyd

Open Plan IT - http://openplanit.co.uk
The Golden Ear - http://thegoldenear.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive Portal Question

2009-05-09 Thread Tim Dressel
I agree completely.

What we were using it for is all our wired clients and wireless *were*
on the same internal lan. The captive portal was enabled on the LAN
interface. All wired clients had mac-bypass entries, and the wireless
clients had to get past the captive portal.

What I'm thinking is that I will have to investigate some sort of
rouge detection, or maybe network access protection for the wired
clients, and then completely separate the wireless traffic on another
interface.

I'm still interested though in anyone out there with large numbers of
mac-bypass entries. Any takers?

Cheers,


P.S. Chris/PFsense team, I am consistently impressed by this product.
You guys do very good work, and my team and I appreciate your efforts
immensely. The coding is important, but the community support is above
and beyond!

On Fri, May 8, 2009 at 10:25 PM, RB aoz@gmail.com wrote:
 On Fri, May 8, 2009 at 22:06, Tim Dressel tjdres...@gmail.com wrote:
 Finally, I'd appreciate any feedback out there on installs with counts
 on mac bypass entries topping a 1000 count. I am considering tying
 together several of my networks and would like to know what the upper
 end on the captive portal looks like.

 The captive portal's default configuration is to filter users by MAC
 address.  The main difference between that and what you're doing is
 that the MAC entries are made dynamically each time a user logs in.
 That said, I have run a pair of Dell 2660s (dual 2GHz, 2GB) in that
 default configuration over a high-churn environment with several
 thousand unique clients per day with no ill effect.

 My concern was not whether pfSense could handle the number of entries,
 but mainly administrative overhead.  Maintaining a list of even 100
 MACs is terribly cumbersome, especially considering how trivial
 MAC-only authentication is to bypass.  Additionally, some of pfSense's
 GUI components just don't scale well - there are some diagnostic pages
 (DHCP status, CP status, ARP tables, etc.) that I've just become
 accustomed to not using if the client count is over a couple hundred.

 Check your system's RRD graphs during the slowdown - if your states,
 queues, or CPU aren't pegged, pfSense is likely not the culprit.

 -
 To unsubscribe, e-mail: support-unsubscr...@pfsense.com
 For additional commands, e-mail: support-h...@pfsense.com

 Commercial support available - https://portal.pfsense.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



RE: [pfSense Support] Captive Portal Question

2009-05-09 Thread Dimitri Rodis
I'm drafting a reply. Be done shortly.

Dimitri Rodis
Integrita Systems LLC 
http://www.integritasystems.com


-Original Message-
From: Tim Dressel [mailto:tjdres...@gmail.com] 
Sent: Friday, May 08, 2009 11:11 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal Question

I agree completely.

What we were using it for is all our wired clients and wireless *were*
on the same internal lan. The captive portal was enabled on the LAN
interface. All wired clients had mac-bypass entries, and the wireless
clients had to get past the captive portal.

What I'm thinking is that I will have to investigate some sort of
rouge detection, or maybe network access protection for the wired
clients, and then completely separate the wireless traffic on another
interface.

I'm still interested though in anyone out there with large numbers of
mac-bypass entries. Any takers?

Cheers,


P.S. Chris/PFsense team, I am consistently impressed by this product.
You guys do very good work, and my team and I appreciate your efforts
immensely. The coding is important, but the community support is above
and beyond!

On Fri, May 8, 2009 at 10:25 PM, RB aoz@gmail.com wrote:
 On Fri, May 8, 2009 at 22:06, Tim Dressel tjdres...@gmail.com wrote:
 Finally, I'd appreciate any feedback out there on installs with counts
 on mac bypass entries topping a 1000 count. I am considering tying
 together several of my networks and would like to know what the upper
 end on the captive portal looks like.

 The captive portal's default configuration is to filter users by MAC
 address.  The main difference between that and what you're doing is
 that the MAC entries are made dynamically each time a user logs in.
 That said, I have run a pair of Dell 2660s (dual 2GHz, 2GB) in that
 default configuration over a high-churn environment with several
 thousand unique clients per day with no ill effect.

 My concern was not whether pfSense could handle the number of entries,
 but mainly administrative overhead.  Maintaining a list of even 100
 MACs is terribly cumbersome, especially considering how trivial
 MAC-only authentication is to bypass.  Additionally, some of pfSense's
 GUI components just don't scale well - there are some diagnostic pages
 (DHCP status, CP status, ARP tables, etc.) that I've just become
 accustomed to not using if the client count is over a couple hundred.

 Check your system's RRD graphs during the slowdown - if your states,
 queues, or CPU aren't pegged, pfSense is likely not the culprit.

 -
 To unsubscribe, e-mail: support-unsubscr...@pfsense.com
 For additional commands, e-mail: support-h...@pfsense.com

 Commercial support available - https://portal.pfsense.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



smime.p7s
Description: S/MIME cryptographic signature


RE: [pfSense Support] Captive Portal Question

2009-05-09 Thread Dimitri Rodis
We use the switches in a client's executive office suite buildings. We needed 
a way to provide internet access on a per suite basis, and we needed to 
provide public addresses on an as-needed basis (if they had a mail server, for 
example). We had a previous solution in place, but it was about 8-9 years old, 
and required manual intervention when tenants move from suite to suite (which 
happens a lot in these buildings).

So our new (15 month old at this point) setup has 3 vlans on the switches: 
private unauthenticated, private authenticated, and public 
authenticated. (private and public refer to the address spaces in use on 
the vlans). As part of that setup, we use mac-based authentication on the HP 
switches. So, a client (aka tenant) can be plugged into any port on the 
switch, and the FreeRADIUS package from pfSense can provide authentication and 
VLAN assignments to the switch, and the switch will use the RADIUS information 
to put them on the correct VLAN automatically. For any client that does not 
authenticate, the switch throws them on the private unauthenticated vlan, 
and then the client cannot get on the internet without authenticating with the 
pfsense captive portal (the custom captive portal page pretty much says hey, 
you aren't getting on the internet unless you pay the land lord more $$.  If 
you want access, call up xxx and give them this mac address: 
xx:xx:xx:xx:xx:xx). If their mac address is present in FreeRADIUS, then they 
get put on whatever vlan is assigned them from the vlan box. The private 
authenticated vlan is a private address space vlan that is NATted to the 
internet, and the public authenticated vlan is directly on the internet. In 
order to keep clients from seeing each other on the private authenticated 
vlan (basically this vlan is for tenants that have a single pc with no 
router), we add the following to each client entry in the Additional RADIUS 
Options box:
HP-Nas-Filter-Rule = permit in ip from any to 172.20.1.1, HP-Nas-Filter-Rule 
+= deny in ip from any to 172.20.1.0/24, HP-Nas-Filter-Rule += permit in ip 
from any to 0.0.0.0/0
This permits the clients to talk to the gateway and the rest of the internet, 
but not to any other machine on the same subnet.

I don't know how much of this applies to your setup, but to sum up this 
solution, unauthenticated clients get put on a vlan that can't get on the 
internet (they can, but are stopped by a custom captive portal page from 
pfSense that tells them what to do), and authenticated clients get put on 
vlans that can freely access the internet. In your case, you might just need 
to use FreeRADIUS along with some switch ACLs (in the Additional RADIUS 
Options box) to allow/limit/prevent internet access.

Hopefully that made some sense. It's a bit tough to describe without seeing 
it! :)

Dimitri Rodis
Integrita Systems LLC
http://www.integritasystems.com


-Original Message-
From: Tim Dressel [mailto:tjdres...@gmail.com]
Sent: Friday, May 08, 2009 9:07 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal Question

Hi folks,

Just an update. I built a new machine from the ground up today. Took a
backup from the old machine, and just copied and pasted the 300+
mac-bypass entries into the new config file. Everything is working
well, and as expected.

I'm interested though Dimitri on the switch issue. I'm connected
entirely to new managed HP 2848's and 2510G-48's and I have great LAN
performance. Are you doing something directly with your switches as
far as authentication goes, or did you just include the switches for
completeness?

Finally, I'd appreciate any feedback out there on installs with counts
on mac bypass entries topping a 1000 count. I am considering tying
together several of my networks and would like to know what the upper
end on the captive portal looks like.

Thanks!



On Fri, May 8, 2009 at 1:33 AM, Dimitri Rodis
dimit...@integritasystems.com wrote:
 We have a pfSense setup with the FreeRADIUS package that authenticates folks
 that plug in to HP 3500yl and 2626 switches-- the set up is for a few
 executive office suite buildings that are linked together by fiber and all
 share a single 10Mb symmetric connection to the internet. 0 problems for 
 about
 15 months now--still running on 1.2-release. If you have some good managed
 switches, that's the way to do it IMHO.

 Dimitri Rodis
 Integrita Systems LLC
 http://www.integritasystems.com

 -Original Message-
 From: RB [mailto:aoz@gmail.com]
 Sent: Thursday, May 07, 2009 3:16 PM
 To: support@pfsense.com
 Subject: Re: [pfSense Support] Captive Portal Question

 On Thu, May 7, 2009 at 15:55, Tim Dressel tjdres...@gmail.com wrote:
 1. What is the limitation on the number of mac-bypass entries? And is
 what I am seeing expected with 300 entries?

 I'm sure someone will chime in with the precise ipfw limitation, but
 this is mostly going to be dependent on your system's performance
 specs - memory  CPU.

 2. If I

Re: [pfSense Support] Captive Portal Question

2009-05-09 Thread RB
On Sat, May 9, 2009 at 00:10, Tim Dressel tjdres...@gmail.com wrote:
 I'm still interested though in anyone out there with large numbers of
 mac-bypass entries. Any takers?

At the risk of redundancy, that was rather the point.  Other than the
interface of your manually entering them (which is not critical to the
actual operation), the captive portal in its standard configuration
makes a mac-bypass entry for every client.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



RE: [pfSense Support] Captive Portal Question

2009-05-08 Thread Dimitri Rodis
We have a pfSense setup with the FreeRADIUS package that authenticates folks 
that plug in to HP 3500yl and 2626 switches-- the set up is for a few 
executive office suite buildings that are linked together by fiber and all 
share a single 10Mb symmetric connection to the internet. 0 problems for about 
15 months now--still running on 1.2-release. If you have some good managed 
switches, that's the way to do it IMHO.

Dimitri Rodis
Integrita Systems LLC
http://www.integritasystems.com

-Original Message-
From: RB [mailto:aoz@gmail.com]
Sent: Thursday, May 07, 2009 3:16 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal Question

On Thu, May 7, 2009 at 15:55, Tim Dressel tjdres...@gmail.com wrote:
 1. What is the limitation on the number of mac-bypass entries? And is
 what I am seeing expected with 300 entries?

I'm sure someone will chime in with the precise ipfw limitation, but
this is mostly going to be dependent on your system's performance
specs - memory  CPU.

 2. If I should not be doing this with 300 clients, is anyone using
 another FOSS product to do MAC authenticated control outbound from
 their firewall?

Possibly, but [as I hope you know] MAC filtering only keeps honest
people honest, it is in no way any form of authentication.  At that
number of unique users, you may be better served by setting up an
actual RADIUS server to do proper authentication and AAA instead of
manually maintaining tables.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



smime.p7s
Description: S/MIME cryptographic signature


Re: [pfSense Support] Captive Portal Question

2009-05-08 Thread Tim Dressel
Hi folks,

Just an update. I built a new machine from the ground up today. Took a
backup from the old machine, and just copied and pasted the 300+
mac-bypass entries into the new config file. Everything is working
well, and as expected.

I'm interested though Dimitri on the switch issue. I'm connected
entirely to new managed HP 2848's and 2510G-48's and I have great LAN
performance. Are you doing something directly with your switches as
far as authentication goes, or did you just include the switches for
completeness?

Finally, I'd appreciate any feedback out there on installs with counts
on mac bypass entries topping a 1000 count. I am considering tying
together several of my networks and would like to know what the upper
end on the captive portal looks like.

Thanks!



On Fri, May 8, 2009 at 1:33 AM, Dimitri Rodis
dimit...@integritasystems.com wrote:
 We have a pfSense setup with the FreeRADIUS package that authenticates folks
 that plug in to HP 3500yl and 2626 switches-- the set up is for a few
 executive office suite buildings that are linked together by fiber and all
 share a single 10Mb symmetric connection to the internet. 0 problems for about
 15 months now--still running on 1.2-release. If you have some good managed
 switches, that's the way to do it IMHO.

 Dimitri Rodis
 Integrita Systems LLC
 http://www.integritasystems.com

 -Original Message-
 From: RB [mailto:aoz@gmail.com]
 Sent: Thursday, May 07, 2009 3:16 PM
 To: support@pfsense.com
 Subject: Re: [pfSense Support] Captive Portal Question

 On Thu, May 7, 2009 at 15:55, Tim Dressel tjdres...@gmail.com wrote:
 1. What is the limitation on the number of mac-bypass entries? And is
 what I am seeing expected with 300 entries?

 I'm sure someone will chime in with the precise ipfw limitation, but
 this is mostly going to be dependent on your system's performance
 specs - memory  CPU.

 2. If I should not be doing this with 300 clients, is anyone using
 another FOSS product to do MAC authenticated control outbound from
 their firewall?

 Possibly, but [as I hope you know] MAC filtering only keeps honest
 people honest, it is in no way any form of authentication.  At that
 number of unique users, you may be better served by setting up an
 actual RADIUS server to do proper authentication and AAA instead of
 manually maintaining tables.

 -
 To unsubscribe, e-mail: support-unsubscr...@pfsense.com
 For additional commands, e-mail: support-h...@pfsense.com

 Commercial support available - https://portal.pfsense.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive Portal Question

2009-05-08 Thread RB
On Fri, May 8, 2009 at 22:06, Tim Dressel tjdres...@gmail.com wrote:
 Finally, I'd appreciate any feedback out there on installs with counts
 on mac bypass entries topping a 1000 count. I am considering tying
 together several of my networks and would like to know what the upper
 end on the captive portal looks like.

The captive portal's default configuration is to filter users by MAC
address.  The main difference between that and what you're doing is
that the MAC entries are made dynamically each time a user logs in.
That said, I have run a pair of Dell 2660s (dual 2GHz, 2GB) in that
default configuration over a high-churn environment with several
thousand unique clients per day with no ill effect.

My concern was not whether pfSense could handle the number of entries,
but mainly administrative overhead.  Maintaining a list of even 100
MACs is terribly cumbersome, especially considering how trivial
MAC-only authentication is to bypass.  Additionally, some of pfSense's
GUI components just don't scale well - there are some diagnostic pages
(DHCP status, CP status, ARP tables, etc.) that I've just become
accustomed to not using if the client count is over a couple hundred.

Check your system's RRD graphs during the slowdown - if your states,
queues, or CPU aren't pegged, pfSense is likely not the culprit.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal Question

2009-05-07 Thread Tim Dressel
Hi folks,

I've got a captive portal deployed on a simple LAN/WAN configured
current PFsense box.

All clients that I want to have transparent access to the internet
have a MAC bypass entry.

All other clients authenticate against the active portal.

The mac-bypass has over 300 entries in it.

I get network drops, slow traffic internal and external, and in
general network unhappiness (slow ping times, things just dropping off
the network, adding an additional MAC address when applying the
settings causes the web interface to hang). Disabling the captive
portal instantly makes everything work well again.

So, two questions please:

1. What is the limitation on the number of mac-bypass entries? And is
what I am seeing expected with 300 entries?

2. If I should not be doing this with 300 clients, is anyone using
another FOSS product to do MAC authenticated control outbound from
their firewall?

Thanks in advance...

Tim

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive Portal Question

2009-05-07 Thread RB
On Thu, May 7, 2009 at 15:55, Tim Dressel tjdres...@gmail.com wrote:
 1. What is the limitation on the number of mac-bypass entries? And is
 what I am seeing expected with 300 entries?

I'm sure someone will chime in with the precise ipfw limitation, but
this is mostly going to be dependent on your system's performance
specs - memory  CPU.

 2. If I should not be doing this with 300 clients, is anyone using
 another FOSS product to do MAC authenticated control outbound from
 their firewall?

Possibly, but [as I hope you know] MAC filtering only keeps honest
people honest, it is in no way any form of authentication.  At that
number of unique users, you may be better served by setting up an
actual RADIUS server to do proper authentication and AAA instead of
manually maintaining tables.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive Portal Question

2009-05-07 Thread Chris Flugstad




I was going to ask what hardware you were running this on.  We have a
rather large list of MAC addresses in our captive portal and it works
fine.  Its a dual opteron/4 gigs of ram.   Probably overkill, so it
wont help you know what you need, but if your running 128  ram or even
256, its bare bone minimum.



Chris Flugstad
Cascadelink
900 1st ave s, suite 201a
seattle, wa 98134
p: 206.774.3660 | f: 206.577.5066
ch...@cascadelink.com



RB wrote:

  On Thu, May 7, 2009 at 15:55, Tim Dressel tjdres...@gmail.com wrote:
  
  
1. What is the limitation on the number of mac-bypass entries? And is
what I am seeing expected with 300 entries?

  
  
I'm sure someone will chime in with the precise ipfw limitation, but
this is mostly going to be dependent on your system's performance
specs - memory  CPU.

  
  
2. If I should not be doing this with 300 clients, is anyone using
another FOSS product to do MAC authenticated control outbound from
their firewall?

  
  
Possibly, but [as I hope you know] MAC filtering only keeps honest
people honest, it is in no way any form of authentication.  At that
number of unique users, you may be better served by setting up an
actual RADIUS server to do proper authentication and AAA instead of
manually maintaining tables.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org

  




-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal Issues

2009-03-03 Thread Atkins, Dwane P
We have been running pfSense as a Captive Portal for quite sometime.
Lately, our flenses have had services that were locking up.  You could
view items on the GUI, but could not execute a Captive Portal lookup or
a Halt System or Reboot System.  And if you ssh'ed into the system, you
could not execute either or a web configurator restart either.

 

On the particular system we had this happen to lately, we were using
1.2.1-RC2 and have had it happen on 1.2.2.  We did recently upgrade to
1.2.3-PRERELEASE-TESTING-VERSION and have not had it up long enough to
determine if this version had the same issue.

 

This is the error that was in the /var/log/ lighttpd.error.log

 

2009-03-03 09:04:58: (mod_fastcgi.c.2956) backend died; we'll disable it
for 5 seconds and send the request to another backend instead:
reconnects: 0 load: 192 

2009-03-03 09:04:59: (mod_fastcgi.c.3568) all handlers for  /index.php
on .php are down.

 

This was on the monitor hooked up to the pfSense device

 

 

IPFW: IPV6 - Unknown Extension Header(10), ext 2

IPFW: IPV6 - Unknown Extension Header(5), ext 2

 

Thanks 

 



RE: [pfSense Support] Captive Portal Issues

2009-03-03 Thread Atkins, Dwane P
My apologies that should say our pfsenses and not  our flenses

 

 

 



From: Atkins, Dwane P [mailto:atki...@uthscsa.edu] 
Sent: Tuesday, March 03, 2009 10:30 AM
To: support@pfsense.com
Subject: [pfSense Support] Captive Portal Issues

 

We have been running pfSense as a Captive Portal for quite sometime.
Lately, our flenses have had services that were locking up.  You could
view items on the GUI, but could not execute a Captive Portal lookup or
a Halt System or Reboot System.  And if you ssh'ed into the system, you
could not execute either or a web configurator restart either.

 

On the particular system we had this happen to lately, we were using
1.2.1-RC2 and have had it happen on 1.2.2.  We did recently upgrade to
1.2.3-PRERELEASE-TESTING-VERSION and have not had it up long enough to
determine if this version had the same issue.

 

This is the error that was in the /var/log/ lighttpd.error.log

 

2009-03-03 09:04:58: (mod_fastcgi.c.2956) backend died; we'll disable it
for 5 seconds and send the request to another backend instead:
reconnects: 0 load: 192 

2009-03-03 09:04:59: (mod_fastcgi.c.3568) all handlers for  /index.php
on .php are down.

 

This was on the monitor hooked up to the pfSense device

 

 

IPFW: IPV6 - Unknown Extension Header(10), ext 2

IPFW: IPV6 - Unknown Extension Header(5), ext 2

 

Thanks 

 



[pfSense Support] captive portal without MAC filtering

2009-02-07 Thread Pete Boyd
The captive portal has the following option:
MAC filtering - Disable MAC filtering
If this option is set, no attempts will be made to ensure that the MAC
address of clients stays the same while they're logged in. This is
required when the MAC address of the client cannot be determined (usually
because there are routers between pfSense and the clients). If this is
enabled, RADIUS MAC authentication cannot be used.

This sounds useful. It could fix the difficulty we have of requiring LAN
users, who want to add wifi in their home, that they need to use wireless
access points, not wireless routers (or wireless routers configured as
purely wireless access points, for those that support this), so that they
don't ruin our charging model. People find the technical differences hard
to understand.

So, how does pfSense track people with this option enabled? How does it work?


-- 
Pete Boyd

Open Plan IT - http://openplanit.co.uk
The Golden Ear - http://thegoldenear.org



-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] captive portal without MAC filtering

2009-02-07 Thread Chris Buechler
On Sat, Feb 7, 2009 at 2:31 PM, Pete Boyd petes-li...@thegoldenear.org wrote:
 The captive portal has the following option:
 MAC filtering - Disable MAC filtering
 If this option is set, no attempts will be made to ensure that the MAC
 address of clients stays the same while they're logged in. This is
 required when the MAC address of the client cannot be determined (usually
 because there are routers between pfSense and the clients). If this is
 enabled, RADIUS MAC authentication cannot be used.

 This sounds useful. It could fix the difficulty we have of requiring LAN
 users, who want to add wifi in their home, that they need to use wireless
 access points, not wireless routers (or wireless routers configured as
 purely wireless access points, for those that support this), so that they
 don't ruin our charging model. People find the technical differences hard
 to understand.


It's simple to bridge wireless on almost every wireless router, just
plug in one of the LAN ports rather than the WAN/Internet port. Double
NAT is ugly and potentially problematic, so I would stay away from it
if at all possible. Disabling MAC filtering will work around it if you
really must do it that way.


 So, how does pfSense track people with this option enabled? How does it work?


As it says in what you quoted above, just by IP rather than by IP and MAC.

-
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org



RE: [pfSense Support] Captive portal locking up?

2008-12-10 Thread Atkins, Dwane P
Yes, that was the message I saw.  I am going to upgrade to 1.2.1 RC2.
This is what most are using now, correct?

Thank you

Dwane

-Original Message-
From: Chris Buechler [mailto:[EMAIL PROTECTED] 
Sent: Monday, December 08, 2008 8:06 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive portal locking up?

On Tue, Dec 2, 2008 at 3:27 PM, Atkins, Dwane P [EMAIL PROTECTED]
wrote:
 We are currently using 1.2 RC1 on a Dell Power Edge R200 and 1.2
Release on
 a Dell Power Edge 860.



 In the last couple of weeks, the devices has stopped working for those
who
 are NOT already connected.  If you are connected, you maintain the
 capability to gain access.  Each time I have gone to the device, we
receive
 and error message:



 IPFW2; Ipv6- unknown extension number (5), ext-hd eq 2


You sure that's the exact message? That would make you the only person
to ever get that message on FreeBSD or pfSense - google doesn't know
about it.

Any other potentially relevant messages in your logs?

For lack of any better ideas, I would try upgrading one to 1.2.1 to
see if that makes any difference. Might be some kind of odd ipfw issue
that doesn't exist in FreeBSD 7.0.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Commercial support available - https://portal.pfsense.org


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Commercial support available - https://portal.pfsense.org



Re: [pfSense Support] Captive portal locking up?

2008-12-08 Thread Chris Buechler
On Tue, Dec 2, 2008 at 3:27 PM, Atkins, Dwane P [EMAIL PROTECTED] wrote:
 We are currently using 1.2 RC1 on a Dell Power Edge R200 and 1.2 Release on
 a Dell Power Edge 860.



 In the last couple of weeks, the devices has stopped working for those who
 are NOT already connected.  If you are connected, you maintain the
 capability to gain access.  Each time I have gone to the device, we receive
 and error message:



 IPFW2; Ipv6- unknown extension number (5), ext-hd eq 2


You sure that's the exact message? That would make you the only person
to ever get that message on FreeBSD or pfSense - google doesn't know
about it.

Any other potentially relevant messages in your logs?

For lack of any better ideas, I would try upgrading one to 1.2.1 to
see if that makes any difference. Might be some kind of odd ipfw issue
that doesn't exist in FreeBSD 7.0.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Commercial support available - https://portal.pfsense.org



[pfSense Support] captive portal ldap

2008-11-23 Thread Mikel Jimenez Fernandez


---BeginMessage---

Hello
Is possible to configure captive portal with ldap authentication?

I have a linksys wrtg54 in my LAN, acting as AP. Is possible to 
configure this AP (with the default firmware or DD-wrt/openwrt) to 
authenticate to captive portal of pfsense?


Thanks


---End Message---
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Commercial support available - https://portal.pfsense.org

[pfSense Support] Captive portal questions

2008-11-06 Thread DLStrout
I've been running CP on a 1.2 install for about 6
months now and we now are noticing that there is
no authentication happening.

Thing we've tried:

 Moving the CP to another interface (ie WLAN (WAP
connected ethernet)).
 Starting and restarting the CP service (fails
the webConfigurator when we restart CP service.
 tail the /var/log/lighttpd.error.log (here is
what we are seeing when a client hits the CP ...

2008-11-06 21:44:02: (connections.c.279) SSL: 1
error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1
alert unknown ca
2008-11-06 21:44:02: (connections.c.279) SSL: 1
error:140940E5:SSL routines:SSL3_READ_BYTES:ssl
handshake failure

Any ideas on how to revive the CP functionality
are greatly appreciated

--
David L. Strout
Engineering Systems Plus, LLC




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Commercial support available - https://portal.pfsense.org



[pfSense Support] Captive Portal enabling Ethernet Port Traffic

2008-09-11 Thread Chris Flugstad
So I have a need that I'm not sure if Pfsense is currently doing.  I 
want to have a captive portal, but once auth'd that the ethernet port 
that was used to go through the captive portal, be enabled.  well i 
guess it would already be enabled, since it got through, but more or 
less that the port had full access.  Each port will go to different 
rooms in a hotel.


Any ideas would be appreciated.

-Topher

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] Captive Portal enabling Ethernet Port Traffic

2008-09-11 Thread Dimitri Rodis
If you want to authenticate machines connecting to switch ports, install the 
FreeRADIUS package. I added some interface options to the package earlier this 
year that should allow you to use it for mac-based authentication and vlan 
assignment for switches that support it. I use it in a couple different places 
and it works quite well for us.

Dimitri Rodis
Integrita Systems LLC

-Original Message-
From: Tim Nelson [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 11, 2008 3:43 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal enabling Ethernet Port Traffic

If you want per port (on your switch) based authentication, you may want to 
look at 802.1x with RADIUS. If you'd like to do per IP authentication, 
pfSense will work nicely.

Tim Nelson
Systems/Network Engineer
Rockbochs Inc.
(218)727-4332 x105

- Chris Flugstad [EMAIL PROTECTED] wrote:

 So I have a need that I'm not sure if Pfsense is currently doing.  I
 want to have a captive portal, but once auth'd that the ethernet port

 that was used to go through the captive portal, be enabled.  well i
 guess it would already be enabled, since it got through, but more or
 less that the port had full access.  Each port will go to different
 rooms in a hotel.

 Any ideas would be appreciated.

 -Topher

 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal

2008-03-22 Thread Chris Buechler

Dimitri Rodis wrote:


If I wanted to display a user’s IP address AND MAC address on the 
captive portal page, does anyone have a code snippet that would do 
that on the pfSense captive portal page? Is this possible?




I suggest opening a feature request ticket on cvstrac.pfsense.org, 
and/or starting a bounty. Somebody would probably be willing to pick 
this up for relatively cheap.



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: [pfSense Support] Captive Portal

2008-03-22 Thread Dimitri Rodis
If I made the modifications to display the mac/client IP on the
default captive portal page, would you commit it and make it the
default captive portal page? I would just throw a couple of lines right
beneath the login button that say: 
Client MAC: xx:xx:xx:xx:xx:xx
Client IP: xxx.xxx.xxx.xxx

Dimitri Rodis
Integrita Systems LLC 


-Original Message-
From: Chris Buechler [mailto:[EMAIL PROTECTED] 
Sent: Saturday, March 22, 2008 6:41 PM
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal

Dimitri Rodis wrote:

 If I wanted to display a user's IP address AND MAC address on the 
 captive portal page, does anyone have a code snippet that would do 
 that on the pfSense captive portal page? Is this possible?


I suggest opening a feature request ticket on cvstrac.pfsense.org, 
and/or starting a bounty. Somebody would probably be willing to pick 
this up for relatively cheap.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive Portal

2008-03-21 Thread Dimitri Rodis
If I wanted to display a user's IP address AND MAC address on the
captive portal page, does anyone have a code snippet that would do that
on the pfSense captive portal page? Is this possible?

 

Basically, I want to make it really easy for someone to call us and have
us provision them for access, and if I am able to display that
information on the Captive Portal, I can just have them read it to me as
opposed to trying to step them through all of the hoops to get the mac
address.

 

Thanks,

 

Dimitri Rodis

Integrita Systems LLC 



[pfSense Support] Captive Portal question

2008-02-25 Thread Ugo Bellavance

Hi,

	A question about the captive portal.  I'm looking for a way to disallow 
concurrent user logins.  However, most customers will use MAC address 
for authentication, so if I disallw concurrent user logins, they can 
still access the 'net from the MAC address and give their 
username/password to their neighbor.  Is there a way to prevent that 
apart from using MAC auth for everyone?


Thanks,

Ugo


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] captive portal with cookie

2008-02-05 Thread Ugo Bellavance

Hi,

	I've seen that microtik has an option of using cookies to authenticate 
users (captive portal).  Is there something similar in pfsense?  I'm 
thinking about using the captive portal for auth of subscribers to a 
WiFi service, but I'd rather not have them enter their credentials 
everytime they close their browser.  Is it possible?


Regards,

Ugo


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive Portal trouble

2008-01-20 Thread Yannick Fauconnier
Hi all,

I'm using now pfsense for a few months (old user of monowall) and I wanted 
today to activate captive portal.

So I'm using pfsense 1.2 - RC3 with squid, bandwithd, ntop, and all the other 
usual ones :p

Problem I got, when wanted to activate captive portal, and seems doesn't work 
at all. Traffic always going fine without any requirement for authentication.

Thought maybe transparent proxy would cause that so disabled the transparent 
proxy and still the same thing :s

Config is as followed :
captiveportal
element
namecaptiveportal-pirate.swf/name
size141920/size
content /content
/element
interfacelan/interface
maxproc/maxproc
timeout/
idletimeout30/idletimeout
auth_methodlocal/auth_method
reauthenticateacct/
httpsname/
bwdefaultdn/bwdefaultdn
bwdefaultup/bwdefaultup
certificate/
private-key/
redirurl/
radiusip192.168.200.252/radiusip
radiusip2/
radiusport/
radiusport2/
radiusacctport/
radiuskeypass/radiuskey
radiuskey2/
radiusvendordefault/radiusvendor
enable/
page
htmltext /htmltext
/page
/captiveportal

Any idea why ?

Regards

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal trouble

2008-01-20 Thread Curtis LaMasters
Try clearing your state table and seeing if that fixes the issue.

Curtis


RE: [pfSense Support] Captive Portal trouble

2008-01-20 Thread Yannick Fauconnier
Just tried, and no changes :(

Yannick

From: Curtis LaMasters [mailto:[EMAIL PROTECTED]
Sent: dimanche 20 janvier 2008 23:47
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal trouble

Try clearing your state table and seeing if that fixes the issue.

Curtis


Re: [pfSense Support] Captive Portal trouble

2008-01-20 Thread Curtis LaMasters
Did you already try disabling your transparent proxy?  What are you using
for your captive portal login page?

Curtis


RE: [pfSense Support] Captive Portal trouble

2008-01-20 Thread Yannick Fauconnier
Already tried to disable transparent proxy, change the interface of the proxy 
from lan to wan but didn't help.

AS authentication page, I just create a blank html page where I copy/pasted the 
form :

!DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN 
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd;
html xmlns=http://www.w3.org/1999/xhtml;
head
meta http-equiv=Content-Type content=text/html; charset=utf-8 /
titleUntitled Document/title
/head

body
Private Room
form method=post action=$PORTAL_ACTION$
   p
 input name=auth_user type=text
 input name=auth_pass type=password
 input name=redirurl type=hidden value=$PORTAL_REDIRURL$
 input name=accept type=submit value=Continue
   /p
/form
/body
/html

Regards

From: Curtis LaMasters [mailto:[EMAIL PROTECTED]
Sent: lundi 21 janvier 2008 2:20
To: support@pfsense.com
Subject: Re: [pfSense Support] Captive Portal trouble

Did you already try disabling your transparent proxy?  What are you using for 
your captive portal login page?

Curtis


Re: [pfSense Support] Captive Portal Design documents

2007-10-01 Thread cassio lima
better solution monowall

On 10/1/07, Dziuk, Fred J [EMAIL PROTECTED] wrote:

  Our campus is using PfSense to control wireless access to our network via
 the Captive Portal and becoming very reliant on its operation.  I do not
 want to necessarily become a developer to have technical troubleshooting
 skills.  But I would like to have a document that describes the basics of
 the Captive Portal operations and was hoping for some links to some detailed
 design/operational documents other than source code.  Questions I have:

 1.   How does the CP determine if a user needs to be authenticated?

 2.   Once authenticated, where is the user information kept?

 3.   I can issue PF and IPFW commands in the shell – Are both used in
 CP?

 4.   We have some users that some how disappear from the CP user list,
 but can still get through to the WAN.  How do I debug this?

 5.   Seems like there are extra entries in the firewall ruleset that
 keep accumulating and never get removed.  How do I clean this up?



   I have put out a few questions/problems to this list and have not
 received a single response.  We are establishing an account for the
 commercial support, but we would like to have some local expertise.  Thanks
 for any insight in the Captive Portal's operation.



 Fred Dziuk

 The Univ. of Texas Health Science Center at San Antonio

 Systems and Network Operations

 210-567-2117



Re: [pfSense Support] Captive Portal Design documents

2007-10-01 Thread Scott Ullrich
On 10/1/07, cassio lima [EMAIL PROTECTED] wrote:
 better solution monowall

Please stop trolling.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive portal and CARP

2007-08-15 Thread Jan Zorz

Hi gang.

I have two pfsense firewalls, fw1 and fw2, 10 VLAN interfaces and CARP 
addresses in between. Everything works fine, untill I enable Captive 
portal on one of interfaces.
First sign of trouble is, that all CARP interfaces on primary fw (fw1) 
goes to backup mode and fw2 becomes master. Then, if I disable CARP on 
fw2, fw1 goes to master mode (all interfaces). When I re-enable CARP on 
secondary firewall, all CARP interfaces goes to backup, except the 
interface, where Captive portal is enabled on fw1. This interface is 
suddenly in master mode on both firewalls.


I entered IP of that interface on fw2 into Captive portal Allowed IP 
addresses, added MAC of that interface into Passthrough MAC in 
Captive portal configuration, I added allow any-any rule on that 
interface on fw1, but no luck.


Any idea? My first thought is that CARP packets gets blocked on fw1, but 
no quick idea why...


And, if even this starts to work, what would happen if fw1 dies and CARP 
on fw2 takes over? Is there any possibility to have synchronized 
Captive portal on both fw's?


Thank you, Jan Zorz.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive Portal status does not list USERNAME

2007-08-08 Thread Dziuk, Fred J
  We are using pfSense on our campus and it initially seems like a nice
upgrade to m0n0wall.  However, on the Status - Captive Portal page,
m0n0wall would list the logged in USERNAME, Traffic IN, and Traffiic
OUT.  PfSense shows only IP address, MAC address, and Session Start
Time.  The USERNAME field associated with the IP address is very
important to us because with the username we can tie the IP address to a
user with email and phone number.  Is there a way to view the active
users with IP address and username?  I have checked the documentation
(mostly m0n0wall) and there seems to a difference on this one page
display for some reason.

 

Fred Dziuk

Univ. of Texas Health Science Center at San Antonio

 



[pfSense Support] Captive Portal kills my firewall rules

2007-07-20 Thread Nate Stiller

When I enable the Captive Portal on my LAN interface in either 1.2 BETA
version 1 or 2, it messes with my WAN firewall rules. When enabled, the only
rule that works is an allow in to pfSense's web admin from outside on HTTPS.
Anyone else experience this or know of any fixes?


Re: [pfSense Support] Captive Portal kills my firewall rules

2007-07-20 Thread Chris Buechler

Nate Stiller wrote:
When I enable the Captive Portal on my LAN interface in either 1.2 
BETA version 1 or 2, it messes with my WAN firewall rules. When 
enabled, the only rule that works is an allow in to pfSense's web 
admin from outside on HTTPS. Anyone else experience this or know of 
any fixes?
You have to exempt any hosts with ports open to them from the WAN, as CP 
will block all reply traffic from those hosts otherwise.



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal kills my firewall rules

2007-07-20 Thread Nate Stiller

I forgot to say that this happens even on the clients that I use the pass
through MAC filtering.


On 7/20/07, Chris Buechler [EMAIL PROTECTED] wrote:


Nate Stiller wrote:
 When I enable the Captive Portal on my LAN interface in either 1.2
 BETA version 1 or 2, it messes with my WAN firewall rules. When
 enabled, the only rule that works is an allow in to pfSense's web
 admin from outside on HTTPS. Anyone else experience this or know of
 any fixes?
You have to exempt any hosts with ports open to them from the WAN, as CP
will block all reply traffic from those hosts otherwise.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




[pfSense Support] Captive portal 'file manager' files not visible

2007-06-25 Thread Roberto Greiner
I'm making a test with 1.2Beta1, and got a problem with the captive
portal. I added two files in the file manager section with the name
starting with 'captiveportal-', and added references to those two files
(one a .gif image named captiveportal-semfio_logo.gif, the other an
.html iframe file named captiveportal-noticias.html) in the 'Portal page
contents' file. It's exactly the same structure I used in the 1.0
pfSense and it worked. But with 1.2B1 I'm getting a 404 error for both
files when a client opens the captive portal screen. Did somebody else
get such a problem?

Any help is welcome.

Thank you,

Marcos Roberto Greiner


-- 
  -
Marcos Roberto Greiner

   Os otimistas acham que estamos no melhor dos mundos
Os pessimistas tem medo de que isto seja verdade
   Murphy
  -

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive portal 'file manager' files not visible

2007-06-25 Thread Scott Ullrich

Upgrade to a recent testing snapshot.  This has been fixed since Beta1.

Scott


On 6/25/07, Roberto Greiner [EMAIL PROTECTED] wrote:

I'm making a test with 1.2Beta1, and got a problem with the captive
portal. I added two files in the file manager section with the name
starting with 'captiveportal-', and added references to those two files
(one a .gif image named captiveportal-semfio_logo.gif, the other an
.html iframe file named captiveportal-noticias.html) in the 'Portal page
contents' file. It's exactly the same structure I used in the 1.0
pfSense and it worked. But with 1.2B1 I'm getting a 404 error for both
files when a client opens the captive portal screen. Did somebody else
get such a problem?

Any help is welcome.

Thank you,

Marcos Roberto Greiner


--
  -
Marcos Roberto Greiner

   Os otimistas acham que estamos no melhor dos mundos
Os pessimistas tem medo de que isto seja verdade
   Murphy
  -

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive Portal MAC Passthru

2007-06-16 Thread Fuchs, Martin
Hi !
Anyone out there using Captive Portal with passthru MAC ?

Because it just does not work form e... when adding a MAC adress it seems as i 
fit would be ignored.
When addind the IP it works again.
There does not come up any website asking for username and password... do I 
have to add some rule from WLAN ubnet towards pfsense or else ?
Is there anyone successfully using MAC-Filtering ?

I'm running the latest snapshot (6-6) and there's nothing in the logs...

Any hints ?

Greetings,

Martin

-Ursprüngliche Nachricht-
Von: Heiko Garbe [mailto:[EMAIL PROTECTED] 
Gesendet: Sonntag, 17. Juni 2007 00:04
An: support@pfsense.com
Betreff: Re: [pfSense Support] pfSense Firewall Logs: no ports listed !?

That´s not a multicast problem btw.

Take a look at the attachment-screenshot, where is the udp port number 500 for 
the vpn vector or any other port??

Greetings
heiko

Adam Armstrong schrieb:
 224.0.0.2 is the all routers multicast address, and any traffic to 
 it is probably router discovery or something similar.

 adam.
 That looks more like a protocol decode issue to me.  224.0.0.2 is a 
 multicast address, I wouldn't be surprised if that really wasn't UDP.
 Can you show an example of a TCP log entry w/out ports, or something 
 to a non-multicast address?  Thanks

 --Bill

 On 6/16/07, Heiko Garbe [EMAIL PROTECTED] wrote:
 Hello,
 here is a screenshot. I think he means the firewall logs in the gui
 Greetings
 heiko

 Chris Buechler schrieb:
  On Fri, 2007-06-15 at 18:01 +0200, Fuchs, Martin wrote:
 
  Hi !
 
  In the firewall logs always was shown blocked traffic with the 
  ports that were used...
 
  Now with the 6-6 snapshot it does not display the ports anymore
 ... !?
 
  It's a little confusing and seems tob e a bit silly / senseless
 not to
  display the ports !?
 
 
 
  Can you post a screenshot? Not sure exactly what you mean, I 
  haven't seen or heard of any issues.
 
 
 
  --
  --- To unsubscribe, e-mail: [EMAIL PROTECTED] For 
  additional commands, e-mail: [EMAIL PROTECTED]
 
 
 

 
 - To unsubscribe, e-mail: [EMAIL PROTECTED] For 
 additional commands, e-mail: [EMAIL PROTECTED]



 -
 To unsubscribe, e-mail: [EMAIL PROTECTED] For 
 additional commands, e-mail: [EMAIL PROTECTED]



 -
 To unsubscribe, e-mail: [EMAIL PROTECTED] For additional 
 commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive Portal ?

2007-05-18 Thread David Strout
Now that I plowed through the VLAN issue.  I have
been presented with another config question.

Is there any way to have captive portal active on
multiple interfaces?

I dug through the mail lists and the forum, but it
seems that the answer is a resounding no.  So
naturally the next question is ... is there any
plan to modify the captive portal to address
multiple interfaces?  I am sure it would be a
coding nightmare, but in retrospect, have been
presented with the question and seeing the value
in their request, it sure would be a nice feature
for a future release.

--
David L. Strout
Engineering Systems Plus, LLC




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal ?

2007-05-18 Thread Scott Ullrich

On 5/18/07, David Strout [EMAIL PROTECTED] wrote:

Now that I plowed through the VLAN issue.  I have
been presented with another config question.

Is there any way to have captive portal active on
multiple interfaces?

I dug through the mail lists and the forum, but it
seems that the answer is a resounding no.  So
naturally the next question is ... is there any
plan to modify the captive portal to address
multiple interfaces?  I am sure it would be a
coding nightmare, but in retrospect, have been
presented with the question and seeing the value
in their request, it sure would be a nice feature
for a future release.


No it will not work on multiple interfaces and there are no plans to
work on this.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive portal sugesstion

2007-05-03 Thread Mohd Saidy

Hi,

1. Congratulation to developer that will release a new version of pfsense. 
Nice jobs guys!
2. I'm using captive portal for authenticate my wireless user (right now 
have about 700 users with approximately 100 cocurrent users), but when i 
want to add user i take some memory and time to read all existing users. My 
suggestions, why not split or group all user by 10 or 20 user by pages. For 
example as below;



Users
1. abc1
2. abc2
3. abc3
4. abc4
5. abc5
6. abc6
7. abc7
8. abc8
9. abc9
10. abc10

 1 2 3 4 5 6 7 8 9 10 


Thank you 




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive portal sugesstion

2007-05-03 Thread Scott Ullrich

On 5/3/07, Mohd Saidy [EMAIL PROTECTED] wrote:

Hi,

1. Congratulation to developer that will release a new version of pfsense.
Nice jobs guys!
2. I'm using captive portal for authenticate my wireless user (right now
have about 700 users with approximately 100 cocurrent users), but when i
want to add user i take some memory and time to read all existing users. My
suggestions, why not split or group all user by 10 or 20 user by pages. For
example as below;


Users
1. abc1
2. abc2
3. abc3
4. abc4
5. abc5
6. abc6
7. abc7
8. abc8
9. abc9
10. abc10

 1 2 3 4 5 6 7 8 9 10 


Thank you


Thanks for the suggestion!  However we do not maintain the captive
portal implementation.   Maybe you could email the m0n0wall list with
your suggestion.

However, we are not against a bounty in our forum to help nudge this
along from our end.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] captive portal apply button

2007-03-19 Thread Scott Ullrich

On 3/18/07, Fuchs, Martin [EMAIL PROTECTED] wrote:

Hi !

I think it might be an error in captive portal:

When changing some entry and then save them, there appear two apply
buttons:

http://pfsense.trendchiller.com/pics/cp_apply_error.jpg


Thanks, fixed!

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-06 Thread Fuchs, Martin
Until now it behaviour did not change ...

Using:
1.0.1-SNAPSHOT-02-27-2007
built on Tue Mar 6 09:35:38 EST 2007

# ipfw show
00030 22320  9418077 skipto 5 ip from any to any in via fxp0 keep-state
00030  4883  2515916 skipto 5 ip from any to any in via fxp2 keep-state
00030 00 skipto 5 ip from any to any in via fxp1 keep-state
00030 00 skipto 5 ip from any to any in via fxp3 keep-state
00050 4  524 skipto 29900 ip from any to any MAC 00:0e:35:6c:bf:d7 any 
keep-state
00050 00 skipto 29900 ip from any to any MAC any 00:0e:35:6c:bf:d7 
keep-state
00050 00 skipto 29900 ip from any to any MAC 00:14:6c:6c:f4:58 any 
keep-state
00050 00 skipto 29900 ip from any to any MAC any 00:14:6c:6c:f4:58 
keep-state
00050 00 skipto 29900 ip from any to any MAC 00:18:de:a0:f7:2e any 
keep-state
00050 00 skipto 29900 ip from any to any MAC any 00:18:de:a0:f7:2e 
keep-state
00050 00 skipto 29900 ip from any to any MAC 00:80:5a:35:4f:7b any 
keep-state
00050 00 skipto 29900 ip from any to any MAC any 00:80:5a:35:4f:7b 
keep-state
01000 16617  3892662 skipto 5 ip from any to any not layer2 not via ath0
01001  8152  1184059 allow ip from any to any layer2 not via ath0
0110014  392 allow ip from any to any layer2 mac-type 0x0806
01100 8  934 allow ip from any to any layer2 mac-type 0x888e
01100 00 allow ip from any to any layer2 mac-type 0x88c7
01100 00 allow ip from any to any layer2 mac-type 0x8863
01100 00 allow ip from any to any layer2 mac-type 0x8864
01100 00 allow ip from any to any layer2 mac-type 0x8863
01100 00 allow ip from any to any layer2 mac-type 0x8864
01100 00 allow ip from any to any layer2 mac-type 0x888e
01101 16 deny ip from any to any layer2 not mac-type 0x0800
01102   39553712 skipto 2 ip from any to any layer2
01200 2  682 allow udp from any 68 to 255.255.255.255 dst-port 67 in
01201 00 allow udp from any 68 to 10.100.101.1 dst-port 67 in
01202 00 allow udp from 10.100.101.1 67 to any dst-port 68 out
01203 00 allow icmp from 10.100.101.1 to any out icmptypes 8
01204 00 allow icmp from any to 10.100.101.1 in icmptypes 0
01300 00 allow udp from any to 10.100.101.1 dst-port 53 in
01301 00 allow udp from 10.100.101.1 53 to any out
01302 00 allow tcp from any to 10.100.101.1 dst-port 8000 in
01303 00 allow tcp from 10.100.101.1 8000 to any out
19902 00 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
19903 00 allow tcp from any 80 to any out
19904   39152372 deny ip from any to any
29900   39954236 allow ip from any to any layer2
65535 43828 15827315 allow ip from any to any

-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Dienstag, 6. März 2007 01:17
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

I found a potential issue.  Please test a snapshot around two hours from now.

Scott

On 3/5/07, Scott Ullrich [EMAIL PROTECTED] wrote:
 On 3/5/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
  Hi, Scott !
 
  Fresh install shows the following, but does not work also :-(
 [snip]
  01100 0   0 allow ip from any to any layer2 mac-type 0x888e

 I don't see the traffic counter increasing on this test.  Did you
 actually test login again?  The prior output shows the counter at 4.

 Scott


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-05 Thread Fuchs, Martin
What should it read on the fresh install ?
It's a productive system... it's hard to reinstall in between...

On the non-working-system it reads:

# ipfw show
00030 147403 130387849 skipto 5 ip from any to any in via fxp0 keep-state
00030  43395  63498221 skipto 5 ip from any to any in via fxp2 keep-state
00030  0 0 skipto 5 ip from any to any in via fxp1 keep-state
00030  0 0 skipto 5 ip from any to any in via fxp3 keep-state
00050  0 0 skipto 29900 ip from any to any MAC 00:0e:35:6c:bf:d8 
any keep-state
00050  0 0 skipto 29900 ip from any to any MAC any 
00:0e:35:6c:bf:d8 keep-state
00050  0 0 skipto 29900 ip from any to any MAC 00:14:6c:6c:f4:58 
any keep-state
00050  0 0 skipto 29900 ip from any to any MAC any 
00:14:6c:6c:f4:58 keep-state
00050  0 0 skipto 29900 ip from any to any MAC 00:18:de:a0:f7:2e 
any keep-state
00050  0 0 skipto 29900 ip from any to any MAC any 
00:18:de:a0:f7:2e keep-state
00050  0 0 skipto 29900 ip from any to any MAC 00:80:5a:35:4f:7b 
any keep-state
00050  0 0 skipto 29900 ip from any to any MAC any 
00:80:5a:35:4f:7b keep-state
01000  76193  64802776 skipto 5 ip from any to any not layer2 not via ath0
01001  32161   1841212 allow ip from any to any layer2 not via ath0
01100  0 0 allow ip from any to any layer2 mac-type 0x0806
01100  4   460 allow ip from any to any layer2 mac-type 0x888e
01100  0 0 allow ip from any to any layer2 mac-type 0x8863
01100  0 0 allow ip from any to any layer2 mac-type 0x8864
01100  0 0 allow ip from any to any layer2 mac-type 0x8863
01100  0 0 allow ip from any to any layer2 mac-type 0x8864
01100  0 0 allow ip from any to any layer2 mac-type 0x888e
01101  0 0 deny ip from any to any layer2 not mac-type 0x0800
01102103  6114 skipto 2 ip from any to any layer2
01200  0 0 allow udp from any 68 to 255.255.255.255 dst-port 67 in
01201  0 0 allow udp from any 68 to 10.100.101.1 dst-port 67 in
01202  0 0 allow udp from 10.100.101.1 67 to any dst-port 68 out
01203  0 0 allow icmp from 10.100.101.1 to any out icmptypes 8
01204  0 0 allow icmp from any to 10.100.101.1 in icmptypes 0
01300  0 0 allow udp from any to 10.100.101.1 dst-port 53 in
01301  0 0 allow udp from 10.100.101.1 53 to any out
01302 29  1655 allow tcp from any to 10.100.101.1 dst-port 8000 in
01303 23   976 allow tcp from 10.100.101.1 8000 to any out
19902  0 0 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
19903  0 0 allow tcp from any 80 to any out
19904 51  3483 deny ip from any to any
29900382 54201 allow ip from any to any layer2
65535 267263 258737393 allow ip from any to any

-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Sonntag, 4. März 2007 19:06
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

Also, please install a working version and from the shell do a:

ipfw show

Then reinstall the non working version and from a shell do:

ipfw show

Scott


On 3/4/07, Scott Ullrich [EMAIL PROTECTED] wrote:
 On 3/4/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
  Hmmm, tried the latest snapshot... wpa2 does not seem to work with the 
  captive portal until now... site cannot be found... :(

 Reinstall?   The options are definitely back.

 # pfsense requires for WPA
 add 1100 set 1 pass layer2 mac-type 0x888e

 Scott


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal

2007-03-05 Thread Scott Ullrich

On 3/5/07, Fuchs, Martin [EMAIL PROTECTED] wrote:

What should it read on the fresh install ?
It's a productive system... it's hard to reinstall in between...


Right, but it must work, correct? :)   If you could get a reading from
a box that works, it would be most helpful.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-05 Thread Fuchs, Martin
I'll try to get a fresh install on the same system as soon as possible...


-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Montag, 5. März 2007 20:52
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

On 3/5/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 What should it read on the fresh install ?
 It's a productive system... it's hard to reinstall in between...

Right, but it must work, correct? :)   If you could get a reading from
a box that works, it would be most helpful.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-05 Thread Fuchs, Martin
Hi, Scott !

Fresh install shows the following, but does not work also :-(

00030  7882 4784874 skipto 5 ip from any to any in via fxp0 keep-state
00030  1445 1633539 skipto 5 ip from any to any in via fxp2 keep-state
00030 0   0 skipto 5 ip from any to any in via fxp1 keep-state
00030 0   0 skipto 5 ip from any to any in via fxp3 keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:0e:35:6c:bf:d7 any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:0e:35:6c:bf:d7 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:14:6c:6c:f4:58 any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:14:6c:6c:f4:58 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:18:de:a0:f7:2e any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:18:de:a0:f7:2e 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:80:5a:35:4f:7b any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:80:5a:35:4f:7b 
keep-state
01000  4528 1890097 skipto 5 ip from any to any not layer2 not via ath0
01001  2595  246062 allow ip from any to any layer2 not via ath0
01100 0   0 allow ip from any to any layer2 mac-type 0x0806
01100 0   0 allow ip from any to any layer2 mac-type 0x888e
01100 0   0 allow ip from any to any layer2 mac-type 0x8863
01100 0   0 allow ip from any to any layer2 mac-type 0x8864
01100 0   0 allow ip from any to any layer2 mac-type 0x8863
01100 0   0 allow ip from any to any layer2 mac-type 0x8864
01100 0   0 allow ip from any to any layer2 mac-type 0x888e
01101 0   0 deny ip from any to any layer2 not mac-type 0x0800
01102 0   0 skipto 2 ip from any to any layer2
01200 0   0 allow udp from any 68 to 255.255.255.255 dst-port 67 in
01201 0   0 allow udp from any 68 to 10.100.101.1 dst-port 67 in
01202 0   0 allow udp from 10.100.101.1 67 to any dst-port 68 out
01203 0   0 allow icmp from 10.100.101.1 to any out icmptypes 8
01204 0   0 allow icmp from any to 10.100.101.1 in icmptypes 0
01300 0   0 allow udp from any to 10.100.101.1 dst-port 53 in
01301 0   0 allow udp from 10.100.101.1 53 to any out
01302 0   0 allow tcp from any to 10.100.101.1 dst-port 8000 in
01303 0   0 allow tcp from 10.100.101.1 8000 to any out
19902 0   0 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
19903 0   0 allow tcp from any 80 to any out
19904 0   0 deny ip from any to any
29900 0   0 allow ip from any to any layer2
65535 13855 8308510 allow ip from any to any

-Ursprüngliche Nachricht-
Von: Fuchs, Martin [mailto:[EMAIL PROTECTED] 
Gesendet: Montag, 5. März 2007 21:00
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

I'll try to get a fresh install on the same system as soon as possible...


-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Montag, 5. März 2007 20:52
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

On 3/5/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 What should it read on the fresh install ?
 It's a productive system... it's hard to reinstall in between...

Right, but it must work, correct? :)   If you could get a reading from
a box that works, it would be most helpful.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-05 Thread Fuchs, Martin
What really irritates m eis the fact that the mac filtering in the captive 
portal works well with wpa_2.
Any cohenerce between mac and username auth ?

Any clues for that ?

Greets, Martin !

-Ursprüngliche Nachricht-
Von: Fuchs, Martin [mailto:[EMAIL PROTECTED] 
Gesendet: Montag, 5. März 2007 21:35
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

Hi, Scott !

Fresh install shows the following, but does not work also :-(

00030  7882 4784874 skipto 5 ip from any to any in via fxp0 keep-state
00030  1445 1633539 skipto 5 ip from any to any in via fxp2 keep-state
00030 0   0 skipto 5 ip from any to any in via fxp1 keep-state
00030 0   0 skipto 5 ip from any to any in via fxp3 keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:0e:35:6c:bf:d7 any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:0e:35:6c:bf:d7 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:14:6c:6c:f4:58 any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:14:6c:6c:f4:58 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:18:de:a0:f7:2e any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:18:de:a0:f7:2e 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC 00:80:5a:35:4f:7b any 
keep-state
00050 0   0 skipto 29900 ip from any to any MAC any 00:80:5a:35:4f:7b 
keep-state
01000  4528 1890097 skipto 5 ip from any to any not layer2 not via ath0
01001  2595  246062 allow ip from any to any layer2 not via ath0
01100 0   0 allow ip from any to any layer2 mac-type 0x0806
01100 0   0 allow ip from any to any layer2 mac-type 0x888e
01100 0   0 allow ip from any to any layer2 mac-type 0x8863
01100 0   0 allow ip from any to any layer2 mac-type 0x8864
01100 0   0 allow ip from any to any layer2 mac-type 0x8863
01100 0   0 allow ip from any to any layer2 mac-type 0x8864
01100 0   0 allow ip from any to any layer2 mac-type 0x888e
01101 0   0 deny ip from any to any layer2 not mac-type 0x0800
01102 0   0 skipto 2 ip from any to any layer2
01200 0   0 allow udp from any 68 to 255.255.255.255 dst-port 67 in
01201 0   0 allow udp from any 68 to 10.100.101.1 dst-port 67 in
01202 0   0 allow udp from 10.100.101.1 67 to any dst-port 68 out
01203 0   0 allow icmp from 10.100.101.1 to any out icmptypes 8
01204 0   0 allow icmp from any to 10.100.101.1 in icmptypes 0
01300 0   0 allow udp from any to 10.100.101.1 dst-port 53 in
01301 0   0 allow udp from 10.100.101.1 53 to any out
01302 0   0 allow tcp from any to 10.100.101.1 dst-port 8000 in
01303 0   0 allow tcp from 10.100.101.1 8000 to any out
19902 0   0 fwd 127.0.0.1,8000 tcp from any to any dst-port 80 in
19903 0   0 allow tcp from any 80 to any out
19904 0   0 deny ip from any to any
29900 0   0 allow ip from any to any layer2
65535 13855 8308510 allow ip from any to any

-Ursprüngliche Nachricht-
Von: Fuchs, Martin [mailto:[EMAIL PROTECTED] 
Gesendet: Montag, 5. März 2007 21:00
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

I'll try to get a fresh install on the same system as soon as possible...


-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Montag, 5. März 2007 20:52
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

On 3/5/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 What should it read on the fresh install ?
 It's a productive system... it's hard to reinstall in between...

Right, but it must work, correct? :)   If you could get a reading from
a box that works, it would be most helpful.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal

2007-03-05 Thread Scott Ullrich

On 3/5/07, Fuchs, Martin [EMAIL PROTECTED] wrote:

Hi, Scott !

Fresh install shows the following, but does not work also :-(

[snip]

01100 0   0 allow ip from any to any layer2 mac-type 0x888e


I don't see the traffic counter increasing on this test.  Did you
actually test login again?  The prior output shows the counter at 4.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal

2007-03-05 Thread Scott Ullrich

I found a potential issue.  Please test a snapshot around two hours from now.

Scott

On 3/5/07, Scott Ullrich [EMAIL PROTECTED] wrote:

On 3/5/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 Hi, Scott !

 Fresh install shows the following, but does not work also :-(
[snip]
 01100 0   0 allow ip from any to any layer2 mac-type 0x888e

I don't see the traffic counter increasing on this test.  Did you
actually test login again?  The prior output shows the counter at 4.

Scott



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-04 Thread Fuchs, Martin
Hmmm, tried the latest snapshot... wpa2 does not seem to work with the captive 
portal until now... site cannot be found... :(

-Ursprüngliche Nachricht-
Von: Holger Bauer [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 21:39
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

Just monitor the build dates. You need the next available build from now.

holger

-Ursprüngliche Nachricht-
Von: Fuchs, Martin [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 21:29
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

Well, yes, it's wpa-2 aes :-)

Best work !!!

I'll check it !!!

Just tell me when, else I'll test it in 2 hours :-)

-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 20:52
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

On 3/3/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 Hi !

 I'm trying to use captive portal on ath0 interface...

 WLAN-client gets dhcp-lease and everything bit cannot tonnect to any
 network...

 If i add the mac-adress to the captive portal it works wothout auth...

 But i want auth for this client, so i remove the mac... but there does
 not pop up any auth page...

 When adding tcp 8000 from wlan-subnet to localhost there still is no
 popup...

 When looking to pfsense/status.php it looks like the rule for captive
 portal is generated without the rule having added by hand (so as it
 should be in the new version)

 Can anyone affirm this or is there just something i have overseen ?

 Greets, Martin !

If you are speaking of WPA then I just fixed that.   Please test a new
snapshot in a couple of hours.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal

2007-03-04 Thread Scott Ullrich

On 3/4/07, Fuchs, Martin [EMAIL PROTECTED] wrote:

Hmmm, tried the latest snapshot... wpa2 does not seem to work with the captive 
portal until now... site cannot be found... :(


Reinstall?   The options are definitely back.

# pfsense requires for WPA
add 1100 set 1 pass layer2 mac-type 0x888e

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal

2007-03-04 Thread Scott Ullrich

Also, please install a working version and from the shell do a:

ipfw show

Then reinstall the non working version and from a shell do:

ipfw show

Scott


On 3/4/07, Scott Ullrich [EMAIL PROTECTED] wrote:

On 3/4/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 Hmmm, tried the latest snapshot... wpa2 does not seem to work with the 
captive portal until now... site cannot be found... :(

Reinstall?   The options are definitely back.

# pfsense requires for WPA
add 1100 set 1 pass layer2 mac-type 0x888e

Scott



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive Portal

2007-03-03 Thread Fuchs, Martin
Hi !

I'm trying to use captive portal on ath0 interface...

WLAN-client gets dhcp-lease and everything bit cannot tonnect to any
network...

If i add the mac-adress to the captive portal it works wothout auth...

But i want auth for this client, so i remove the mac... but there does
not pop up any auth page...

When adding tcp 8000 from wlan-subnet to localhost there still is no
popup...

When looking to pfsense/status.php it looks like the rule for captive
portal is generated without the rule having added by hand (so as it
should be in the new version)

Can anyone affirm this or is there just something i have overseen ?

Greets, Martin !

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [pfSense Support] Captive Portal

2007-03-03 Thread Scott Ullrich

On 3/3/07, Fuchs, Martin [EMAIL PROTECTED] wrote:

Hi !

I'm trying to use captive portal on ath0 interface...

WLAN-client gets dhcp-lease and everything bit cannot tonnect to any
network...

If i add the mac-adress to the captive portal it works wothout auth...

But i want auth for this client, so i remove the mac... but there does
not pop up any auth page...

When adding tcp 8000 from wlan-subnet to localhost there still is no
popup...

When looking to pfsense/status.php it looks like the rule for captive
portal is generated without the rule having added by hand (so as it
should be in the new version)

Can anyone affirm this or is there just something i have overseen ?

Greets, Martin !


If you are speaking of WPA then I just fixed that.   Please test a new
snapshot in a couple of hours.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-03 Thread Fuchs, Martin
Well, yes, it's wpa-2 aes :-)

Best work !!!

I'll check it !!!

Just tell me when, else I'll test it in 2 hours :-)

-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 20:52
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

On 3/3/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 Hi !

 I'm trying to use captive portal on ath0 interface...

 WLAN-client gets dhcp-lease and everything bit cannot tonnect to any
 network...

 If i add the mac-adress to the captive portal it works wothout auth...

 But i want auth for this client, so i remove the mac... but there does
 not pop up any auth page...

 When adding tcp 8000 from wlan-subnet to localhost there still is no
 popup...

 When looking to pfsense/status.php it looks like the rule for captive
 portal is generated without the rule having added by hand (so as it
 should be in the new version)

 Can anyone affirm this or is there just something i have overseen ?

 Greets, Martin !

If you are speaking of WPA then I just fixed that.   Please test a new
snapshot in a couple of hours.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-03 Thread Holger Bauer
Just monitor the build dates. You need the next available build from now.

holger

-Ursprüngliche Nachricht-
Von: Fuchs, Martin [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 21:29
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

Well, yes, it's wpa-2 aes :-)

Best work !!!

I'll check it !!!

Just tell me when, else I'll test it in 2 hours :-)

-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 20:52
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

On 3/3/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 Hi !

 I'm trying to use captive portal on ath0 interface...

 WLAN-client gets dhcp-lease and everything bit cannot tonnect to any
 network...

 If i add the mac-adress to the captive portal it works wothout auth...

 But i want auth for this client, so i remove the mac... but there does
 not pop up any auth page...

 When adding tcp 8000 from wlan-subnet to localhost there still is no
 popup...

 When looking to pfsense/status.php it looks like the rule for captive
 portal is generated without the rule having added by hand (so as it
 should be in the new version)

 Can anyone affirm this or is there just something i have overseen ?

 Greets, Martin !

If you are speaking of WPA then I just fixed that.   Please test a new
snapshot in a couple of hours.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AW: [pfSense Support] Captive Portal

2007-03-03 Thread Fuchs, Martin
Just started monitoring :-)

-Ursprüngliche Nachricht-
Von: Holger Bauer [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 21:39
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

Just monitor the build dates. You need the next available build from now.

holger

-Ursprüngliche Nachricht-
Von: Fuchs, Martin [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 21:29
An: support@pfsense.com
Betreff: AW: [pfSense Support] Captive Portal

Well, yes, it's wpa-2 aes :-)

Best work !!!

I'll check it !!!

Just tell me when, else I'll test it in 2 hours :-)

-Ursprüngliche Nachricht-
Von: Scott Ullrich [mailto:[EMAIL PROTECTED] 
Gesendet: Samstag, 3. März 2007 20:52
An: support@pfsense.com
Betreff: Re: [pfSense Support] Captive Portal

On 3/3/07, Fuchs, Martin [EMAIL PROTECTED] wrote:
 Hi !

 I'm trying to use captive portal on ath0 interface...

 WLAN-client gets dhcp-lease and everything bit cannot tonnect to any
 network...

 If i add the mac-adress to the captive portal it works wothout auth...

 But i want auth for this client, so i remove the mac... but there does
 not pop up any auth page...

 When adding tcp 8000 from wlan-subnet to localhost there still is no
 popup...

 When looking to pfsense/status.php it looks like the rule for captive
 portal is generated without the rule having added by hand (so as it
 should be in the new version)

 Can anyone affirm this or is there just something i have overseen ?

 Greets, Martin !

If you are speaking of WPA then I just fixed that.   Please test a new
snapshot in a couple of hours.

Scott

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[pfSense Support] Captive Portal and DNS

2007-03-03 Thread Kelvin Chiang
Hi, anyone has any information how to pass DNS request packet through
captive portal? The problem I faced was that the computers configured
with a DNS server IP address instead of obtaining DNS server IP
dynamically cannot invoke the captive portal.
 
Regards,
Kelvin


  1   2   >