You can check in which session your Mac address lies. ipset -L
Your Mac address should be into the registered one. Thanks, Ludovic Zammit Product Support Engineer Principal Cell: +1.613.670.8432 Akamai Technologies - Inverse 145 Broadway Cambridge, MA 02142 Connect with Us: <https://community.akamai.com/> <http://blogs.akamai.com/> <https://twitter.com/akamai> <http://www.facebook.com/AkamaiTechnologies> <http://www.linkedin.com/company/akamai-technologies> <http://www.youtube.com/user/akamaitechnologies?feature=results_main> > On Feb 28, 2022, at 10:57 AM, Park Wifi <bee...@gmail.com> wrote: > > Sorry, let me clarify. > > Non-registered devices = guests that I do not control. They work. > > I took all my IOT devices and manually registered them to the admin account > and I can see them on that account when I search by MAC. Those do not work > as they are still getting the portal. > > Below is an example of one that is registered. > > Status > (Click to sort Descending) > MAC Address > (Click to sort Ascending) > Registration Date > (Click to sort Ascending) > Unregistration Date > (Click to sort Ascending) > Computer Name > (Click to sort Ascending) > Device Class > (Click to sort Ascending) > registered 00:0c:29:09: > <https://urldefense.com/v3/__https://bet0packet00.wifi.betabel.com:1443/admin*/node/00:0c:29:09:23:cf__;Iw!!GjvTz_vk!A8RTcAI7cy3wnFlW1XkDrnfcE_WKIBCi_q0zR9n79j_zQ8cttziEbnbVf9yVRA$>xx:xx > 01/05/2022 03:42 PM 12/31/2027 12:00 AM > > On Mon, Feb 28, 2022 at 7:52 AM Zammit, Ludovic <luza...@akamai.com > <mailto:luza...@akamai.com>> wrote: > That’s correct, that’s the goal, non-registered device will get the portal. > > You have to register them manually. > > Thanks, > > Ludovic Zammit > Product Support Engineer Principal > > Cell: +1.613.670.8432 > Akamai Technologies - Inverse > 145 Broadway > Cambridge, MA 02142 > Connect with Us: <https://community.akamai.com/> > <http://blogs.akamai.com/> > <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!A8RTcAI7cy3wnFlW1XkDrnfcE_WKIBCi_q0zR9n79j_zQ8cttziEbnbbyhgJ9Q$> > > <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!A8RTcAI7cy3wnFlW1XkDrnfcE_WKIBCi_q0zR9n79j_zQ8cttziEbnarBGmkkQ$> > > <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!A8RTcAI7cy3wnFlW1XkDrnfcE_WKIBCi_q0zR9n79j_zQ8cttziEbnbmi2gVpQ$> > > <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!A8RTcAI7cy3wnFlW1XkDrnfcE_WKIBCi_q0zR9n79j_zQ8cttziEbnZHOB2-8Q$> > >> On Feb 28, 2022, at 10:45 AM, Park Wifi <bee...@gmail.com >> <mailto:bee...@gmail.com>> wrote: >> >> Hi, >> >> I did register them manually and assigned them the Staff role which has >> unlimited access/bandwidth. >> >> If I connect any non-registered devices they get the portal page and can >> register. Those work and do have internet access. >> >> On Mon, Feb 28, 2022 at 7:29 AM Zammit, Ludovic <luza...@akamai.com >> <mailto:luza...@akamai.com>> wrote: >> Hello Park Wifi, >> >> The feature is still there, you will need to register your Mac addresses >> manually and assign them a role. >> >> You an batch the importation with a CSV importation as well. >> >> Do you get internet access on the inline VLAN if you register a computer >> manually ? >> >> Thanks, >> >> Ludovic Zammit >> Product Support Engineer Principal >> >> Cell: +1.613.670.8432 >> Akamai Technologies - Inverse >> 145 Broadway >> Cambridge, MA 02142 >> Connect with Us: <https://community.akamai.com/> >> <http://blogs.akamai.com/> >> <https://urldefense.com/v3/__https://twitter.com/akamai__;!!GjvTz_vk!GO_3azfD6i5-Nw9mMz0W1DJ7JDQp6jIo6NjnlnViDlMhE2HFjau3w1UA1DHYGQ$> >> >> <https://urldefense.com/v3/__http://www.facebook.com/AkamaiTechnologies__;!!GjvTz_vk!GO_3azfD6i5-Nw9mMz0W1DJ7JDQp6jIo6NjnlnViDlMhE2HFjau3w1WZ2gzICw$> >> >> <https://urldefense.com/v3/__http://www.linkedin.com/company/akamai-technologies__;!!GjvTz_vk!GO_3azfD6i5-Nw9mMz0W1DJ7JDQp6jIo6NjnlnViDlMhE2HFjau3w1XtmHQY4g$> >> >> <https://urldefense.com/v3/__http://www.youtube.com/user/akamaitechnologies?feature=results_main__;!!GjvTz_vk!GO_3azfD6i5-Nw9mMz0W1DJ7JDQp6jIo6NjnlnViDlMhE2HFjau3w1WnqlX2LQ$> >> >>> On Feb 27, 2022, at 3:11 PM, Park Wifi via PacketFence-users >>> <packetfence-users@lists.sourceforge.net >>> <mailto:packetfence-users@lists.sourceforge.net>> wrote: >>> >>> Hi, >>> >>> In the prior versions it was easy to allow certain MAC addresses to bypass >>> the portal by adding them through the GUI however that seems to have been >>> removed in the new version. >>> >>> I'm trying to allow certain devices (set with Static IP's) through as some >>> are the AP's themselves, the controller and some Nest smoke alarms. >>> However anything I try does not seem to work. >>> >>> Here is a simulated setup of the real environment: >>> >>> Packetfence 11.1.0 - Inline mode >>> IP range for guest clients: 192.168.0.20-245 >>> Control devices: 192.168.0.2-19 >>> AP's: 192.168.246-254 >>> Nests are set to DHCP and have been registered to the "Admin" account >>> however they do not seem to be working as Google is not receiving data from >>> them >>> Solar Monitoring device is also DHCP >>> >>> Any ideas? I've tried registering all devices to the admin account, adding >>> filter rules, etc. >>> >>> This is a fairly flat setup, AP's connect to the inline side directly via a >>> dumb switch, clients connect to the AP's (no auth needed until you get to >>> Packetfence). >>> >>> We do not want to enable generic IOT devices as folks keep on trying to add >>> Alexa FireTV's, etc and the only available ISP in our area is lower speeds. >>> >>> I have about 40 or so MAC addresses that I need to have bypass the portal. >>> >>> Suggestions? >>> >>> Thanks. >>> _______________________________________________ >>> PacketFence-users mailing list >>> PacketFence-users@lists.sourceforge.net >>> <mailto:PacketFence-users@lists.sourceforge.net> >>> https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!FquKqV2HGHkKkUBzVZe5FF7OijWgj0ubiFOIvR_KZ5BLS46oAsfbKxU4XwqW1hr4$ >>> >>> <https://urldefense.com/v3/__https://lists.sourceforge.net/lists/listinfo/packetfence-users__;!!GjvTz_vk!FquKqV2HGHkKkUBzVZe5FF7OijWgj0ubiFOIvR_KZ5BLS46oAsfbKxU4XwqW1hr4$> >>> >> >
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users