On 7/29/05, alan walters <[EMAIL PROTECTED]> wrote:
> Ok the allowed ip addresses are in that table, but what I really
wanted
> Was the rule that was being applied to the captive portal for allowed
ip
> addresses and active clients.

# cat /tmp/rules.debug | grep captiveportal
no rdr on fxp2 proto tcp from <captiveportal> to any
table <captiveportal>
pass in on fxp2 from <captiveportal> to any keep state label "allow
captive portal authd users"
 
ok thanks it looks ok for allowed IP's, is the rule the same for captive
portal clients that are being authenticated through the captive portal
or are they authenticated on there mac address

> I had a problem before where some clients are connected through a
> wireless repeater and the mac address is the same for each client.
Even
> though there ip address is different.

Thats normal if the device is doing nat.

No it is a bridge. Within the ip subnet but seems to nat or mask the mac
address. It sucks big time
 
Scott

alan


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to