On 7/29/05, alan walters <[EMAIL PROTECTED]> wrote: > Ok the allowed ip addresses are in that table, but what I really wanted > Was the rule that was being applied to the captive portal for allowed ip > addresses and active clients.
# cat /tmp/rules.debug | grep captiveportal no rdr on fxp2 proto tcp from <captiveportal> to any table <captiveportal> pass in on fxp2 from <captiveportal> to any keep state label "allow captive portal authd users" ok thanks it looks ok for allowed IP's, is the rule the same for captive portal clients that are being authenticated through the captive portal or are they authenticated on there mac address > I had a problem before where some clients are connected through a > wireless repeater and the mac address is the same for each client. Even > though there ip address is different. Thats normal if the device is doing nat. No it is a bridge. Within the ip subnet but seems to nat or mask the mac address. It sucks big time Scott alan --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
