Project

General

Profile

Actions

Regression #13323

closed

Captive Portal breaks policy based routing for MAC address bypass clients

Added by Axel Taferner over 1 year ago. Updated over 1 year ago.

Status:
Resolved
Priority:
Normal
Category:
Captive Portal
Target version:
Start date:
Due date:
% Done:

100%

Estimated time:
Plus Target Version:
23.01
Release Notes:
Default
Affected Version:
Affected Architecture:

Description

Relevant information about my network

LAN segment
VLAN for IoT and wifi devices
WAN1 is used as the default gateway
WAN2 is used as the gateway for devices on the IoT and wifi VLAN
Captive portal is configured on the IoT and wifi VLAN

Here is the issue:
When the captive portal is disabled everything is routed as described above.

But when I enable the captive portal, devices that are allowed to bypass the captive portal via mac address are suddenly routed through the default gateway instead of WAN2.
Only devices that authenticate through the captive portal are still correctly routed over WAN2.


Files

13323.patch (2.36 KB) 13323.patch Marcos M, 07/04/2022 02:05 PM
Actions

Also available in: Atom PDF