Bug #13736
closed
Captive Portal service restart needed after MAC bypass
Added by Mike Moore almost 2 years ago.
Updated almost 2 years ago.
Plus Target Version:
23.01
Release Notes:
Force Exclusion
Description
When using either MAC or IP address bypass in Captive Portal for a Guest WLAN setup, when entering a MAC address for example, and allowing it to pass, when the user connects they are never able to browse the internet(or any network). Windows client does show that they are connected but with no Internet. DNS doesnt resolve but the client receives an IP address.
The known solution is to restart the Captive Portal service after each entry that is added or removed.
Not a blocker but there needs to be a warning to the admin that the Captive Portal service needs to be restarted after each addition/deletion of a MAC or IP address that's added.
Perhaps the service can restart after each save? Not sure if this impacts other users currently using CP.
Found perhaps an associated issue with this bug.
Once the clients are added to the whitelist on Captive Portal, Firewall logs will no longer show the IP assigned to the client (via GUI). This can be reproduced. Add an client to the bypass list , restart CP. Check firewall logs and now the clients assigned IP will no longer show up.
- Project changed from pfSense Plus to pfSense
- Category changed from Captive Portal to Captive Portal
- Status changed from New to Feedback
- Affected Plus Version deleted (
22.05)
Can you try this on a development snapshot? There have been a number of captive portal fixes there after 22.05 and that has most likely already been fixed.
Thanks for the feedback Jim.
Would you happen to have the changelog just for Captive Portal?
Its going to take me sometime to spin up another pf with a devel snapshot.
I was not able to reproduce this issue on 23.01. After the MAC was added in Captive Portal, the client was able to access the internet. This is likely related to one of the number of issues resolved since 22.05 - or potentially there's an issue with your environment given your report of https://redmine.pfsense.org/issues/13742.
- Target version set to 2.7.0
- Plus Target Version set to 23.01
- Release Notes changed from Default to Force Exclusion
- Affected Architecture deleted (
6100)
- Status changed from Feedback to Not a Bug
Also available in: Atom
PDF