CaptivePortal can not redirect to authen webpage

Home Page Forums Network Management Signal a BUG CaptivePortal can not redirect to authen webpage

This topic contains 5 replies, has 0 voices, and was last updated by  jimmy 5 years, 8 months ago.

Viewing 7 posts - 1 through 7 (of 7 total)
  • Author
    Posts
  • #43609

    jimmy
    Member

    Hi

    I have ploblem

    When client fix external proxy in browser. It bypass captiveportal webpage.

    Note:
    I am not enable transparent proxy on zeroshell becase my firewall is slow

    #52704

    jimmy
    Member

    Hi

    I have ploblem

    When client fix external proxy in browser. It bypass captiveportal authen webpage.

    Note:
    I am not enable transparent proxy on zeroshell becase my firewall is slow

    #52705

    jimmy
    Member

    Please help me.

    My client set external proxy in web browser

    Zeroshell can not redirect to Captive authen

    #52706

    redfive
    Participant

    Hi jimmy , on wich interface the CP is activated ? and wich eth is the wan interface ? Could you post the output of iptables -L FORWARD -v ?
    bye

    #52707

    jimmy
    Member

    iptables -L FORWARD -v

    Chain FORWARD (policy ACCEPT 273 packets, 17405 bytes)
    pkts bytes target prot opt in out source destination

    152K 6611K ACCEPT icmp — * * 0.0.0.0/0 0.0.0.0/0
    64995 4365K ACCEPT udp — * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
    63160 8798K ACCEPT udp — * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
    0 0 ACCEPT udp — * * 0.0.0.0/0 0.0.0.0/0 udp dpt:67
    0 0 ACCEPT udp — * * 0.0.0.0/0 0.0.0.0/0 udp spt:67
    3419K 271M ACCEPT tcp — * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
    5403K 6838M ACCEPT tcp — * * 0.0.0.0/0 0.0.0.0/0 tcp spt:80
    521K 159M ACCEPT tcp — * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
    592K 439M ACCEPT tcp — * * 0.0.0.0/0 0.0.0.0/0 tcp spt:443

    0 0 ACCEPT tcp — * * 0.0.0.0/0 0.0.0.0/0 tcp spts:5xxxx:5xxxx
    1173K 472M ACCEPT all — * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
    11017 816K CapPort all — * * 0.0.0.0/0 0.0.0.0/0

    >

    Now I use Default policy ACCEPT

    #52708

    jimmy
    Member

    My Zeroshell

    Release 1.0.beta16

    and I use Captive with Multi VLAN

    #52709

    redfive
    Participant

    You should not have any rule that could interfer with the cp, and all of your rules, so written without specify input/output interfaces, are doing exactly that (since they are before the cp rule , the last in the forward chain). I’m almost sure that also the accounting doesn’t shows the real traffic about clients behind cp . With accept as defaul action , and no drop rule , your firewall is …”as” without firewall. If you don’t need firewall , remove all rules in the forward chain ( it will work better than now, with redirect and accounting), otherwise write more specific rules if you have other phisical/logical interfaces in addition to those where the cp is activated.

Viewing 7 posts - 1 through 7 (of 7 total)

You must be logged in to reply to this topic.