Using paul taylor’s paper have AP and zeroshell working but issued ip’s are leaking to intranet.
My students logon to ETH00 192.xxx.xxx.xx issued ip and then get access to ETH01 10.xxx.xxx.xx network. My problem is that I want wireless users only to receive 192.xxx.xxx.xx ip. I don’t want users on internal net to get 192.xxx.xxx.xx numbers.
I know if I turn on captive portal I stop the leaks but then I get a page redirect error when they try to login from wireless ap.
Does anyone have a suggestion on how to fix? If I don’t use captive portal can firewall policy stop leak? Or is the answer to use captive portal and try to fix page redirect problem?