ON THIS PAGE
- A Captive Portal is a special webpage users see before using the Internet. It will intercept network packets and when users try to access a webpage it prompt them to login. My personal captive portal utilises pfSense’s own Captive Portal features to authenticate users before they begin using the Internet.
- PfSense Captive Portal Template Blue Dew. Blue Dew is a free responsive pfSense Captive Portal template writen in pure html5 and css3 Download Now. Email This BlogThis! Share to Twitter Share to Facebook. Labels: pfSense Captive Portal Template - Blue Dew. Older Post Home.
The captive portal in Aptilo SMP works hand-in-hand with our captive portal management tool. All the complexity and web development code hides in a captive portal template in Aptilo SMP. Only the objects and texts defined as editable are available in the user friendly captive portal management tool.
You can control access to your network througha switch by using several different authentication. Junos OS switchessupport 802.1X, MAC RADIUS, and captive portal as an authenticationmethods to devices requiring to connect to a network. You can setup captive portal authentication on a switch to redirect Web browserrequests to a login page that requires the user to input a usernameand password. For more information, read this topic.
Example: Setting Up Captive Portal Authentication on an EXSeries Switch
You can set up captive portal authentication(hereafter referred to as captive portal) on a switch to redirectWeb browser requests to a login page that requires the user to inputa username and password. Upon successful authentication, the useris allowed to continue with the original page request and subsequentaccess to the network.
This example describes how to set up captive portal on an EXSeries switch:
Requirements
This example uses the following hardware and softwarecomponents:
An EX Series switch that supports captive portal
Junos OS Release 10.1 or later for EX Series switches
Performed basic bridging and VLAN configuration on theswitch. See Example: Setting Up Basic Bridging and a VLAN for an EX Series Switch.
Generated an SSL certificate and installed it on the switch.See Generating SSL Certificates to Be Used for Secure Web Access (EX Series Switch).
Designed your captive portal login page. See Designing a Captive Portal Authentication Login Page on Switches.
Overview and Topology
This example shows the configuration required on the switchto enable captive portal on an interface. To permit a printer connectedto the captive portal interface to access the LAN without going throughcaptive portal, add its MAC address to the authentication whitelist.The MAC addresses in this list are permitted access on the interfacewithout captive portal.
The topology for this example consists of one EX Seriesswitch connected to a RADIUS authentication server. One interfaceon the switch is configured for captive portal. In this example, theinterface is configured in multiple supplicant mode.
Configuration
To configure captive portal on your switch:
CLI Quick Configuration
To quickly configure captive portal on theswitch after completing the tasks in the Requirements section, copythe following commands and paste them into the switch terminal window:
[edit]
set access profileprofile1 authentication-order radius
set access profileprofile1 radius authentication-server 10.204.96.165
set system services web-management http
set systemservices web-management https local-certificate my-signed-cert
set services captive-portal secure-authentication https
set services captive-portal interface ge-0/0/10.0 supplicant multiple
set services captive-portal authentication-profile-nameprofile1
set ethernet-switching-options authentication-whitelist00:10:12:e0:28:22
set services captive-portal custom-optionspost-authentication-url http://www.my-home-page.com
Step-by-Step Procedure
- Define the server IP address, the server authenticationport number, and configure the secret password. The secret passwordon the switch must match the secret password on the server:
[edit]
user@switch# set accessradius-server 10.204.96.165 secret 'ABC123' - Configure the authentication order, making set accessprofile profile1 authentication-order radius