layer 2 captive portal questions
Mike Bloom
mike at databloom.com
Mon Apr 14 14:40:15 UTC 2008
Hi All,
I'm replacing a commercial java sesm capture portal with location
specific vlans with ipfw and I'd like to allow a user to enter their
credentials to a webserver running on the gateway of their local vlan,
and be allowed to surf as long as their mac address and ip address stay
the same.
so far I have a working ip layer captive portal as such:
00100 228 49451 divert 8668 ip from any to any via fxp0
00100 40 6771 allow ip from 10.1.4.5 to any
00200 0 0 fwd 10.1.4.1,8080 tcp from any to any dst-port 80 in
00300 296 77558 allow ip from any to any
00400 0 0 deny ip from any to any
65535 294 25712 deny ip from any to any
fxp0 is WAN, 10.1.4.1 is the gateway ip for my vlan's subnet.
If I do a
00100 40 6771 allow ip from 10.1.4.5 to any
before the fwd statement, my user is free to browse the web without the capture portal.
However, what I would like to do is lock down their mac address (which I collect from arping their ip on the vlan interface) **and** ip.
as such:
00100 0 0 allow ip from 10.1.4.5 to any via vlan4 MAC 00:1b:63:ac:3a:84 any
00100 0 0 allow ip from 10.1.4.5 to any via vlan4 MAC any 00:1b:63:ac:3a:84
I think I'm mixing layer2 and layer 3 criteria and probably I just need to seperate these rules out by blocking layer2 between fxp0 and vlan4 (where the 10.1.4.x subnet exists) **then** allowing ip through via the previously mentioned scheme.
Any thoughts or suggestions would be greatly appreciated.
More information about the freebsd-ipfw
mailing list