You can download the page from Console -> Networks -> Captive Portals -> Controller Configuration -> Portal pages contentsĬlick on the Save button to apply new settings.Ĭlick on Allowed IP addresses Tab and add IP addresses and networks that the user should be allowed to access before authentication. Portal Page Contents - upload our Authentication page. RADIUS options - Reauthentication - enable if you wish to disconnect the user from our Console or via our REST API Primary Authentication Source - RADIUS details from our Console -> Networks -> Captive Portals -> RADIUS for splash pageĪccounting - enable and enter Accounting port if you wish to collect accounting information about your users including their current online status Navigate to Services -> Captive Portal and add a new zone representing network that should be protected with a Captive Portal with RADIUS authentication - test_zone in our example.Īuthentication -> RADIUS Authentication (MSCHAPv2 works best) Sign-in to the pfSense Firewall administration console. Add at least one Authentication Provider.Copy the Splash Page URL from Captive Portal settings page, e.g.Fill in Name, select Network, select pfSense as Vendor.From the menu, go to Network -> Captive Portals -> New Captive Portal. This page explains different configuration scenarios for pfSense Firewall and authentication with IronWiFi. PfSense with Captive Portal Access Point Instructions for pfSense
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |