Hello everybody!
cnMaestro…
I’m configuring an “Open” WLAN, where connections will be redirected to a captive portal to authenticate to a Radius server.
When I select the “MAC Authentication Fallback” option, new connections “bypass” the captive portal and try to navigate directly, without authenticating. When I disable the function, all new connections are redirected to the portal.
I need the “MAC Authentication Fallback” enabled and all new connections to be directed to the captive portal.
Has anyone ever experienced this??
Tks!
mixig
(mixig)
August 10, 2022, 1:38pm
2
Good luck with that… simething is propably broken when useing captive oortal and mac fall back
The use case of MAC Authentication Fall Back is. “allow wireless clients to connect to guest enabled SSID, which are not capable of doing guest access authentication”
The configuration shall follow below flow,
Configure Guest enabled SSID with MAC authentication fall back
Configure MAC authentication data base like AP internal DB / cnMaestro / external RADIUS
When client connects AP does MAC authentication, if MAC authentication fails, clients will be redirected for guest access. If MAC auth…
Hi Valois,
Could you please provide below information?
Which AP/Device are you using and what is the build version?
Are you using cloud or on-prem and what is the build version?
Are you using cnMaestro based MAC authentication or RADIUS based or AP based?
Thanks
Raja M
Hu Raja,
First, thanks for the reply.
Following answers…
Which AP/Device are you using and what is the build version?
E600 e E510, both 6.4.2-r10
Are you using cloud or on-prem and what is the build version?
cnMAestro on Premisses, packege version 3.1.1-r8
Are you using cnMaestro based MAC authentication or RADIUS based or AP based?
I´m using RADIUS Based
Hi Raja,
Follow the requested files.
We always remove the MAC from the client (on the RADIUS server) for testing.
Thank you again!
MAC Fallback cnPilot_e510-934960_1659981924309.tar.zip.zip (1.2 MB)
Config.txt (5.8 KB)