MAC Authentication Fallback - Captive Portal

Hello everybody!

cnMaestro…

I’m configuring an “Open” WLAN, where connections will be redirected to a captive portal to authenticate to a Radius server.

When I select the “MAC Authentication Fallback” option, new connections “bypass” the captive portal and try to navigate directly, without authenticating. When I disable the function, all new connections are redirected to the portal.

I need the “MAC Authentication Fallback” enabled and all new connections to be directed to the captive portal.

Has anyone ever experienced this??

Tks!

Good luck with that… simething is propably broken when useing captive oortal and mac fall back

Hi Valois,

Could you please provide below information?

  1. Which AP/Device are you using and what is the build version?
  2. Are you using cloud or on-prem and what is the build version?
  3. Are you using cnMaestro based MAC authentication or RADIUS based or AP based?

Thanks
Raja M

Hu Raja,

First, thanks for the reply.

Following answers…

  1. Which AP/Device are you using and what is the build version?
    E600 e E510, both 6.4.2-r10

  2. Are you using cloud or on-prem and what is the build version?
    cnMAestro on Premisses, packege version 3.1.1-r8

  3. Are you using cnMaestro based MAC authentication or RADIUS based or AP based?
    I´m using RADIUS Based

Hi Valois,

  1. Could you please share the tech dump of the AP and Config file of the AP.
  2. When you enable MAC auth fall back, please make sure that you are removing the client MAC address from the RADIUS server.

Thanks
Raja M

Hi Raja,

Follow the requested files.

We always remove the MAC from the client (on the RADIUS server) for testing.

Thank you again!

MAC Fallback cnPilot_e510-934960_1659981924309.tar.zip.zip (1.2 MB)
Config.txt (5.8 KB)