Skip to content

Commit d64defa

Browse files
committed
Services: Captive Portal - describe options, closes opnsense#568
1 parent b76595e commit d64defa

File tree

1 file changed

+71
-20
lines changed

1 file changed

+71
-20
lines changed

source/manual/captiveportal.rst

Lines changed: 71 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,14 @@ on wireless or Internet access.
88

99
.. image:: images/hotspot_login.png
1010

11-
--------------------
11+
Overview and terminology
12+
.........................
13+
14+
15+
-----------------------------
1216
Typical Applications
13-
--------------------
17+
-----------------------------
18+
1419
* Guest Network
1520
* Hotel & Camping Wi-Fi Access
1621
* Bring Your Own Device (BYOD)
@@ -80,30 +85,76 @@ Portal bypass
8085
MAC and IP addresses can be white listed to bypass
8186
the portal.
8287

83-
-------------------
84-
Real Time Reporting
85-
-------------------
86-
Basic Real Time Reporting is Integrated
87-
88-
* Live top IP bandwidth usage (Traffic Graph)
89-
* Active Sessions
90-
* Time left on Vouchers
91-
92-
----------------------------
93-
Category based Web Filtering
94-
----------------------------
95-
By combining the Captive Portal with the caching proxy it is possible to utilize
96-
category web filtering and block certain content for the users and by enabling the
97-
cache reduce bandwidth and improve response times. See also: :doc:`/manual/proxy`
9888

9989
--------------------
10090
Platform Integration
10191
--------------------
10292
Through the integrated REST API the captive portal application can be integrated
10393
with other services. See: :doc:`/development/how-tos/api`
10494

105-
--------------------
106-
Configure the Portal
107-
--------------------
95+
96+
Administration
97+
.........................
98+
99+
The Administration menu offers access to zone configuration and template management.
100+
101+
When creating a zone, a couple of options are available which we will try to explain briefly in the grid below:
102+
103+
========================================================================================================================================================
104+
105+
==================================== ==================================================================================================================
106+
Enabled Enable the zone, which will install a network trap on the interfaces specified
107+
Zone number Read-only sequence of the configured zone
108+
Interfaces Interfaces which should be guarded by this captive portal
109+
Allow inbound Select interfaces from which to allow inbound (stateful) traffic.
110+
This can be convenient if the zone in question contains machines/servers which should be
111+
accessible from other networks attached to this firewall.
112+
Authenticate using Select an authenticator specified in :menuselection:`System --> Access --> Servers`
113+
Always send accounting requests [RADIUS only] This will make the captive portal always send accounting requests,
114+
rather than just when there is a need for accounting (e.g. when there is a daily session limit).
115+
Enforce local group Restrict access to users in the selected (local)group, to validate group membership,
116+
see :menuselection:`System --> Access --> Groups`
117+
Idle timeout (minutes) Clients will be disconnected after this amount of inactivity. They may log in again immediately, though.
118+
Hard timeout (minutes) Clients will be disconnected after this amount of time, regardless of activity.
119+
They may log in again immediately, though.
120+
Concurrent user logins If this option is set, users can login on multiple machines at once.
121+
If disabled subsequent logins will cause machines previously logged in with the same username to be disconnected.
122+
SSL certificate Certificate to use on the captive portal login system. Leave empty for HTTP only.
123+
Hostname Hostname (of this machine) to redirect login page to, leave blank to use this interface IP address,
124+
otherwise make sure the client can access DNS to resolve this location.
125+
When using a SSL certificate, make sure both this name and the cert name are equal.
126+
Allowed addresses Avoid authentication for addresses and subnets specified in this list
127+
Allowed MAC addresses Avoid authentication for MAC addresses specified in this list
128+
Extended pre auth data Offer extended data to the login template before authentication (mac addresses for upstream use).
129+
Custom template Template to use for the login page, specified in the templates tab.
130+
==================================== ==================================================================================================================
131+
132+
.. raw:: html
133+
134+
In the templates tab you can manage your templates, the default template can be fetched using the <i class="fa fa-fw fa-download"></i> button
135+
in the bottom right corner.
136+
<br/><br/>
137+
The file offered is a standard zip file, which can be unpacked locally and modified to your needs, the new contents can be saved into a new
138+
zip file and uploaded in a new template (<i class="fa fa-fw fa-plus"></i>)
139+
140+
141+
Sessions
142+
.........................
143+
144+
Basic Real Time Reporting is Integrated using the sessions menu, this shows the following information for each zone.
145+
146+
* Live top IP bandwidth usage (Traffic Graph)
147+
* Active Sessions
148+
* Time left on Vouchers
149+
150+
Vouchers
151+
.........................
152+
153+
Here you can create new vouchers for all voucher servers configured in :menuselection:`System --> Access --> Servers`
154+
155+
156+
Examples
157+
.........................
158+
108159
To setup a hotspot controller for business or hotel usage see:
109160
:doc:`how-tos/guestnet`

0 commit comments

Comments
 (0)