System requirements The minimum system requirements for a gateway with less than 10Mbps of throughput are:

Similar documents
Create a pfsense router for your private lab network template

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

ElasterStack 3.2 User Administration Guide - Advanced Zone

HySecure Quick Start Guide. HySecure 5.0

How to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00

Grandstream Networks, Inc. Captive Portal Authentication via Twitter

CounterACT 7.0 Single CounterACT Appliance

Hacom pfsense Deployment Guide

Peplink SD Switch User Manual. Published on October 25th, 2018

VPN Solutions for Zerto Virtual Replication to Azure. IPSec Configuration Guide

D-Link Central WiFiManager Configuration Guide

Grandstream Networks, Inc. Captive Portal Authentication via Facebook

Using Trend Reports. Understanding Reporting Options CHAPTER

6.1. Getting Started Guide

Grandstream Networks, Inc. Captive Portal Authentication via Facebook

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

AccessEnforcer Version 4.0 Features List

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Who We Are.. ideras Features. Benefits

Logging into the Firepower System

Link Gateway Initial Configuration Manual

1 Installation. 2 Set an admin password. 3 Setup Basic Settings. WiFi Hotspot Pro User Guide. April Version 1.3-9

Tech Advisory Meeting - 4/15/06

Grandstream Networks, Inc. Captive Portal Authentication via Facebook

Highlight. Central AP Management with High Scalability

Redirecting Subscriber Traffic Using ISG Layer

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

Network Policy Controller UAM/RADIUS Guide

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

SonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:

Cloudpath and Aruba Instant Integration

InControl 2 Software Appliance Setup Guide

GWN7600/GWN7600LR Firmware Release Note

CHAPTER 7 ADVANCED ADMINISTRATION PC

Transport Gateway Installation / Registration / Configuration

User s Manual. Version 5

Transport Gateway Installation / Registration / Configuration

IPMI Configuration Guide

The following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Configure 6in4 Tunnel in pfsense. Lawrence E. Hughes. 18 November 2017

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

Cisco Unified Serviceability

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Cisco ISE Ports Reference

LevelOne. User Manual. WAP Mbps PoE Wireless AP V3.0.0

Comodo Korugan Software Version 1.8

Bi-directional ADN Deployment Using WCCP with Reflect Client IP [Configuration Sample] Ken Fritz (PSS)

TORNADO M100 CELLNODE USER MANUAL

Configuring Cisco TelePresence Manager

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume

Setting-up WAN Emulation using WAN-Bridge Live-CD v1.10

Troubleshooting Web Authentication on a Wireless LAN Controller (WLC)

Chapter 8. User Authentication

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

Infoblox Authenticated DHCP

Cisco ISE Ports Reference

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

VII. Corente Services SSL Client

Barracuda Firewall Release Notes 6.6.X

Cisco Virtual Networking Solution for OpenStack

Cisco ISE Ports Reference

Neutron Series OCTOBER 2015

MAC Address Filtering Setup (3G18Wn)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Gigabit SSL VPN Security Router

Cisco Unified Operating System Administration Web Interface

BIG-IP Access Policy Manager : Portal Access. Version 12.1

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Installing and Configuring vcloud Connector

GWN7600 Firmware Release Note IMPORTANT UPGRADING NOTE. GRANDSTREAM NETWORKS GWN7600 Firmware Release Note Page 1

Remote Support 19.1 Web Rep Console

Configuring the CSS for Device Management

Using ANM With Virtual Data Centers

Sonicwall NSA240 / TZ210 Configuration Guide (Firmware: SonicOS Enhanced o & up)

vcenter Operations Management Pack for NSX-vSphere

Installing Cisco APIC-EM on a Virtual Machine

Creating Wireless Networks

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0

BIG-IP Access Policy Manager : Implementations. Version 12.1

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

BIG-IP Access Policy Manager : Portal Access. Version 13.0

IP806GA/GB Wireless ADSL Router

cnmaestro Cloud Beta Guide

FusionHub. Evaluation Guide. SpeedFusion Virtual Appliance. Version Peplink

GWN7600 Firmware Release Note IMPORTANT UPGRADING NOTE

Grandstream Networks, Inc.

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password

Peplink SD Switch User Manual

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues...

EdgeConnect for Amazon Web Services (AWS)

Load Balancing Microsoft IIS. Deployment Guide v Copyright Loadbalancer.org

Installation and Upgrade

User Management: Configuring User Roles and Local Users

Horizon DaaS Platform 6.1 Service Provider Installation - vcloud

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Transcription:

pfsense Summary pfsense is a distribution of FreeBSD that has been tailored for user as a firewall/router. It offers many features that would be useful for public wifi. It is a free, open source application that can be used as a wireless gateway to provide your public wifi network with a customizable captive portal, and stat collection capabilities that will satisfy state collection requirements. System requirements The minimum system requirements for a gateway with less than 10Mbps of throughput are: CPU 100MHz RAM 128MB CD-ROM Drive for initial install 1GB hard drive Hardware specs should be scaled up to manage higher throughput loads. But generally speaking, any PC built within the last five years should be more than adequate. Web interface Everything configurable in pfsense can be done from the web interface. After an initial setup wizard you will be sent to a dashboard page that can be customized with various widgets that show different kinds of various information. Some of the more useful include traffic graphs, firewall logs, and the captive portal status. A number of the configuration pages deal with lists of items, list of firewall rules, aliases, schedules, routes, etc. and they generally have the same icon set for manipulating these lists. adds a new item, deletes an item, and edits an item. Most of the buttons in the web interface can be hovered over for a brief explanation. Console interface

Low level operations can be done from the console interface. Console access via secure shell can be enabled in the System > Advanced page of the web interface to allow remote access to the command console. Shell commands can be run through the Diagnostics > command prompt page on the web interface, but this functionality is still experimental, and SSH is generally more convenient. Log in via SSH as root with the admin password set for the web console. Network Configuration Internet Firewall/Router WAN Interface PfSense PC LAN interface Public Network switch or VLAN Access Point(s) Access Point(s) Wireless netowrk Systems running pfsense should have at least two NICs, and can replace the existing gateway for your wireless network. The pfsense PC will act as the primary DHCP and DNS servers to wifi clients, and the WAN interface will connect to your greater network. An initial setup wizard is available to guide users through new installations. Assuming there is an existing wireless network on site that is structured similarly to the diagram above, replacing the existing wireless gateway with a pfsense system should only require a minimal working knowledge of computer networks, DHCP, and DNS. Firewall rules Like most other firewalls, pfsense s rules are applied per-interface. Packets matching a rule can be allowed, blocked or dropped. Basic match criteria include: Protocol, the source and destination address these can be scaled to include a single host or entire network source and destination port range.

Advanced firewall rule features Source OS match rules based on Operating system TCP flags match based on flags TCP flags that are set or cleared Schedule Match rule to a time schedule, (can be used to set hours) Gateway if multiple WAN interfaces exist, this option will send packets matching the rule to a specific gateway. In/out Sets a limiter to use for inbound and outbound traffic. Ackqueue/queue Used to place matched packets into traffic shaping queues. Layer7 performs deep packet inspection for matching rule Floating rules Normally, firewall rules are set to a specific interface. Floating rules can apply to any interface, going in any direction. These are primarily used to put packets in the appropriate shaping queues.

Schedules Schedules can be used to define a set of times in which a firewall rule should be active. Each schedule consists of one or more time ranges which can be set to specific days or a weekly recurrence. To make a schedule click the new button, then set the days of the week or the calendar date you want the schedule to be in effect using the calendar in the month section, then a time. Then, select a time range using the start and stop time fields. Click add time to save the time rage to the schedule. Add as many time ranges as are needed to the schedule and click save. These schedules can be easily used to limit wireless access to hours when the library is open and to keep wireless inaccessible during scheduled closures. Since the firewall rules are evaluated on a first match basis, a rule blocking for closed days, should be placed above a rule setting weekly hours.

Traffic Shaping The pfsense traffic shaper comes with a handful of wizards for configuring traffic shaping. The wizard will allow you to set link bandwidth, select a queue scheduling algorithm, and prioritize common protocols. The wizard will generate a set of queues and ACKqueues for each interface, as well as a set of floating firewall rules for each protocol prioritized. Limiters Limiters are used to simulate lower bandwidth or lower quality connections over an interface. In most cases simply setting the bandwidth limits are sufficient, but you can also set a delay for the connection, and simulate a certain percentage of packet loss. Traffic is assigned to a limiter using the in/out option in the firewall rules editor. Layer 7 Layer 7 uses deep packet inspection to adjust the behavior of the firewall. A layer 7 rule group can be set to block traffic, place it in a shaping queue, or place it through a limiter. Captive portal The captive portal allows you to set up an authenticated or unauthenticated splash screen. The captive portal will need to be configured in order to track usage statistics with pfsense. Captive portal settings

Max concurrent connections sets the number of users that can load the captive portal page at the same time. This can probably be left alone. Idle timeout sets the amount of time a session can be inactive before it is logged off. Hard timeout sets maximum time limit on sessions Logout popup opens a popup window with a logout button, useful for ending sessions. Pre-authentication redirect sets a redirect variable that can be used on the captive portal page, or on error pages. After authentication redirect URL Landing page, if nothing is set users will land on whatever page they were trying to access before authenticating on the captive portal page. Per-user bandwidth limit the maximum upstream or downstream bandwidth that can be used by an individual. This is equivalent to setting up a limiter for each host that authenticates through the captive portal. Authentication set authentication method o No authentication o Local user manager o RADIUS HTTPS use the https fields to load a certificate, and key if you wish the captive portal to use SSL. Portal page contents use this setting to upload the html for the splash page. Logout page contents used to customize the logout popup, if enabled. Pass-through MAC this section allows you to add MAC addresses that can bypass the captive portal altogether. Allowed IP addresses adding addresses to this list will allows that address to be accessible to unauthenticated wireless users. Allowed hostnames the same as allowed IPs, but for DNS names Vouchers For captive portals using authentication, the voucher system generates codes that can be used to grant time limited access through the captive portal without an username and password. File manager use this section to upload any images, or other resources that will be used in the captive portal page. Only files uploaded through this system will be accessible from the captive portal. The uploaded version will have the prefix captiveportal- ( logo.jpg will become captiveportal-logo.jpg ) Captive portal status

The captive portal status window shows the currently active sessions on the wireless network. All sessions will have a username of unauthenticated when the portal is not using authentication. Session can be terminated using the delete button on the right of the list. Traffic Graphs The traffic graph offers a real-time look at upstream and downstream traffic. RRD Graphs RRD graphs provide more long term statistics of not only bandwidth usage bandwidth usage, but many other system statistics as well. RRD graphs are average shorter time samples into larger ones, allowing it to keep statistics going back years. In addition to recording network bandwidth usage, the RRD graphs also track CPU and memory usage, state table statistic, and captive portal utilization. The captive portal graphs show both the currently logged in users, and the total number of currently logged in users, and the total number of users that have logged in for a given time period. This can be very helpful in tracking overall usage trends, however the averaging on the longer term graphs may lead to results that aren t quite what the State is asking for.

Stat collection The features for recording long term usage statistics are not quite ideal given the requirements set out by the state. Recording the number of sessions that the captive portal authenticates is possible out of the box. There are two places where this session data can be located, status > Captive portal. This show the current active sessions. Secondly, captive portal activity is located logged in status > system logs > portal auth. This log file is rotated frequently, so if you re planning to pull statistics form it, it would be best to set up a syslog server. pfsense s syslog setting are set in status > system logs > settings. The collection methods in this document focus on using the session table. Collecting session stats Assuming your timeouts are set long enough so that sessions form the beginning of the day will not timeout before closing, the captive portal db should contain every session started that day. The number of daily users can then be recorded form the captive portal status page. The drawbacks to using the captive portal status page as a data source are that it would have to be done manually, late in the day. Also any changes to the portal configuration while it s up will clear the current session DB, spoiling your data collection for that day. Automated stat collection This section contains scripts and sections of code that are designed to work with pfsense version 2.0.3, later version may require modification. It is possible to automate the recording of the total number of sessions. This snippet of php code will return the number of active sessions on the captive portal <?php require("captiveportal.inc"); if (file_exists("{$g['vardb_path']}/captiveportal.db")) { $captiveportallck = lock('captiveportaldb'); $cpcontents = file("/var/db/captiveportal.db", FILE_IGNORE_NEW_LINES FILE_SKIP_EMPTY_LINES); unlock($captiveportallck); } else $cpcontents = array(); $concurrent = count($cpcontents); echo $concurrent;?> Save this to a php file in /usr/local/www and it should be accessible remotely. This method still won t be able to count captive portal sessions that were cleared due to a restart or change in the captive portal s settings. Automated Stat reporting A convenient method for collecting these daily session statistics is to store them in a database. A table with three fields is necessary; an ID, a timestamp field which defaults to the current time, and an integer field that will record the quantity of sessions. Schedule the recording server to run the following php script after closing; <?php $con = mysql_connect("dbhost","dbuser","dbpassword");

if (!$con){die('could not connect: '. mysql_error());} mysql_select_db("statdatabase", $con); $wificount = @mysql_real_escape_string(trim(file_get_contents('http://pfsense.host/statout putmethod.php'))); mysql_query("insert INTO `sessioncounttable` (`quantity`) VALUES ('$wificount')"); mysql_close($con); echo 'It worked!';?> Packages A number of packages exist that can be installed to enhance the functionality of pfsense. They are located in System > Packages. I haven t tried any of them in production and are marked as being in alpha or beta status, so use at your own risk. Some of the more interesting ones include: Mailreport Sends more detailed mail notifications. NRPE v2 Nagios monitoring plugin, useful if Nagios is used to monitor systems on your network. Open-VM-Tools Vmware tools for FreeBSD. pfflowd converts packet filter status messages to cisco netflow datagrams. Could be useful in finding hosts that consume high levels of bandwidth. Darkstat offers per-host network monitoring. Anyterm web based terminal access.