Explanation of portal authentication failure after EAP is extended with Range Extenders

RE505X , EAP680 HD , RE715X , EAP620-Outdoor HD , RE205 , EAP245 , EAP320 , EAP120 , EAP230-Wall , TL-WA860RE( V6 ) , EAP115 , EAP235 , EAP650-Outdoor , EAP772-Outdoor( V1 ) , RE650 , RE450( V2 V3 ) , RE603X , EAP610 HD , EAP660 HD , AP9665 , RE700X , RE315( V1 ) , EAP670-Outdoor , EAP673 , RE1500X , EAP110 , EAP670 , RE1750X , EAP235-Wall , RE780X , RE500XD , TL-WA850RE( V7 ) , EAP225 , EAP610-Outdoor , RE200( V5 ) , TL-WA854RE( V4 ) , RE500 , RE300 , EAP115 V4 , RE600X , EAP725-Wall , EAP220 , EAP265 HD , RE653BE , EAP620 HD , RE190 , EAP610 , EAP110-Wall , RE705X , RE550 , EAP655-Wall , RE230( V2 ) , EAP615-Wall , RE605X , RE500X , EAP650 , EAP330 , RE580X , EAP623-Outdoor HD , RE750C , RE2700X , EAP650-Wall , TL-WA855RE( V4 )
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device, and check either the Datasheet or the firmware section for the latest improvements added to your product. Please note that product availability varies by region, and certain models may not be available in your region.
Problem phenomenon: After portal authentication is set on EAP, if a range extender is used to expand the EAP network, only clients connected to the range extender for the first time need portal authentication, and all subsequent devices are connected to the range extender can access the Internet without authentication.
Relevant interpretation:
1. Principles of portal authentication
The following figure shows a simple portal authentication process. When the client connects to EAP for the first time, EAP binds the MAC address of the client to the controller server. After authentication, the client can access network resources.
2. Forwarding process of wireless data frame under WDS
WDS, namely wireless distribution system, is the abbreviation of wireless network deployment extension system. In short, WDS is to use two (or more) wireless broadband routers / AP / RE to extend the wireless signal to a more far-reaching range through a mutual connection. The communication data between APs in WDS can be divided into three address communication and four address communication.
2.1 Four address communication (Standard WDS)
When AP1 and AP2 use four addresses for communication, their data frame structure includes four MAC addresses PC1, AP1, AP2 and, PC2. The network structure is transparent and data sending and receiving are completely equal.
Note: Two APS need to support four addresses before four address communication can be carried out, so as to reduce the compatibility between devices.
2.2 Three address communication (Non-Standard WDS)
In this case, the RE is associated with the AP as a client and then broadcasts the SSID to the rear, which is equivalent to a client with multiple IPS connected to the AP.
At this time, the data frame structure of communication between RE and AP is three addresses. RE will replace the MAC addresses of all back devices with the MAC addresses of RE itself so that the AP side thinks that only one device is connected to AP. RE needs to maintain a corresponding table between IP and MAC, and do the addressing and forwarding work of replacing source MAC and destination MAC.
The data forwarding of three addresses needs to be carried out with the help of an IP address, and the forwarding efficiency is low; But it has good compatibility and can expand the network system with most devices.
The following figure is a typical three address communication data structure. Its source IP is different, but the MAC address in the data frame is exactly the same.
3. Reasons why portal authentication does not take effect
At present, when RE expands the EAP network, three addresses are used for communication between them. Because the application scenarios of the two devices are different, they cannot be compatible with four addresses. No matter how many devices there are at the back end of the RE, the MAC address bound between the EAP and the controller server is the MAC address of the RE during portal authentication. At this time, the server thinks that only one device is connected to the EAP. Therefore, the devices connected to the RE only need to be authenticated once, and other devices do not need to be authenticated again.
4. Related solutions
The RE with the proxy mode is used. In proxy mode, the RE will virtualize the MAC address of the device connected to it. The RE will use this virtual MAC address to communicate with the front AP so that the front AP can recognize different MAC addresses, so as to make the portal authentication effective.
However, in order that some devices are considered on the premise of compatibility, not all REs support proxy mode. The RE models that do not support proxy mode are listed below for reference only:
850RE v7; 855RE v5; 860RE v6; 854RE v4; RE550; RE505X; RE605X; RE200 v5; RE315 v1.0; RE230 v2.0; RE450 v2.0; RE450 v3.0
Note: RE=Range Extender
Is this faq useful?
Your feedback helps improve this site.
What’s your concern with this article?
- Dissatisfied with product
- Too Complicated
- Confusing Title
- Does not apply to me
- Too Vague
- Other
Thank you
We appreciate your feedback.
Click here to contact TP-Link technical support.
Deze website gebruikt cookies om de gebruikservaring te verbeteren, onlineactiviteiten te analyseren en om gebruikers de best mogelijke ervaring te bieden op onze website. U heeft de mogelijkheid op ieder moment de cookies te weigeren. Bekijk onze privacyverklaring voor meer informatie.
Deze website gebruikt cookies om de gebruikservaring te verbeteren, onlineactiviteiten te analyseren en om gebruikers de best mogelijke ervaring te bieden op onze website. U heeft de mogelijkheid op ieder moment de cookies te weigeren. Bekijk onze privacyverklaring voor meer informatie.
Standaard Cookies
Deze cookies zijn noodzakelijk voor de werking van de website en kunnen niet worden uitgeschakeld.
TP-Link
SESSION, JSESSIONID, accepted_local_switcher, tp_privacy_base, tp_privacy_marketing, tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple, tp_top-banner, tp_popup-bottom, tp_popup-center, tp_popup-right-middle, tp_popup-right-bottom, tp_productCategoryType
Youtube
id, VISITOR_INFO1_LIVE, LOGIN_INFO, SIDCC, SAPISID, APISID, SSID, SID, YSC, __Secure-1PSID, __Secure-1PAPISID, __Secure-1PSIDCC, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC, 1P_JAR, AEC, NID, OTZ
Zendesk
OptanonConsent, __cf_bm, __cfruid, _cfuvid, _help_center_session, _pendo___sg__.<container-id>, _pendo_meta.<container-id>, _pendo_visitorId.<container-id>, _zendesk_authenticated, _zendesk_cookie, _zendesk_session, _zendesk_shared_session, ajs_anonymous_id, cf_clearance
Analyse en Marketing Cookies
Cookies voor analyse geven ons de mogelijkheid uw activiteiten op onze website te volgen en zo de functionaliteit van de website aan te passen en te verbeteren.
Marketing cookies kunnen op onze website worden geplaatst door externe adverteerders waar wij mee samenwerken om een profiel te creëren met uw interesses en u zo van relevante advertenties te kunnen voorzien op andere websites.
Google Analytics & Google Tag Manager
_gid, _ga_<container-id>, _ga, _gat_gtag_<container-id>
Google Ads & DoubleClick
test_cookie, _gcl_au