

Enter the MAC address of the console or other device in the Cloned MAC address field. For WiFi – Select the WiFi profile name.

For Ethernet – Select the connected Ethernet connection.You can then use NetworkManager to clone as follows: Cloning with NetworkManagerįirst, open nm-connection-editor, or open the WiFI settings via the Settings applet. You can also usually find it through the device’s built-in menus. It’s a six-byte hexadecimal value, so it might look like 4A:1A:4C:B0:38:1F. Typically this is printed somewhere on the device and labeled. You’ll need the MAC address of the device you want to connect. Fedora will let you temporarily clone the connecting device’s MAC address and authenticate to the captive portal on the device’s behalf. You can use NetworkManager on Fedora to resolve these issues, though. You may see this situation when connecting to hotel or public WiFi access points. They usually won’t launch a captive portal page when connecting to the Internet. Examples of this situation include mobile devices and gaming consoles (Switch, Playstation, etc.). Sometimes a device doesn’t load the captive portal to authenticate and authorize the device to use the location’s WiFi access. (The MAC address is a hardware-based value attached to any network interface, like a WiFi chip or card.) In simple terms, the captive portal registers and authorizes a device based on the device’s MAC address and end user acceptance of terms. Once the user agrees, they may authenticate to a RADIUS or other type of authentication system. The page then asks the user to take some action, typically agreeing to a usage policy. When the user first accesses the Internet, the portal captures all web page requests and redirects them to a single portal page. How captive portals workĬaptive portals are web pages offered when a new device is connected to a network. But what happens when you can’t connect through this kind of portal? This article shows you how to use NetworkManager on Fedora to deal with some failure cases so you can still access the internet. This page may ask you to accept terms of service or some other agreement to get access. If you ever attach to a WiFi system outside your home or office, you often see a portal page.
