🎯 Objective
In this report we show how we perform a Wi-Fi network scan to check:
- Which devices (antennas, mobiles, PCs) are connected.
- Which services and ports are active.
- That firewall filtering and security are working properly.
🔍 What is a network scan?
A network scan is a process that allows us to discover and analyze devices connected to a given IP range. For this task, we use two complementary tools:
1) Host discovery (ARP Sweep) 🖧
- Tool:
netdiscover
- Function: detects live IPs in the LAN by resolving their MAC addresses.
- Results in our Wi-Fi:
- ✅ Antennas:
10.10.0.12
,10.10.0.14
,10.10.0.16
. - ✅ Gateway/IPFire:
10.10.0.1
. - ✅ Guest client:
10.10.0.4
(Pixel 3a XL). - ✅ Other temporary devices (
10.10.0.6
,10.10.0.8
).
- ✅ Antennas:
📌 Command used:
netdiscover -r 10.10.0.0/24

2) Port and service scanning 🔓
- Tool:
nmap
(with Zenmap GUI). - Function: performs a SYN Scan to discover open ports, active services, and OS fingerprints.
- Expected results in our network:
- Web ports 80/443 active on gateway and antennas.
- DNS (53/tcp/udp) active on gateway.
- Auxiliary services like 3128 (proxy/captive helper).
📌 Command used:
nmap -T4 -A -v 10.10.0.0/24

✅ Conclusion: Everything works as expected → gateway responds properly, antennas are accessible, and no unusual services are open on client devices.
🧱 Security and captive portal
The network is secured with a deny-by-default model:
- 🌐 HTTP (80) traffic redirected to the welcome portal.
- 🔒 HTTPS (443) allowed only to authorized domains.
- 📡 Antennas always whitelisted.
- 🔄 VPN tun1 as the main outgoing path.
- 🛑 DNS traffic blocked unless it passes through the official resolver.
🗂️ Scripts in /root
ready to deploy ⚡
We created these scripts to cover different needs. Quick description:
add-whitelist.sh
→ Adds a domain/IP to the whitelist.block-dns.sh
→ Blocks unauthorized DNS resolutions.bridge0/
→ Bridge network configuration.create-ipset.sh
→ Creates ipset lists for filtering.drop-iptables.sh
→ Drops all traffic (full lockdown).firewall-portal.sh
→ Activates the main captive portal.firewall-portal-undo.sh
→ Reverts portal rules.iptables.sh
→ Base iptables configuration.Kor_ipfire2_Swiss.ovpn
→ OpenVPN profile to Switzerland.maps-allow-hosts.sh
→ Whitelist for OpenStreetMap tiles.qemu-kali/
→ Config for Kali Linux VM.start-network.sh
→ Brings up tun1 and applies firewall rules.tap0.sh
→ Creates a TAP interface.tidio-allow.sh
→ Allows Tidio chat connections.tidio-allow-undo.sh
→ Removes Tidio from whitelist.tun-service.sh
→ Controls OpenVPN service (start/stop).welcome-iptables.sh
→ Redirects HTTP to welcome page.whitelist-host.sh
→ Quickly whitelists an IP.whitelist-osm-maps.sh
→ Specific whitelist for OSM map servers.

✅ Current status
- 📡 Antennas active and working correctly.
- 🔑 Gateway responding with expected open ports.
- 📱 Guest client detected and controlled.
- ⚙️ Scripts ready for immediate adjustments.
🚀 Conclusion
With this system of monitoring and automation, the Wi-Fi network at Korman Vilares Resort remains secure, controlled, and efficient, ensuring reliable connectivity for users and stability for internal services.