Introduction #
The Blacklist (Block Device) function allows administrators to restrict specific devices from accessing the network. Devices can be manually added to the blacklist or automatically blocked by the system under certain conditions.
Blocked devices can still connect to the network but will be notified on the Captive Portal that they are blocked and will not be able to proceed beyond the login page.
Blocking a Device Manually #
Administrators can manually block a device by entering its MAC address.
Steps to Block a Device #
-
Navigate to Sign In Administration > Sign In Modules > Blacklistings.
-
Under Add New Block, enter:
-
MAC Address (e.g.,
AA:BB:CC:11:22:33) -
Description (optional)
-
End Date (optional, if no date is set, the block remains indefinitely)
-
-
Click Block Device to apply the restriction.
Note: Once blocked, the device will still connect to the network but will be presented with a blocked notification on the Captive Portal instead of being granted full access.
Automatic Blocking (Bounce Detection & Email Abuse Prevention) #
The system can automatically blacklist a device in two cases:
1. Repeated Invalid Email Logins (Bounce Detection) #
-
If a user logs in with email authentication and enters an incorrect or non-existent email, the system logs a bounce event.
-
If the same device triggers a bounce three times, it is automatically blocked for 48 hours.
-
During this period, the device cannot reconnect, even with valid credentials.
2. Email Identity Theft Protection #
-
If a user logs in using another person’s email, the legitimate email owner can manually block the device.
-
In the email notification sent when someone logs in with an email-based login, the legitimate user has the option to block the unauthorized device.
-
If this happens, the device is immediately blocked and will receive a blocked message on the Captive Portal upon login attempts.
If a user accidentally blocks themselves (e.g., by mistakenly reporting their own device), they must contact the administrator to lift the block.
Managing and Removing Blocked Devices #
Viewing Blocked Devices #
The Blocked Devices List displays all restricted devices along with:
-
MAC Address
-
Description (if provided)
-
Date Created
-
End Date (if applicable)
-
Block Type (Manual or Automatic)
-
Who added the block
By default, only active blocks are shown. To view historical blocked devices, toggle the View only active blocks switch.
Removing a Blocked Device #
To manually remove a device from the blacklist:
-
Navigate to Sign In Administration > Sign In Modules > Blacklistings.
-
Find the device in the Blocked Devices List.
-
Click the trash bin icon next to the device entry.
-
Confirm removal to immediately restore access.
Important Considerations #
-
Blocked devices can still connect to the network but will be informed on the Captive Portal that they are restricted.
-
Manually blocked devices remain restricted indefinitely unless an end date is set or the block is manually removed.
-
Automatically blocked devices (due to email bounces) are restricted for 48 hours but can be manually unblocked if necessary.
-
Users can block unauthorized devices using the email login notification. If a user accidentally blocks themselves, they must contact an administrator for assistance.
Summary #
The Blacklist / Block Device function allows administrators and users to restrict unauthorized devices from network access. Automatic blocks occur when incorrect email logins cause repeated bounces or if a legitimate user reports someone misusing their email. Manually blocked devices provide administrators with full control over network restrictions.
To unblock a device, administrators can simply locate it in the blacklist and remove it using the trash bin icon. 🚀