Are you able to setup RADIUS and integrate with your LDAP solution? Then you can have employees login with their desktop credentials instead of a shared password. This is how we stopped WiFi password sharing at my last job without destroying productivity of our employees.
First, it doesn’t seem like you know what you’re doing. That’s fine, everyone starts somewhere, but you also seem to be in a position where others expect you to fix the issue, and that’s not ok. Nine out of ten you end up looking bad.
Second, someone gave this person access to the network. That should be a fireable offense, but in my opinion, so should be running a network using a single PSK.
Third, you don’t know how to correctly filter traffic on your network.
Next steps here are to block the VPN traffic, which could mean blocking some legitimate traffic or investing in better firewalls that can block on content, not just ports, then implementing 802.1x and issuing new credentials or certain to anyone who actually needs access.
I’m trying to understand what you are saying here.
You have a number of WiFi access points. And those are connected to a closed network that you are calling your Portal.
And you have strangers using your WiFi to access the internet?
Or you have authorized employees using the WiFi AP’s. And then they use VPN to get to the open internet? In other words. Your employees are escaping your closed portal.
how about creating user accounts with unique passwords for every user, so id somebody shares their account you first of all know it, and you second of all can easily shut down the account. Also as I read in another comment, MAC-Address filtering is completely useless, as MAC-Addresses don’t get encrypted via 802.11 and 802.3 and somebody can easily sniff the WLAN traffic. What security measures do you currently have in place?
What you say in earlier comments is that the user got the WiFi password from someone. And they are using the PSIPHON VPN to access sites that your portal blocks.
As long as they can use a VPN, any VPN, on your network, they bypass all your filtering rules. You will need to block any and all VPN use to prevent this.
Make your network unseen, create a fake network that is broadcast, in this network treat it like it’s a live network. Use a ras pi to send continuous ping requests and/or data packets across this “decoy” network. Configure the DHCP to assign invalid IP’s. This is how I got people off my network when I lived in an apartment complex, until I got a wifi pineapple… then I just made there devices constantly reconnect without accessing anything useful.
You’ll need to perform a packet capture on the traffic and see what loophole is being abused. Look at the protocol being used and what the destination is, and whether your Guest Firewall rules permit the traffic.
For context, I’ve used modified versions of OpenVPN in the past to tunnel over ICMP, which has allowed me to get free Internet on networks where ICMP is allowed to the Internet despite captive portals restricting all other traffic, or reverse proxies acting as your walled garden.
If someone is sharing your password to the network, then you need to move to MPKI infrastructure or UID to lock out access.
I had a similar issue once. Most VPN services usually have some kind of service discovery API that has data about their nodes. All VPN’s still need to connect to their first-mile node. So you can automate the process of blocking outgoing connections by grabbing their node list and creating the firewall rules.