captive-portal-enforcement
Configures the
captive portal enforcement on this WLAN. When enabled, provides
successfully authenticated guests temporary and restricted access to
the network. If enforcing captive-portal authentication, associate
captive-portal policy with the WLAN. For more information, see use (wlan-config-mode).
Supported on the following devices:
- Access Points:
AP3000/X, AP5010, AP310i/e, AP410i/e, AP505i, AP510i, AP510e, AP560i, AP7602, AP7612, AP7622, AP7632,
AP7662, AP8163, AP8533.
- Service Platforms:
NX5500, NX7500, NX9500, NX9600
- Virtual Platforms: CX9000, VX9000
Syntax
captive-portal-enforcement {fall-back}
Parameters
captive-portal-enforcement {fall-back}
captive-portal-enforcement |
Enables captive portal enforcement on a WLAN. This option is disabled by
default. |
fall-back |
Optional. Enforces captive portal validation if WLAN authentication
fails (applicable to EAP or MAC authentication only) |
Examples
nx9500-6C8809(config-wlan-test)#captive-portal-enforcement fall-back
nx9500-6C8809(config-wlan-test)#show context
wlan test
ssid test
bridging-mode local
encryption-type none
authentication-type eap
accounting syslog host 172.16.10.4 port 2
captive-portal-enforcement fall-back
acl exceed-rate wireless-client-denied-traffic 20 disassociate
broadcast-dhcp validate-offer
nx9500-6C8809(config-wlan-test)#