captive-portal

Configures a captive portal based filter for this user-defined role. A captive portal is a guest access policy that provides temporary and restrictive access to the wireless network. When applied to a WLAN, a captive portal policy ensures secure guest access.

This command defines user-defined role filters based on a wireless client‘s state of authentication.

Supported in the following platforms:

  • Access Points — AP505i, AP510i/e, AP560i/h
  • Service Platforms — NX5500, NX7500, NX9500, NX9600, VX9000

Syntax

captive-portal authentication-state [any|post-login|pre-login]

Parameters

captive-portal authentication-state [any|post-login|pre-login]

authentication-state

Defines the authentication state of a client connecting to a captive portal

any

Specifies any authentication state (authenticated and pending authentication). This is the default setting.

This option makes no distinction on whether authentication is conducted before or after the wireless client has logged in.

post-login

Specifies authentication is completed successfully

This option requires the wireless client to share authentication credentials after logging into the managed network.

pre-login

Specifies authentication is pending

This option enables captive portal client authentication before the client is logged into the controller.

Examples

nx9500-6C8809(config-role-policy-test-user-role-testing)#captive-portal authentication-state pre-login
nx9500-6C8809(config-role-policy-test-user-role-testing)#show context
 user-role testing precedence 10
  authentication-type eq kerberos
  ap-location contains office
  captive-portal authentication-state pre-login
nx9500-6C8809(config-role-policy-test-user-role-testing)#

Related Commands

no

Removes the captive portal based role filter settings