Enables wireless clients, associated with guest WLANs, to self-register with the ExtremeGuest server. In other words, this feature enables frictionless on-boarding of guest users to the ExtremeGuest server.

It also provides an integration API, as a means of on-boarding guest users through a loyalty application.



To enable this feature, in the Guest WLAN (using this captive-portal), enable MAC authentication and set the registration mode to ‘device‘. For infomration on enabling frictionless-onboarding, see Examples.

Supported in the following platforms:

  • Access Points — AP505i, AP510i/e, AP560i/h
  • Service Platforms — NX5500, NX7500, NX9500, NX9600, VX9000






The following configurations are required to enable frictionless on-boarding of guest users to the ExtremeGuest server:
  1. Create a captive-portal:
    NX9500-EGuest(config)#captive-portal EGuest
    1. Set the access-type as registration..
      NX9500-WC-EGuest(config-captive-portal-EGuest)#access-type registration

      This sets the guest user access and authentication mode to self-registration.

    2. Enable frictionless-onboarding.

      This enables auto-redirection of guest users to the ExtremeGuest server, where the user‘s MAC address is registered. Registered devices, on subsequent logins, are provided immediate access without interaction with Splash pages.

    3. Configure Localization URL..
      NX9500-WC-EGuest(config-captive-portal-test)#localization fqdn

      When configured, the defined URL is triggered from a mobile application to derive location information from the wireless network so that an application can be localized to a particular store or region.

      NX9500-WC-EGuest(config-captive-portal-Guest)#show context
      captive-portal EGuest
       access-type registration
       webpage internal registration field city type text enable label "City" placeholder "Enter City"
       webpage internal registration field street type text enable label "Address" placeholder "123 Any Street"
       webpage internal registration field name type text enable label "Full Name" placeholder "Enter First Name, Last Name"
       webpage internal registration field zip type number enable label "Zip" placeholder "Zip"
       webpage internal registration field via-sms type checkbox enable title "SMS Preferred"
       webpage internal registration field mobile type number enable label "Mobile" placeholder "Mobile Number with Country code"
       webpage internal registration field age-range type dropdown-menu enable label "Age Range" title "Age Range"
       webpage internal registration field email type e-address enable mandatory label "Email" placeholder ""
       webpage internal registration field via-email type checkbox enable title "Email Preferred"
       localization fqdn


      This is an example fqdn URl.
  2. Create a WLAN with the following settings:
    1. Set authentication-type as ‘mac‘.
      NX9500-WC-EGuest(config-wlan-EGuest)#authentication-type mac

      When configured, enables MAC authentication of guest users.

    2. Enable device registration.
      NX9500-WC-EGuest(config-wlan-EGuest)#registration device group-name test expiry-time 300

      When enabled, guest users' device MAC addresses are registered in the database. Registered devices are provided immediate access on subsequent logins.

    3. Set guest-registration as external.
      NX9500-WC-EGuest(config-wlan-EGuest)#registration external follow-aaa

      This enables forwarding of guest registration and authentication requests to an external authentication server resource, specified in an AAA policy.

      Note, in this scenario, the external resource is the ExtremeGuest server.

      Execute the command in the following step to specify the AAA Policy.

    4. Apply an AAA Policy to the WLAN.
      NX9500-WC-EGuest(config-wlan-EGuest)#use aaa-policy guest

      When applied, registration and authentication requests are forwarded to the authentication server configured in the specified AAA Policy.



      In the AAA policy, ensure that the authentication server configuration points to the ExtremeGuest server.
    5. Enable captive-portal enforcement.
      NX9500-WC-EGuest(config-wlan-EGuest)#captive-portal-enforcement fall-back

      When enabled, captive-portal validation is enforced on clients requesting access. Fall-back is an optional parameter that enforces captive-portal authentication only on failure of WLAN authentication.

    6. Use the captive-portal configured in Step 1 in the WLAN..
      NX9500-WC-EGuest(config-wlan-EGuest)#use captive-portal EGuest
      NX9500-WC-EGuest(config-wlan-EGuest)#show context
      wlan EGuest
       ssid eguest
       bridging-mode local
       encryption-type none
       authentication-type mac
       use captive-portal EGuest
       captive-portal-enforcement fall-back
       registration device group-name test expiry-time 300

      This is the captive-portal used with this WLAN for captive-portal validation of guest users.

Related Commands

no Disables frictionless-onboarding of guest users to the ExtremeGuest server