captive-portal-enforcement
Configures the
captive portal enforcement on this WLAN. When enabled, provides
successfully authenticated guests temporary and restricted access to
the network. If enforcing captive-portal authentication, associate
captive-portal policy with the WLAN. For more information, see use (wlan-config-mode).
Supported in the following platforms:
- Access Points — AP310i/e, AP410i/e, AP460i/e, AP560i/h,
AP510i/e, AP505i, AP7522, AP7532, AP7562, AP7612, AP7632, AP7662, AP8432, AP8533
- Service Platforms
— NX5500, NX7500, NX9500, NX9600, VX9000
Syntax
captive-portal-enforcement {fall-back}
Parameters
captive-portal-enforcement {fall-back}
captive-portal-enforcement |
Enables captive portal enforcement on a WLAN. This option is disabled by
default. |
fall-back |
Optional. Enforces captive portal validation if WLAN authentication
fails (applicable to EAP or MAC authentication only) |
Examples
nx9500-6C8809(config-wlan-test)#captive-portal-enforcement fall-back
nx9500-6C8809(config-wlan-test)#show context
wlan test
ssid test
bridging-mode local
encryption-type none
authentication-type eap
accounting syslog host 172.16.10.4 port 2
captive-portal-enforcement fall-back
acl exceed-rate wireless-client-denied-traffic 20 disassociate
broadcast-dhcp validate-offer
nx9500-6C8809(config-wlan-test)#