captive-portal-enforcement
   
      Configures the
         captive portal enforcement on this WLAN. When enabled, provides
         successfully authenticated guests temporary and restricted access to
         the network. If enforcing captive-portal authentication, associate
         captive-portal policy with the WLAN. For more information, see use (wlan-config-mode).
      Supported on the following devices: 
         
         
            - Access Points: AP3000/X, AP5010, AP310i/e, AP410i/e, AP505i, AP510i, AP510e, AP560i, AP6522, AP6562, AP7161, AP7502,
               AP7522, AP7532, AP7562, AP7602, AP7612, AP7622, AP763, AP7662, AP8163, AP8543,
               AP8533.
- Service Platforms:
               NX5500, NX7500, NX9500, NX9600
- Virtual Platforms: CX9000, VX9000
Syntax
         
         captive-portal-enforcement {fall-back}
      
      Parameters
         
         captive-portal-enforcement {fall-back}
         
                  
                     | captive-portal-enforcement | Enables captive portal enforcement on a WLAN. This option is disabled by
                        default. | 
                  
                     | fall-back | Optional. Enforces captive portal validation if WLAN authentication
                        fails (applicable to EAP or MAC authentication only) | 
               
      
      Examples
         
         nx9500-6C8809(config-wlan-test)#captive-portal-enforcement fall-back
         nx9500-6C8809(config-wlan-test)#show context
wlan test
 ssid test
 bridging-mode local
 encryption-type none
 authentication-type eap
 accounting syslog host 172.16.10.4 port 2
captive-portal-enforcement fall-back
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
 broadcast-dhcp validate-offer
nx9500-6C8809(config-wlan-test)#