Concept Guide

Table Of Contents
aaa authentication captive-portal
aaa authentication captive-portal <profile>
apple-cna-bypass
auth-protocol mschapv2|pap|chap
black-list <black-list>
clone <source-profile>
default-guest-role <role>
default-role <role>
enable-welcome-page
guest-logon
ip-addr-in-redirection <ipaddr>
login-page <url>
logon-wait {cpu-threshold <percent>}|{maximum-delay <seconds>}|{minimum-delay <seconds>}
logout-popup-window
max-authentication-failures <number>
no ...
protocol-http
redirect-pause <seconds>
redirect-url <url>
server-group <group-name>
show-acceptable-use-policy
show-fqdn
single-session
switchip-in-redirection-url <ipaddr>
url-hash-key <key>
user-idle-timeout
user-logon
user-vlan-in-redirection-url <vlan>
welcome-page <url>
white-list <white-list>
Description
This command configures a Captive Portal authentication profile.
Syntax
Parameter Description Range Default
apple-cna-bypass
Enable this knob to bypass Apple
CNA on iOS devices such as iPad,
iPhone, and iPod. You need to
perform Captive Portal
authentication from browser.
<profile>
Name that identifies an instance of
the profile. The name must be 1-63
characters.
“default”
authentication-protocol
mschapv2|pap|chap
This parameter specifies the type
of authentication required by this
profile, PAP is the default
authentication type.
mschap
v2
pap
chap
pap
Dell Networking W-Series ArubaOS 6.5.x | Reference Guide aaa authentication captive-portal | 19