Release Notes

20 | aaa authentication captive-portal Dell Networking W-Series ArubaOS 6.4.x| Reference Guide
aaa authentication captive-portal
aaa authentication captive-portal <profile>
apple-cna-bypass
auth-protocol mschapv2|pap|chap
black-list <black-list>
clone <source-profile>
default-guest-role <role>
default-role <role>
enable-welcome-page
guest-logon
ip-addr-in-redirection <ipaddr>
login-page <url>
logon-wait {cpu-threshold <percent>}|{maximum-delay <seconds>}|{minimum-delay <seconds>}
logout-popup-window
max-authentication-failures <number>
no ...
protocol-http
redirect-pause <seconds>
redirect-url <url>
server-group <group-name>
show-acceptable-use-policy
show-fqdn
single-session
switchip-in-redirection-url <ipaddr>
url-hash-key <key>
user-idle-timeout
user-logon
user-vlan-in-redirection-url <vlan>
welcome-page <url>
white-list <white-list>
Description
This command configures a Captive Portal authentication profile.
Syntax
Parameter Description Range Default
apple-cna-bypass
Enable this knob to
bypass Apple CNA on
iOS devices such as
iPad, iPhone, and
iPod. You need to per-
form Captive Portal
authentication from
browser.
<profile>
Name that identifies
an instance of the
profile. The name
must be 1-63
characters.
“default”
authentication-protocol
This parameter spe- mschapv2 pap