Specifications
19-18 wlans Commands
Examples
ThefollowingexampleenablestheinclusionofVNSinformationinmessagestotheRADIUS
server:
EWC.enterasys.com:wlans:test:auth# auth-vns enable
EWC.enterasys.com:wlans:test:auth# apply
EWC.enterasys.com:wlans:test:auth# show auth-vns
VNS as VSA attribute: enable
19.6.5.9 captiveportal
TheEnterasysWirelessControllercanuseCaptivePortalauthenticationforServiceSetIdentifier
(SSID)networkassignments.TheCaptivePortalisabrowser‐basedauthenticationmechanism
thatforcesunauthenticateduserstoawebpage.
Thecaptiveportalcommandmovesyoutocontextwlan:<WLAN‐service‐
name>:auth:captiveportal,whichcontainscommandsusedtoconfigureCaptivePortal
support.
Thefollowingcommandsareavailableinthewlan:<WLAN‐service‐name>:auth:captiveportal
context.
• add‐ip‐port
• copy‐cpfile
• cp‐ssl
• custom
• extcpip
• extredir
• extsecret
• fqdn
• guestportalacctlifetime
• guestportalprefix
• maxsessionlifetime
• minpasswdlength
• redirect
• send‐login
• set‐acct‐lifetime
• tos‐override
Note: After you run this command, you must run the apply command to implement the changes.
Note: In V7.0, the new wlan:<WLAN-service-name>:auth:mode command (mode) determines
which commands are available in the captiveportal context.