Specifications

19-18 wlans Commands
Examples
ThefollowingexampleenablestheinclusionofVNSinformationinmessagestotheRADIUS
server:
EWC.enterasys.com:wlans:test:auth# auth-vns enable
EWC.enterasys.com:wlans:test:auth# apply
EWC.enterasys.com:wlans:test:auth# show auth-vns
VNS as VSA attribute: enable
19.6.5.9 captiveportal
TheEnterasysWirelessControllercanuseCaptivePortalauthenticationforServiceSetIdentifier
(SSID)networkassignments.TheCaptivePortalisabrowserbasedauthenticationmechanism
thatforcesunauthenticateduserstoawebpage.
Thecaptiveportalcommandmovesyoutocontextwlan:<WLANservice
name>:auth:captiveportal,whichcontainscommandsusedtoconfigureCaptivePortal
support.
Thefollowingcommandsareavailableinthewlan:<WLANservicename>:auth:captiveportal
context.
addipport
copycpfile
cpssl
custom
extcpip
extredir
extsecret
fqdn
guestportalacctlifetime
guestportalprefix
maxsessionlifetime
minpasswdlength
redirect
sendlogin
setacctlifetime
tosoverride
Note: After you run this command, you must run the apply command to implement the changes.
Note: In V7.0, the new wlan:<WLAN-service-name>:auth:mode command (mode) determines
which commands are available in the captiveportal context.