Configure captive portal authentication
You can configure the captive portal to sign in users and create a firewall rule for signed-in users.
Note
If you have an IPv4 and IPv6 (dual-stack) network, users must sign in for IPv4 and IPv6 websites separately.
Allow access to captive portal
To allow access to the captive portal from the users' zones, do as follows:
- Go to Administration > Device access.
- Under Captive portal, select the users' zones, such as LAN and Wi-Fi.
- Click Apply.
Create firewall rules
Allow DNS requests
If you use a DNS server other than the firewall, configure a firewall rule to allow DNS requests as follows:
- Go to Rules and policies > Firewall rules.
- Click Add firewall rule and click New firewall rule.
-
Specify the following settings:
- Action: Accept.
- Source zones: The zones users connect from, such as LAN and Wi-Fi.
- Source networks: The networks from which users connect or select Any.
- Destination zones: The DNS server's zone, such as DMZ or WAN.
- Destination networks: The DNS server's IP address or FQDN host.
- Services: Select DNS. It contains the port and protocol used in DNS traffic.
-
Click Save.
Apply the policies
Create a user-based firewall rule. It only allows the users and groups you select.
- Go to Rules and policies > Firewall rules.
- Click Add firewall rule and click New firewall rule.
-
Specify the following settings:
- Action: Accept.
- Source zones: The zones users connect from, such as LAN and Wi-Fi.
- Source networks: The networks from which users connect or select Any.
- Destination zones: The zones that users send traffic to, such as WAN.
- Destination networks: The networks you want user traffic to flow to or select Any.
-
Specify the following user identity settings:
-
Select Match known users.
The firewall allows traffic from authenticated users.
-
Select Use web authentication for unknown users.
The firewall automatically shows the captive portal to unauthenticated users when they start browsing.
-
Select the users and groups.
The firewall rule applies to these users after they're signed in. Policies, such as the web policy, you select in this rule apply to these users.
-
-
Click Save.
Captive portal settings
You can update the default captive portal settings. The following steps are optional:
- Go to Authentication > Web authentication.
-
Select the following settings:
- Show user portal link.
- Show web page after sign-in.
- Under Open web page, select In new browser window.
-
Select one of the sign-out options:
- When captive portal page is closed or redirected
- When user is inactive
-
Click Apply.
Note
You can change the default settings for the captive portal appearance to your custom settings. See Captive portal appearance.
Install CA certificate in users' endpoint computers
If you use a locally-signed certificate for the firewall, upload the corresponding CA certificate to users' endpoints to prevent untrusted certificate errors.
- Sign in to your firewall.
- Go to Certificates > Certificate authorities.
-
Click Download
for the certificate authority you want to download.
The firewall signs Locally-signed certificates using the CA Default.
-
Extract the
.pem
file from the downloaded.tar.gz
file to the location of your choice. - Add it to Trusted Root Certification Authorities in the endpoint computers. See Trusted Root Certification Authorities Certificate Store.
Note
If you use an external certificate, you upload the certificate chain, including the intermediate certificates, to the firewall.