I'm in the process of building out my new wireless guest network with Aruba controller (8.3.0.2) and Clearpass (6.7.5) controllers and am having an issue wtih a certfiicate error. I have a certificate from DigiCert on clearpass as well as my controllers and it seems to work fine. When i connect to my captive portal on a windows laptop, i get the captive portal pop-up and can log in with no certificate issues. I have a test iPad here as well and samething, connect and login with no certificate error.

Now on 5 different androids (runnig on different versions), i connect to network, get the captive portal pop-up which is https and thats fine. But when i click login i get the certificate error. I only seem to get the cert error on androids. I need another apple device or two to test with to verify it with that as well, but the ipad and windows devices are fine.


Download Portal 1 Android


DOWNLOAD 🔥 https://urluss.com/2y2Rwb 🔥



I would think something like digicert would be already loaded on android devices as its a pretty common 3rd party certificate company. has anyone had issues with android phones/tablets having a certificate error where other vendors seem to be fine?

Since i am in a multi controller setup each with their own individual cert, i have those all added in the header html area. On each controller i have their own certs, each with their own common name. But i also have SANS created for them for different things. One of those SANs entries is the dns address of the cluster of controllers. That is the entry that is referneced in the IP address after on the captive portal page on the clearpass.

Thanks. I will go about doing that now and test it out. One more question, so when creating the certificate, the common name should not be in dns? And that common name is what i will put in the IP Address field on the captive portal webpage config in clearpass?

I then updated my web login address so it is captive-portal..com, which is the samething i used as the common name in the certficate. now when i connect i get the error saying captive-portal..com can't be found. since there is no dns entry for it, how does it know to go back to the controller?

It originally showed up only as securelogin.arubanetworks.com. I changed the web-server profile on the highest folder for the controllers, but that didn't seem to work. So i had to manually change it on all of the controllers and now it shows up correctly in the show datapath fqdn and the captive portal does work now.

I test with my devices, and the windows/ipads are working the same now. and with androids, its been spotty. either my phone doesn't get the certifcate error anymore or it goes away really quickly and i don't have to accepty. my tablet does the samething. i had one of my co-workers phone didn't get the cert error, but another's did. so not sure if its related to something with android or something else.

You can use Modernizr to detect the existence of the Fetch API or Local Storage features, both of which exist in regular Google Chrome and Firefox, etc but aren't available in the captive portal browser.

For a lot of other devices - the above localStorage test works fine - we go into a catch block and determine that we are not inside a full fledged Chrome tab/Android Default browser tab, but Android has changed the way it runs captive portal it seems.

I have a client using Office 365, MFA enabled. I configured all employee devices, mix of iphone and android phones, using the Outlook mobile app. One particular users device, Android phone, is telling me it needs Intune Company Portal installed on the device in order to sync. I cannot for the life of me figure what is causing this. None of the others did this. I force a PIN and device encryption so they get the general message about organization activation, but this one particular device is requiring intune app be installed. Typically I administer everything through MDM and don't use Intune. Have any of you ever run into this?

I too had this issue and after working with Intune Support I discovered that when App Protection policies are present in Intune 'endpoint.microsoft.com' Android users will be forced to install Company portal which will then look to see if any policies are assigned to the user. Even if the user is not assigned an app protection policy this is the behavior. I had to remove the app protection policy for Android to stop this from happening.

What seems to be happening is that on windows devices and apple devices the guest portal will automatically open and redirect to our portal URL. It passes the whole cert chain, and everything is good.

It only then redirects when you try to browse from a browser. But what happens it seems to pass the WLC cert rather than the ISE cert so when you try to get to the portal URL it just throws cert errors and the web page will inevitably not load.

I've tried multiple things including rebooting ise multiple times, rebooting our WLC, and enabling/disabling captive bypass, and nothing seems to work to get our primary guest portal to redirect or pass the correct cert for Andoid devices.

In the event that Chrome detects SSL connection timeouts, certificate errors, or other network issues that might be caused by a captive portal (a hotel's WiFi network, for instance), Chrome will make a cookieless request to http:// www.gstatic.com/generate_204 and check the response code. If that request is redirected, Chrome will open the redirect target in a new tab on the assumption that it's a login page. Requests to the captive portal detection page are not logged.

It's actually sending a request to http:// connectivitycheck.android.com/generate_204. The issue I see is in the response from the WLC, the status code is HTTP 1.1 200 OK. I would either expect to see an error due to the page being blocked or a 300 response to indicate a redirection. Based on the text above from Google, it sounds like the browser will enter it's Captive Portal mode (and open a new tab for authentication) WHEN it receives a redirection.

On the WLC, I setup 3 virtual interfaces. 1 is internal. 2 is vendor and 3 is public. Each has their own DHCP scope so I can set all their specific options for their unique situation. 3 has a WLAN with the captive portal associated to it.

I did this because some users (visiting doctors) using their personal devices and we connect them to the vendor without the captive portal (they connect once and stay connected - Guest have a time limit and need to accept the Acceptable Use Policy).

I have the same issue: laptops/desktops are fine with captive portal, either displaying error which can be added to exceptions, or installing certificate of private CA. But on mobile devices, I cannot override the certificate error (browser won't allow, neither Chrome nor Firefox on Android), and I cannot install the certificate in a way that the browser recognizes it.

When a Web policy enforces authentication (as part of a firewall rule), the captive portal is shown fine. So it may have to do with how traffic is intercepted by Sophos XG (network vs. application layer) when redirecting to captive portal.

The generate_204 url should be used to detect the presence of Internet. If the device receives anything other than an HTTP 204 (including nothing at all) when accessing that URL it should throw up the "sign in to this network" notification. But, having said that, every Android vendor seems to mess with this mechanism in their own way. I have LG, Motorola and Google devices in my lab and all behave slightly differently when faced with a captive portal. Very frustrating.

Other than that, this really is kind of a mess in the industry. I really wish there was a standard captive portal detection process that all vendors used. Right now it's anyone's guess if it'll kick in or not on any given device.

We get an error "The network connection is unreachable or the portal is unresponsive. Check the network connection and reconnect." while connecting to GP with an agent installed on Android device.

Single accesspoint is connected with the controller , created two ssid one for office staff and another one for guest.Guest SSID is associated with the portal. Portal voucher authentication page is not appearing in Iphone and Android devices...

For the Iphone and some Android devices, when they connect to the portal SSID, they intercept the link of portal authentication, that's why we cannot see the authentication page. In this situation, please try to open a website in your browser manually and just see if the authentication page will pop up.

@Anu_Narayan I have encountered the same problem once. I established the wireless coverage for a small hotel with 20 pieces of EAP225 v3. All my clients connected to the Guest network cannot pop up the authentication page. So I ask the TP-Link support team for help. With their suggestion, I finally find out that I have made some mistake when setting the portal feature.

@Alexander_Ares I have created two ssid one for the guest and other one for the staffs. In the guest ssid i have enabled the portal. When I manually enter the portal address its asking the voucher , but all our guest not aware about our intranet IP. They will enter any valid websites only like google.com the browser should redirect to the portal authentication page that is my issue...

@Alexander_Ares i hope you can share your solution. I am having the same problem. For my setup i only have one AP the AEP110. I have omada controller 3.2.14. I know there are newer versions but the latest one is not detection my device. My issue is my wireless network is working. But with portal enabled, either facebook or voucher, it doesn't redirect to the login page. I hope someone has a solution for this.

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up an open wifi with the same name displaying a very similar web page asking for credentials? Usually if there are multiple wifi networks with the same name and encryption, devices only display the one with the highest signal strength (this is useful for big networks like a hotel or a university). And since the user is expecting a website asking for their credentials, they would be happy to insert it, and voil the attacker got their credentials. What could be even more scary (and fun)? For this attack it's enough to have a rooted android phone, and nothing else. I will show you how to do it. Of course everything written here is only for educational and research purpose. I show it mainly to make people realize how vulnerable the captive portals are and that you should be very careful when you use them. ff782bc1db

download delamb entertainment songs

download 1password 8 ios

download one man band v11 0 full

how to re download google play store

download a level notes pdf