Setting up a captive portal
A captive portal is a service that runs on the firewall and intercepts web sessions to have a user identify themselves. This can be a good addition to your user identification capabilities for unsupported operating systems that do not log on to the network, or guests that come into your network that you want to be able to identify.
It can also help pick up “strays”; for instance, a laptop may be used to roam a campus and hop SSIDs and access points, and it may be assigned a new IP address without generating a new logon event on Active Directory. At this moment, the user becomes unknown and a captive portal can be triggered to have the user log in manually.
To set up a captive portal, we will first need to be able to authenticate users, which we will cover in the next section.
Authenticating users
To be able to authenticate users, we need to create an authentication profile that manages which protocol and server will be used...