Skip to main content
Print

Local Users

Single User

Users can also be added locally which will be saved in our local db. In 'LOCAL USERS' tab click 'NEW USER' which will show a pop-up dialogue box as shown below. Once all the required fields are enetred a new local user will be created

User Name,First Name,Last Name ==> Only alpha_numeric, up to 16 characters

LU_Login

Bulk Insert Local Users

Users can also be bulk inserted by selecting 'BULK IMPORT' option as shown below, once the 'download sample option' is clicked a .csv file named 'sample_users_template.csv' will be downloaded with sample data. Make sure you have filled the mandatory appropriate data User Name,First Name,Last Name under the appropriate headers only

Password will be created with a default password as 'pass@123'
Role: will be assigned to 'Guest'
Duration: will be assigned to '45mins'

Users can further search a particular user and update as needed.

LU_Login

Captive setting

  • After successful configuration of zID or AD, In the interface menu select the LAN for enabling captive portal as shown
    Captive portal is enabled here by selecting the respective interface

    CP_Enable

  • Find the status of the captive portal once the process is completed

    CP_Status

QoS setting

  • Update the class manager with the specific DSCP and bandwidth for the respective role as shown below

    QoS

  • Traffic prioritization rules are configured here for the respective QoS classes

    Traffic

  • All the WAN Interfaces are applied with the class managers source IPSET and all the LAN interfaces are applied with the destination IPSET

    IPSet

Client

Redirection-Windows

Once connected to Captive Network windows will open the default browser and will try loading http://www.msftconnecttest.com/redirect

WRD

which intern redirects to https://zwan-sdwan.local/access

WRD

Pls select your preferred login method - AD or zID or LocalUser

  • zID Session logout

Once a user is successfully authenticated in zID, after 5 secs the success page auto-redirect to login page by which we will do a session sign-out in zID for that particular login user

Starting with Windows 10 1803+, Microsoft added limited native mDNS support, but to access a .local page on Windows, you need mDNS support (either built-in or via Bonjour), because .local domains are resolved using Multicast DNS, not standard DNS.

  • Client-IP
    zWAN Captive portal only supports IPv4 IP's and if the client IP is in IPv6 format it is converted to IPv4
    if it is a IPv4-mapped address, other format are rejected.

    Below is the IP format accepted during authentication

    WRD

  • AD User Role Mapping

Below mapping shows where users needs to configured in AD for accessing different userRole in captive portal

zlogin

  • zID/freeRADIUS User Role Mapping

Below mapping shows where users needs to configured in zID/freeRADIUS for accessing different userRole in captive portal

zlogin

  • Successful Authentication

Once authenticated successfully user will be allowed to access the internet

  • Device-OS
    zWAN captive portal detects the following device OS type after successful authentication as per details given below

    WRD

  • Ethernet icon shows "No Internet Access"

    Since windows network takes some time to acknowledge the new network, any possible reasons found as below

    When connecting to a captive portal network via LAN in Windows 10/11, the delay in displaying the network icon in the system tray is due to several factors related to how Windows handles network detection and authentication. Here’s a concise explanation of the reasons:

    Network Detection and Negotiation:

    Windows 10 performs a series of checks to identify the network type (e.g., public, private, or domain) and establish a connection. This includes obtaining an IP address via DHCP, which can take a few seconds, especially if the network infrastructure is slow or congested.

    Captive Portal Detection:

    Captive portals require authentication (e.g., a login page). Windows uses Network Connectivity Status Indicator (NCSI) to probe network connectivity by attempting to access a Microsoft server (e.g., http://www.msftconnecttest.com/connecttest.txt). If the probe is redirected to a captive portal login page, Windows detects this and may delay updating the network icon until the authentication process is complete.

    LAN-Specific Behavior:

    Unlike Wi-Fi, LAN connections are assumed to be more stable, so Windows may prioritize verifying physical connectivity and link status before updating the UI. This can cause a slight lag in reflecting the connection status in the system tray.

    System Tray Icon Refresh:

    The network icon in the system tray is updated by the Windows Shell, which may not refresh instantly. The delay can be exacerbated by system resource usage, background processes, or a slow response from the network stack.

    Captive Portal Redirect Handling:

    After connecting, the browser or system must handle the captive portal’s redirect. If the portal’s response is slow or the login page takes time to load, Windows may delay updating the network icon until it confirms full internet access.

    Firewall or Security Software:

    Third-party firewalls or antivirus software can interfere with network detection by scanning or filtering traffic, adding to the delay

    Redirection-KaliLinux Once connected to Captive Network ubuntu and kaliLinux handles in their own way as shown below

    kali

    Redirection-Ubuntu-18 & 22 Redirection to Captive Network for ubuntu 18 and 22 has a minor but significant differences

    ubun

    Redirection-macOS Wi-Fi clients will be automated to our landing page but not in LAN, This is a classic behavior difference between Wi-Fi and Ethernet (LAN) connections in how captive portal detection is triggered on macOS.
    When a device connects to a Wi-Fi network, macOS automatically probes for internet access using a known URL like:http://captive.apple.com/

    If the response isn’t what Apple expects (a 200 OK with specific content), it assumes there's a captive portal, and launches the Captive Network Assistant window.
    This detection happens only for Wi-Fi by default.On Ethernet (LAN), macOS often does not perform captive portal detection automatically.

    Android OS-Type For android devices Certain occasions after a successful authentication, OS Type might get displayed as 'Linux' - to avoid this users can do the changes in
    settings->Privacy of the captive network's SSID by disabling 'Use randomised MAC' and disabling the 'Send Device name' options, Your device will send the actual MAC id and device name.

    • In the Client side, user will be prompted to enter the credentials:

    zlogin

    sAuth

    • Role based connected clients

    All the connected client’s details will be displayed role wise

    role

  • iOS-HostName
    It’s likely due to privacy features in iOS that limit the sharing of device information such as host names on Wi-Fi networks. The most common reason is that the “Private Wi-Fi Address” feature is enabled on your iPhone, causing it to randomize its MAC address and not consistently report a host name to the network.
    to resolve this:(iOS 14 or later)

    1) Go to your iPhone’s Wi-Fi settings.

    2) Tap the “i” next to the Wi-Fi network you are connected to.

    3) Disable “Private Wi-Fi Address.”

    4) Reconnect your iPhone to the captive network.

    iPadOS: The feature is present starting from iPadOS 14 and later, and works almost identically to how it does on iPhone.

    macOS: The feature is available from macOS 14 (Sonoma) and newer. You can toggle Private, Fixed, or Rotating modes on a per-network basis from macOS 15 onward
    IP

    Backend will have the OAuth/AD/LocalUser server which is running with passport.js node package and having data communications between CPE & UI

    zID/AD/Local_User will manage user profile.

[/vc_column_text][/vc_column][/vc_row]

Table of Contents