<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captured Guest Portal AUP with Zscaler Branch Connector in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/captured-guest-portal-aup-with-zscaler-branch-connector/m-p/5365635#M288364</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1233161"&gt;@dstrobel&lt;/a&gt;&amp;nbsp;This has already been addressed in the past, no sense for me to copy / paste her, find the exact solution in this post:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/wireless/interesting-issue-with-apple-devices-and-portal/td-p/5270582" target="_blank"&gt;https://community.cisco.com/t5/wireless/interesting-issue-with-apple-devices-and-portal/td-p/5270582&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Ensure that the virtual IP is NOT 1.1.1.1, is not routable, and it's per RFC5737. If you still don't manage to make it work, use this additional document to help you investigate, otherwise come back with findings:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/221912-troubleshoot-common-issues-with-lwa-on-9.html#toc-hId-79775511" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/221912-troubleshoot-common-issues-with-lwa-on-9.html#toc-hId-79775511&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Jan 2026 20:08:10 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2026-01-27T20:08:10Z</dc:date>
    <item>
      <title>Captured Guest Portal AUP with Zscaler Branch Connector</title>
      <link>https://community.cisco.com/t5/wireless/captured-guest-portal-aup-with-zscaler-branch-connector/m-p/5365330#M288360</link>
      <description>&lt;P&gt;Hello Experts,&lt;/P&gt;&lt;P&gt;I apologize ahead of time for the long post. I am working on a proof of concept for replacing our current ISE guest portal setup. I currently have a 2 server cluster that's strictly being used for sponsored guest access and we have new management who want to change it to a click through AUP with no registration. We also have about 35 9800 controllers and 2 9800CL VMs that will be migrated to AWS in the near future. We are also converting sites from Silverpeak sdwan to Zscaler branch connector.&amp;nbsp;I would prefer to get rid of ISE because it's way overkill for what we're using it for. We don't need anything other than an AUP for guest clients.&lt;/P&gt;&lt;P&gt;I am trying to come up with the most simple and secure way to splash an AUP for guests. My first try was setting up a 9800CL as an anchor to centralize the certificate management and using the built in guest portal. The problem I'm running into with this is getting Apple devices to pop the portal page. Android and Windows work without a problem, but every Apple device I try has varying amounts of difficulty getting to the splash page (even manually). I've tried a pre-authentication acl with zero luck so far.&lt;/P&gt;&lt;P&gt;Is there a better way that I'm missing here? I'm open to just about anything, and I'm trying to keep this as simple as possible. All it has to do is force the guest to click through an AUP. I've looked at doing it on the Zscaler and that's a problem because the clients need the Zscaler certificate to get the portal working without a security warning. I've also looked into Cloud-FI because they advertise direct integration with ZIA at the cloud level.&lt;/P&gt;&lt;P&gt;Am I crazy for thinking this should be a lot easier than it is?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 19:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/captured-guest-portal-aup-with-zscaler-branch-connector/m-p/5365330#M288360</guid>
      <dc:creator>dstrobel</dc:creator>
      <dc:date>2026-01-27T19:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: Captured Guest Portal AUP with Zscaler Branch Connector</title>
      <link>https://community.cisco.com/t5/wireless/captured-guest-portal-aup-with-zscaler-branch-connector/m-p/5365635#M288364</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1233161"&gt;@dstrobel&lt;/a&gt;&amp;nbsp;This has already been addressed in the past, no sense for me to copy / paste her, find the exact solution in this post:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/wireless/interesting-issue-with-apple-devices-and-portal/td-p/5270582" target="_blank"&gt;https://community.cisco.com/t5/wireless/interesting-issue-with-apple-devices-and-portal/td-p/5270582&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Ensure that the virtual IP is NOT 1.1.1.1, is not routable, and it's per RFC5737. If you still don't manage to make it work, use this additional document to help you investigate, otherwise come back with findings:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/221912-troubleshoot-common-issues-with-lwa-on-9.html#toc-hId-79775511" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/221912-troubleshoot-common-issues-with-lwa-on-9.html#toc-hId-79775511&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 20:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/captured-guest-portal-aup-with-zscaler-branch-connector/m-p/5365635#M288364</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2026-01-27T20:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Captured Guest Portal AUP with Zscaler Branch Connector</title>
      <link>https://community.cisco.com/t5/wireless/captured-guest-portal-aup-with-zscaler-branch-connector/m-p/5365904#M288370</link>
      <description>&lt;P&gt;HI Cristian, thank you for replying.&lt;/P&gt;&lt;P&gt;The article in that link is very confusing. I've looked at that before and it doesn't make any more sense now than it did then. Perhaps you can help me understand.&lt;/P&gt;&lt;P&gt;The ACL in that article seems like complete rubbish.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Step 4.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Optional) Upon parameter map definition, a couple of access control lists (ACLs) are automatically created. These ACLs are used to define which traffic triggers a redirection to web server and which traffic is allowed to pass through. If specific requirements, such as multiple web server IP addresses or URL filters, exist, then navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Configuration &amp;gt; Security &amp;gt; ACL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;+ Add&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and define necessary rules; permit statements are redirected while deny statements define traffic passes through.&lt;/P&gt;&lt;P&gt;Automatically created ACLs rules are:&lt;/P&gt;&lt;PRE&gt;alz-9800#&lt;STRONG&gt;show ip access-list&lt;/STRONG&gt;&lt;BR /&gt;Extended IP access list WA-sec-172.16.80.8&lt;BR /&gt;10 permit tcp any host 172.16.80.8 eq www&lt;BR /&gt;20 permit tcp any host 172.16.80.8 eq 443&lt;BR /&gt;30 permit tcp host 172.16.80.8 eq www any&lt;BR /&gt;40 permit tcp host 172.16.80.8 eq 443 any&lt;BR /&gt;50 permit tcp any any eq domain&lt;BR /&gt;60 permit udp any any eq domain&lt;BR /&gt;70 permit udp any any eq bootpc&lt;BR /&gt;80 permit udp any any eq bootps&lt;BR /&gt;90 deny ip any any (1288 matches)&lt;BR /&gt;Extended IP access list WA-v4-int-172.16.80.8&lt;BR /&gt;10 deny tcp any host 172.16.80.8 eq www&lt;BR /&gt;20 deny tcp any host 172.16.80.8 eq 443&lt;BR /&gt;30 permit tcp any any eq www&lt;BR /&gt;40 permit tcp any host 192.0.2.1 eq 443&lt;/PRE&gt;&lt;P&gt;First of all, if you go to Configuration &amp;gt; Security &amp;gt; ACL +Add that will add a completely separate unrelated new ACL. It seems like you can't manually edit the rules on these automatically generated ACLs, except perhaps from the CLI?&lt;/P&gt;&lt;P&gt;Second thing wrong is the description at the top explicitly says "&lt;SPAN&gt;permit statements are redirected while deny statements define traffic passes through" meaning to me what Cisco calls a "punt" ACL. Any traffic to the controller should be a permit and any traffic to outside the controller should be a deny. This ACL example is showing permit statements for DHCP and DNS. Obviously you can run DHCP on the controller but I don't see any way to use it as a DNS forwarder (which would be a really weird thing to do anyway). There is no clear explanation of what&amp;nbsp;172.16.80.8 is so I take it to be an external web auth provider and that should be deny statements to punt to an outside server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;As an example this is what I use for ISE redirection right now taken from this guide:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213920-central-web-authentication-cwa-on-cata.html#toc-hId-881505252" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213920-central-web-authentication-cwa-on-cata.html#toc-hId-881505252&lt;/A&gt;&lt;/P&gt;&lt;PRE&gt;ip access-list extended REDIRECT&lt;BR /&gt; deny ip any host &amp;lt;ISE-IP&amp;gt;&lt;BR /&gt; deny ip host &amp;lt;ISE-IP&amp;gt; any&lt;BR /&gt; deny udp any any eq domain&lt;BR /&gt; deny udp any eq domain any&lt;BR /&gt; permit tcp any any eq www&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;There's obviously something I'm misunderstanding here.&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;Dan&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 21:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/captured-guest-portal-aup-with-zscaler-branch-connector/m-p/5365904#M288370</guid>
      <dc:creator>dstrobel</dc:creator>
      <dc:date>2026-01-28T21:35:04Z</dc:date>
    </item>
  </channel>
</rss>

