10-26-2017 06:36 AM
Hi, our customer is having problem with ISE captive portal redirection to custom URL after authentication on Android. The reason is once cell phone with Android connects to SSID it automatically pop-up window (pseudo-browse probably) with captive portal which asks for credentials. Once you put correct credentials authentication is done and window with captive portal disappears and no redirection happens. This works completely fine with other OSes as Windows Mobile or iOS which after connecting to SSID open standard browser with captive portal, goes through authentication and once you're successfully authenticated it redirect you to customer's predefined URL address. I have found that behaviour on Android might be correct as stated in ISE CWA and Hotspot Flows config guide: "For endpoints where the CNA launches a pseudo-browser, this may break the flow when redirected to an ISE captive portal. This typically affect Apple IOS devices and it has especially negative effects in flows that require device registration, VLAN DHCP-Rlease, compliance check, etc." Did you have similar issue? Do we have any workaround or recommendation how to get the proper redirection to customer's defined URL after authentication through captive portal on Android mobile device? Any advice will help. Thanks!
Solved! Go to Solution.
10-26-2017 08:05 AM
Well it can be expected if the auto pop browser is gone that you can’t redirect them correct? Not something ISE can resolved.
It sounds like you have your wireless controller set for bypassing captive portal? SO you’re suppressing Apple device Captive Network Assistant? And that’s why its not a problem?
Are you using wireless controller code that supports URL based ACL? Try open up android site to suppress the minibrowser
clients3.google.com
http://www.chromium.org/chromium-os/chromiumos-design-docs/network-portal-detection
Shill, the connection manager for Chromium OS, attempts to detect services that are within a captive portal whenever a service transitions to the ready state. This determination of being in a captive portal or being online is done by attempting to retrieve the webpage http://clients3.google.com/generate_204. This well known URL is known to return an empty page with an HTTP status 204. If for any reason the web page is not returned, or an HTTP response other than 204 is received, then shill marks the service as being in the portal state.
10-26-2017 08:05 AM
Well it can be expected if the auto pop browser is gone that you can’t redirect them correct? Not something ISE can resolved.
It sounds like you have your wireless controller set for bypassing captive portal? SO you’re suppressing Apple device Captive Network Assistant? And that’s why its not a problem?
Are you using wireless controller code that supports URL based ACL? Try open up android site to suppress the minibrowser
clients3.google.com
http://www.chromium.org/chromium-os/chromiumos-design-docs/network-portal-detection
Shill, the connection manager for Chromium OS, attempts to detect services that are within a captive portal whenever a service transitions to the ready state. This determination of being in a captive portal or being online is done by attempting to retrieve the webpage http://clients3.google.com/generate_204. This well known URL is known to return an empty page with an HTTP status 204. If for any reason the web page is not returned, or an HTTP response other than 204 is received, then shill marks the service as being in the portal state.
12-08-2019 02:14 PM - edited 12-08-2019 08:03 PM
Facing similar issue
12-09-2019 08:49 AM
12-09-2019 01:55 PM
12-09-2019 02:48 PM
12-12-2019 02:56 PM
One can use ACL to achieve what the original poster wants. Create an ACL that does not allow endpoint to access the captive portal detection sites such as “connectivitycheck.gstatic.com” but allows everything else. When guest user authenticates, instead of sending back simple permit access, also send this ACL so the captive portal detection thinks it is still in captive portal state. It would be easier to achieve this using URL ACL instead of IP ACL.
12-12-2019 03:09 PM
We have tried to suppress the android mini browser using URL ACL list as below:
clients3.google.com
clients1.google.com
connectivitycheck.gstatic.com
connectivitycheck.android.com
However, these are very specific to device manufacturers as well as different android version and not able to achieve the target. Please refer the latest discussion for similar issue, at this link.
12-12-2019 03:22 PM
I think you have a point, but above suggestion is not to suppress mini browser, rather to keep it open post authentication.
12-12-2019 03:32 PM
12-12-2019 03:36 PM
I would suggest targeting 10 to 20 most used devices and find out what the detection addresses are. It may not be as many as most thinks. I can see certain vendors use and maintain their own sites, but most may use the default Android site.
12-12-2019 03:41 PM
12-12-2019 06:39 PM
12-12-2019 09:18 PM
12-13-2019 07:48 AM
@howon wrote:
I think you have a point, but above suggestion is not to suppress mini browser, rather to keep it open post authentication.
I don't see that working as it would never go away. Best is to suppress permanently so all the flows work pre and post auth
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide