Created on
10-02-2024
12:01 AM
Edited on
11-17-2025
09:54 PM
By
Jean-Philippe_P
| Description |
This article describes the steps to ensure that the captive portal is properly triggered on Apple devices (such as iPhone or iPad) when a captive portal is configured on an SSID. |
| Scope | FortiGate. |
| Solution |
Note: Similar configurations apply for wireless clients connecting to a third-party Access Point on the local network or to a FortiAP SSID in bridge mode, although in these cases the captive portal is configured on the FortiOS interface or VLAN rather than the SSID.
Pre-requisites: A captive portal is already configured on the FortiAuthenticator or another external resource.
In this example, the captive portal for the SSID 'Captive-Apple' is hosted on FortiAuthenticator at 'https://test.fortiauthenticator.net/portal/'.
If the captive portal is not triggered specifically for Apple devices, verify the following configurations:
This ensures that SSID clients can properly resolve the captive portal FQDN 'test.fortiauthenticator.net'. DNS method 2: External DNS Server. config firewall policy edit <index> set name "Allow-DNS" set srcintf "Captive-Apple" set dstintf "internal" set action accept set srcaddr "all" set dstaddr "Internal-DNS" set schedule "always" set service "DNS" set logtraffic disable set captive-portal-exempt enable next end
Firewall Policy to allow SSID clients to reach the external captive portal:
Ensure the policy includes the set captive-portal-exempt enable.
config firewall policy edit <index> set name "FAC-Captive-Exempt" set srcintf "Captive-Apple" set dstintf "wan1" set action accept set srcaddr "all" set dstaddr "test.fortiauthenticator.net" set schedule "always" set service "ALL" set logtraffic all set nat enable set port-preserve disable set captive-portal-exempt enable next end
config firewall policy edit <index> set name "Captive-policy" next end
Apple Captive Portal Detection:
On the device, verify the following settings under Wi-Fi > (SSID Name):
These settings ensure that the device performs DNS queries normally and does not bypass captive portal redirection.
On macOS:
After verifying the above configuration and settings, an Apple device should trigger the captive portal once it tries to connect to the SSID.
To troubleshoot:
diagnose sniffer packet any 'host <client IP> and host <Authentication-portal IP>' 4 0 l
If the user continuously hits the captive portal after a successful authentication, it may be a non-matching MAC address authentication issue. If so, disable auth-src-mac.
config user setting set auth-src-mac disable end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.