🔐 Palo Alto Networks Captive Portal Authentication Guide

1. Overview of Captive Portal Authentication

Captive Portal is a feature on Palo Alto Networks firewalls that prompts users to authenticate before granting access to network resources. When a user's traffic matches an Authentication Policy rule, the firewall intercepts the request and redirects the user to an authentication page. Upon successful authentication, the user's IP address is mapped to their username, enabling user-based policy enforcement.

2. Authentication Methods

The Captive Portal supports various authentication methods:

For more details, refer to the Captive Portal Authentication Methods documentation.

3. Captive Portal Modes

The firewall offers two modes for Captive Portal operation:

Learn more about these modes in the Authentication Portal Modes guide.

4. Constructing an Authentication Policy

To implement Captive Portal authentication, follow these steps:

  1. Configure Authentication Profiles: Define how the firewall authenticates users, specifying the authentication method and server profiles.
  2. Create Authentication Enforcement Objects: Associate authentication profiles with specific methods (e.g., web-form, browser-challenge).
  3. Set Up Captive Portal: Enable Captive Portal on the desired interfaces and specify the redirect host and SSL/TLS service profile.
  4. Define Authentication Policy Rules: Specify the source and destination zones, users, services, and the associated authentication enforcement object.

Detailed configuration steps are available in the Configure Authentication Policy documentation.

5. Best Practices and Considerations

6. Additional Resources