Captive Portal Not Working with HTTPS Sessions
80658
Created On 09/25/18 19:49 PM - Last Modified 09/28/23 13:19 PM
Symptom
> debug device-server cp-allow-encrypted-disable off
> configure
# commit force
Environment
- Palo Alto Firewalls
- Supported PAN-OS
Cause
With https websites we have to configure ssl-forward proxy decryption for the firewall to present the Authentication Portal page to the user.
Resolution
We need an ssl-forward proxy decryption policy to inject a captive portal page whenever user visits any https website.
Click here to configure SSL decryption
Click here to configure Captive Portal
Please refer to the screen shot and description below:
- Decryption policy 1 bypasses decryption for known users.
- Decryption policy 2 will decrypt all the traffic coming from unknown users.
Behavior:
- Unknown user from the trust zone tries visiting https://www.google.com.
- Decryption policy 2 triggers and provides a CP page.
- Unknown user again tries visiting any other https site, the CP page is again prompted because of Decryption policy
- User enters credentials and is part of a group, captive-portal-grp (using AD for authenticating CP users).
- Now the firewall is aware of the user and Decryption policy 1 will triggers and will not decrypt any further traffic from the known user - the user will not get a certificate warning page.
- Security policy is also needed in place, based on group and zone individually. Create a group-specific policy on the top and a zone-specific policy below it.
Explanation of the warning message
Unknown users will be coming in from the trust zone, and there is no way for them to install the self-signed certificate, so they will get a warning message in case the decryption is in place.
If you are using a third-party certificate for CP, after user authentication, the no decrypt rule will apply, and there will be no prompting for certificate warnings.
Thank you.
Tarang Srivastav