Captive Portal – Auth Policy List and New Matching Criteria

Options
Zyxel_Claudia
Zyxel_Claudia Posts: 194 image  Zyxel Employee
Network Detective-New Adventure Badge Network Detective Badge First Comment Friend Collector
edited November 14 in Other Topics

As part of our continuous effort to improve user experience and network security, Zyxel Networks has introduced a USG FLEX H Series of enhancements to the Captive Portal feature. In this article, we’ll walk you through the key updates, including the newly designed Auth Policy List UI and the addition of matching criteria for web authentication.

1. Redesigned Auth Policy List with Filterable Columns

In previous firmware versions, the Captive Portal Auth Policy List had a simple interface with limited visibility and customization. Users had no way to filter or customize the displayed data, making it harder to manage large configurations.

With the new firmware upgrade, the Auth Policy List has been added with a filterable UI, allowing administrators to select and display only the information they need. This makes it significantly easier to manage complex policies and improves the overall usability of the Captive Portal settings.

To access this feature:

  • Navigate to Captive Portal > Authentication Policy > Policy
  • You will now see an enhanced interface where you can filter columns based on policy attributes, helping you quickly locate and edit specific entries.
    image.png

2. Expanded Matching Criteria for Authentication Policies

Another major upgrade in this firmware release is the introduction of additional matching criteria for triggering Captive Portal authentication. Previously, policies could only be applied based on the incoming interface. Now, you have more granular control through these new options:

Source Address

You can now define policies based on the source address, which can be:

  • An IP address or subnet
  • An address object for dynamic policy referencing

This is particularly useful in environments like large departments or campuses where only certain devices or user groups within a subnet need to be authenticated. For example, you can apply web authentication only to specific IP ranges, avoiding unnecessary authentication prompts for all users.

Destination Address

In scenarios where internal resources (e.g., intranet servers) must be secured, you can now define policies that enforce authentication when users access specific destination addresses. This ensures that access to sensitive internal systems is gated behind proper user verification.

Ensure redirection can occur when accessing the specific Destination Address.

image.png

3. Updates to Walled Garden and Exempt Lists

Prior to this update, Zyxel devices allowed configuration of Exempt Lists to specify resources that users could access before completing web authentication. However, in the new release:

  • In the Exempt List, Destination IP has been removed and repurposed to Walled Garden setting.

The enhanced Walled Garden now supports both:

  • Domain names
  • IP addresses

This allows you to configure trusted destinations (like DNS services or support sites) that users can access even before logging into the Captive Portal.

Tagged: