Captive Portal Example: Create a Decryption Policy with an Outbound Rule

This part of the procedure discusses how to create a decryption policy to decrypt and resign traffic before the traffic reaches the captive portal. The captive portal can authenticate traffic only after it has been decrypted.

Before you begin

You must have an internal certificate authority (CA) for your outbound server; in other words, the managed device that decrypts the traffic for captive portal users to authenticate. This certificate must be different from the internal certificate you use to authenticate the captive portal with the managed device.

Procedure


Step 1

Click Policies > Access Control > Decryption.

Step 2

Click New Policy.

Step 3

Give the policy a unique Name and, optionally, a Description.

Step 4

Click the Outbound Connections tab.

Create a decryption policy with an outbound rule (also referred to as a Decrypt-Resign rule)

Step 5

Upload or choose certificates for the rules.

The system creates one rule per combination of CA and networks/ports.

Step 6

(Optional.) Choose networks and ports.

Step 7

Click Save.

Step 8

Click Edit (edit icon) next to the decryption policy you just created.

Step 9

Click Edit (edit icon) next to the decryption rule for captive portal.

Step 10

Click Users.

Step 11

Above the Available Realms list, click Refresh (refresh icon).

Step 12

In the Available Realms list, click Special Identities.

Step 13

In the Available Users list, click Unknown.

Step 14

Click Add to Rule.

The following figure shows an example. Set up a decryption rule to search your realms for the Special Identity user Unknown

Step 15

(Optional.) Set other options as discussed in Decryption Rule Conditions.

Step 16

Click Add.


What to do next

Configure Captive Portal Part 6: Associate Identity and Decryption Policies with the Access Control Policy