Settle a problem:41
This document provides a technical analysis of a common scenario where a guest wireless network (WLAN) configured for captive portal authentication is displayed as an “Open” or “Unsecured” network on client devices. While this behavior is expected based on a standard configuration, it can cause user concern and diminish confidence in the network’s security. This guide will explain the underlying reason for this behavior and provide a comprehensive, best-practice solution to implement Layer 2 encryption, thereby resolving the client-side display issue while enhancing overall guest network security.
The core of the issue lies in the distinction between Layer 2 (data link) and Layer 3 (network) security mechanisms within the Cisco wireless architecture.
Initial Configuration: The described setup involves configuring the WLAN with Layer 2 Security set to “None.” This is a necessary step to allow any client device to associate freely with the Access Point (AP) without needing a pre-shared key (PSK) or 802.1X credential. The objective is to get the client onto the network in a pre-authenticated state.
Layer 3 Security: Security is then applied at Layer 3 by enabling a Web Policy (Captive Portal). Once a client associates, any attempt to access external network resources is intercepted by the Wireless LAN Controller (WLC) or Identity Services Engine (ISE), and the user’s web browser is redirected to a portal for authentication (e.g., by entering a username/password, accepting an Acceptable Use Policy, or using social media credentials).
Resulting Client Behavior: Client operating systems (e.g., iOS, Android, Windows) determine the “security” level of a Wi-Fi network based solely on its Layer 2 configuration. Since the Layer 2 security is “None,” the client correctly identifies and labels the network as “Open” or “Unsecured,” as the over-the-air traffic between the client and the AP is not encrypted at the data-link layer prior to portal authentication. This behavior is by design and is not an indication of a misconfiguration for this specific deployment type.
To address the perception of insecurity and add a critical layer of encryption, the recommended solution is to combine Layer 2 encryption (WPA2/WPA3-PSK) with the Layer 3 Web Policy. This configuration is often referred to as Central Web Authentication (CWA) when using Cisco ISE, but the principle applies broadly. This hybrid approach ensures that all wireless traffic is encrypted from the moment of association while still leveraging the captive portal for user identification and policy enforcement.
Configuration Steps (Using Cisco 9800 WLC GUI as a reference):
Navigate to WLAN Profile Configuration:
Configure Layer 2 Security:
Configure Layer 3 Security (Web Policy):
User Experience with this Enhanced Configuration:
Regardless of the authentication method, the following practices are critical for securing any guest network:
By implementing the recommended hybrid security model, you achieve a guest network that is not only robustly secured with over-the-air encryption but also presents itself correctly to end-users, fostering trust and confidence in your network infrastructure.