A few weeks ago there was a question asked about how to make the captive portal authentication appear. The problem was resolved by making sure that after your policy that requires user based authentication, you had a network rule to drop all traffic. This worked for me and I have successfully been using the captive portal. However, I would like to know if a rule like this is required after every option. In my case, I would like a policy that applies to me individually, then to my wife and so on. I do this by making the source network the mac address list of our respective devices. However, it seems redundant and odd to need a network rule directly after each individual policy to force the captive portal. This seems like more of a work around instead of a feature.
Are there any obvious reasons why we should need this? Comparing it to the UTM (I know they're two very different firewalls) you simply needed to say that you wanted browser authentication on that specific profile and you were done.
This thread was automatically locked due to age.