After roaming between two APs in the Extreme Cloud Wireless network, the end client devices are presented with an untrusted certificate pop-up page.
After roaming between two APs in the Extreme Online Cloud Wireless network, the end client devices are presented with an untrusted certificate pop-up page.
firmware 4.01 and 4.11
When an unauthorized user tries to connect to an 'https://' destination on the Internet, the AP is configured to intercept that request and redirect the user to the captive portal. The captive portal serves 'http://' only. Most browsers will notify the user that the redirect is for a less secure connection than the one he initiated. Once the user is authenticated, 'https://' requests made by the user will no longer be redirected.
At this time, the workaround is to accept the certificate. Some browsers may move forward with the redirect to the portal page, others may not.
The important item here is that if the certificate error pops-up, please check the client session in the system. That user may already be de-authenticated.
If there is an update to allow for 'https://' traffic to pass directly through the network without hitting the Portal process, this article will be updated.