WiFi-based check-in: SonicWall
Last updated
Last updated
Before you configure the controller make sure you have set up your RADIUS server and have purchased a license.
SonicWall Access Point is setup and running the latest firmware.
802.1x SSID is already configured.
DHCP and DNS are appropriately configured.
SonicWall Access Point can communicate with the Radius servers.
The Guest SSID VLAN can communicate with Radius servers.
All systems are appropriately licensed.
Sign in to SonicWall Administration Interface. Go to Network > Zones > WLAN.
Leave the "General" options default and click Guest Services
Check Enable Guest Services and Enable External Guest Authentication. Change the Max Guests value to 255.
Select Auth Pages tab and enter "/api/pages/xxxxxx/" to all input fields. "xxxxxx" is your Splash page identifier as provided by us.
Review other settings and click OK to save changes.
The last step is to allow remote connections on your Firewall. We need to be able to connect to the SonicWall Guest Services to authorize connected clients. Guest Services are listed on port 4043 and the radius server will try to connect to the URL in this format:
https://SOURCE_IP_ADDRESS:4043
* SOURCE_IP_ADDRESS - IP address that we have received the authentication request from
We will be connecting directly from the web server, so no further changes are required in your SonicWall firewall rules.
We need to be able to connect to your Access Point to authorize connecting device. If not successful, the Captive Portal will return different error codes in the error_message parameter.
sonicwall_gw_connection_failed - our servers could not connect to your SonicWall AP. Make sure the Access Point Guest Services port is reachable over the internet, check your firewall settings and port forwarding rules if necessary. Guest Services are listed on port 4043/TCP by default and you can override this value using the Controller URL parameter in the Captive Portal settings in our Console.