Skip to content

Captive Portal Limitations

This form of proxy authentication has some serious limitations.

  1. Each user is supposed to be using a different IP address. If one IP address is shared by different users constant re-authentication or incorrect user to IP session info may occur.

  2. Clustering of proxy nodes is not possible as each node would contain its own copy of the session database.

  3. This type of authentication works best when there is a human in front of the display screen to type the credentials into login page. If for example, it is the network service which runs behind the proxy - Captive Portal authentication may not be a good choice.