Cisco Cisco AnyConnect Secure Mobility Client v2.x Troubleshooting Guide

Page of 4
Contents
Introduction
Prerequisites
Requirements
Components Used
Background Information
Captive Portal Remediation Requirements
Captive Portal Hotspot Detection
Captive Portal Hotspot Remediation
False Captive Portal Detection
AnyConnect Behavior
Captive Portal Incorrectly Detected with IKEV2
Workarounds
Disable the Captive Portal Feature
Introduction
This document describes the Cisco AnyConnect Mobility Client captive portal detection feature
and the requirements for it to function correctly. Many wireless hotspots at hotels, restaurants,
airports, and other public places use captive portals in order to block user access to the Internet.
They redirect HTTP requests to their own websites that require users to enter their credentials or
acknowledge terms and conditions of the hotspot host. 
Prerequisites
Requirements
Cisco recommends that you have knowledge of the Cisco AnyConnect Secure Mobility Client.
Components Used
The information in this document is based on these software versions:
AnyConnect Version 3.1.04072
Cisco Adaptive Security Appliance (ASA) Version 9.1.2
The information in this document was created from the devices in a specific lab environment. All of
the devices used in this document started with a cleared (default) configuration. If your network is
live, make sure that you understand the potential impact of any command.
Background Information
Many facilities that offer Wi-Fi and wired access, such as airports, coffee shops, and hotels,
require users to pay before they obtain access, agree to abide by an acceptable use policy, or
both. These facilities use a technique called captive portal in order to prevent applications from