Windows Clients – Captive Portal Not Triggering with GlobalProtect Always-On Enabled

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Windows Clients – Captive Portal Not Triggering with GlobalProtect Always-On Enabled

L2 Linker

Hello everyone,

We are using a Captive Portal on our Palo Alto firewall at the headquarters. When users enter the building and connect to the wireless network, a Captive Portal pop-up is presented, and users gain internet access after entering their username and password.

At the same time, our end users are operating under a GlobalProtect Always-On architecture, where internet access is restricted unless the VPN is connected.

The issue we are facing is the following:

  • Only Windows users report that the Captive Portal does not appear when they arrive at the office and connect to Wi-Fi

  • If we disable Always-On for the affected users, or uninstall and reinstall the GlobalProtect client, the issue is resolved

  • In some cases, the issue only resolves after multiple system reboots

We have already:

  • Allowed access to Captive Portal-related IPs/FQDNs so that users can reach them even when VPN is not connected

  • Confirmed that this behavior only occurs on Windows endpoints (macOS users are not affected)

Despite these steps, the problem still persists.

Has anyone experienced a similar issue with GlobalProtect Always-On on Windows in combination with a local Captive Portal?
If so:

  • Was this related to Windows network detection (NCSI), captive portal detection, or GlobalProtect pre-logon / always-on behavior?

  • Are there any recommended workarounds, registry settings, or known bugs?

  • Did a specific GlobalProtect agent version resolve this issue?

Any suggestions or shared experiences would be greatly appreciated.

Thank you.

bilal_guclu
5 REPLIES 5

Community Team Member

Hi @bilal_guclu ,

 

Which GP agent version are you currently running? I see there are Windows-specific captive portal issues with Always-On that were addressed in later 6.x releases. If you’re on an older version, upgrading to 6.0.11, 6.1.6, 6.2.7, 6.3.3, or later would be the first thing I’d recommend checking.

 

If possible, could you also take a look at PanGPS.log from an affected Windows endpoint? I’d focus on entries showing network unavailability, failures retrieving portal configuration, or anything related to cached portal settings. What do you see?

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Hi,

 

We are currently using GlobalProtect version 6.3.3-c711. Previously, we were running version 6.3.2, and the same behavior was observed in both versions.

In the PanGPS logs, I can see that the captive portal addresses are allowed. However, “Enforce GlobalProtect for Network Access” is enabled in the GlobalProtect connection.

For internet access to be available, the captive portal must be reachable. Since the VPN connection cannot be established, GlobalProtect blocks internet access entirely. Even though the captive portal addresses are configured as exclusions (and I can confirm from the logs that they are indeed excluded), for some reason GlobalProtect still does not allow the traffic, preventing the captive portal process from completing.

bilal_guclu

Community Team Member

@bilal_guclu ,

 

Got it...do you have Captive Portal Exception Timeout configured? (Network > GlobalProtect -> Portals -> Your Portal Config -> Agent -> Agent-Config -> App) By default this value is 0, which means GP can block traffic immediately on Windows before the captive portal flow completes. 

 

The timeout value range is 0 to 3600. For example, a value of 60 means the user has one minute to log in to the captive portal after GP detects it. 

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

If you are referring to that timeout value, yes we already tried it, but it made no difference

 

Ekran Resmi 2026-01-15 17.33.49.png

bilal_guclu

Community Team Member

Screenshot 2026-01-15 at 8.02.51 AM.jpeg

How about checking the Pre-Logon Tunnel Rename Timeout (sec) (Windows only) ? The default value is -1, which means the pre-logon tunnel does not time out and continues enforcing pre-logon behavior. A value of 0 causes the pre-logon tunnel to terminate immediately and forces a clean transition.

 

Even though the name references “pre-logon,” the impact of this setting isn’t limited to user login. On Windows, it can influence behavior while the device is still determining network state (for example, right when it connects to Wi-Fi), which is when captive portal detection should occur.

 

Could you try setting this to 0 and see if that changes the behavior?

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 825 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!