When your Art of WiFi captive portal does not appear for the guest client device after connecting to the guest WiFi, the issue is almost always caused by the network configuration or the client device. This guide walks you through a systematic troubleshooting process to identify and resolve the problem.
Make sure the basics are in order:
You are running a recent, official release of the UniFi Network Application (avoid beta and release candidate builds for production)
All UniFi access points are on the latest official firmware version
All UniFi access points have full, unrestricted internet connectivity (this is required for the DNS proxy function that redirects guests to the captive portal)
Re-provision or reboot all access points serving the guest SSID. If your network includes managed switches and a gateway, reboot those as well. This ensures all devices have the latest configuration, including the captive portal settings and pre-authorization access lists.
Verify that the VLAN associated with the guest SSID does not have guest policies applied at the network level. The guest hotspot (captive portal) settings on the SSID are separate from VLAN-level guest policies, and having both active can cause conflicts.
The pre-authorization access list (also known as the walled garden) controls which domains and IP addresses guests can reach before authenticating. An incorrect list will prevent the splash page from loading.
In your Art of WiFi captive portal dashboard, navigate to:
Manage Captive Portal > Go Live
This page will verify and update the complete pre-authorization access list on your UniFi controller automatically, ensuring all required domains for your configured login methods (social logins, Microsoft Entra ID logins, payment gateway, etc.) are included.
Client devices cache network state, which can prevent the captive portal from appearing on subsequent connections. To get a clean test:
Remove the device from the UniFi controller:
Classic interface: Insights > Client History > hover over the device and remove
New interface: Client Devices > open the Details panel for the device > Remove
Forget the guest SSID on the client device (Settings > WiFi on iOS/Android)
Reconnect to the guest SSID
If the captive portal still does not appear, check whether the client device has WiFi Assist enabled. This iOS feature automatically switches to cellular data when WiFi connectivity is poor, which interferes with captive portal detection.
To disable WiFi Assist on iOS, follow Apple's instructions.
If the browser opens but the splash page does not load correctly, check the browser console for errors (where supported by the device). Any hints or error messages visible there can help identify the root cause. Also take note of the full URL where the browser has stopped.
While connected to the guest SSID, try accessing the captive portal server login page directly using its full, public hostname (e.g. https://portal.yourdomain.com).
If this fails: there is likely a DNS issue for the guest devices. DNS requests from guests are proxied by the UniFi access points, and if the APs cannot resolve the portal's hostname, guests won't be able to reach it either.
Possible fix: Add the IP addresses of the DNS servers used on the guest network to the pre-authorization access list. With recent firmware versions, this has been shown to resolve DNS proxy issues.
If DNS works but the page still doesn't load, try accessing the captive portal server using its IP address directly (e.g. https://167.172.40.39).
If this fails: something is blocking connectivity between the guest VLAN and the captive portal server. Check:
The pre-authorization access/allow lists on the UniFi controller should contain the IP address of the captive portal server with the /32 suffix
Firewall rules controlling inter-VLAN traffic
Any other security controls between the guest network and the portal server
If you are using social logins, Microsoft Entra ID, or payment gateways, make sure the required IP addresses and domains for those services are included in the pre-authorization access list. The Art of WiFi Go Live page handles this automatically, but if you have made manual changes, entries may be incomplete or overcomplete.
Important: Make sure the following URLs are NOT in your pre-authorization access list. These are the URLs that devices use to detect whether they are behind a captive portal. If these are allowed before authentication, the device will think it has internet access and will never trigger the captive portal redirect.
Apple devices:
https://www.apple.com/library/test/success.html
http://captive.apple.com
http://netcts.cdn-apple.com
Android devices:
https://clients3.google.com
http://connectivitycheck.gstatic.com
http://www.google.com/gen_204
http://www.samsung.com
Microsoft/Windows devices:
http://edge-http.microsoft.com
http://www.msftconnecttest.com/redirect
http://ctldl.windowsupdate.com
Firefox browsers:
http://detectportal.firefox.com
If you have worked through all of the steps above and the captive portal still does not appear, please contact us with the following information:
UniFi Network Application version
Access point model and firmware version
Client device type and OS version
The full URL where the browser stopped (if applicable)
Any browser console errors
Which steps you have completed from this guide
Different devices use different captive portal detection mechanisms. Apple devices check specific Apple URLs, Android devices check Google URLs, and Windows devices check Microsoft URLs. If any of these detection URLs are accidentally included in the pre-authorization access list, those specific devices will think they have internet access and skip the captive portal. Also, some devices have WiFi Assist or similar features that switch to cellular data, bypassing the portal entirely.
Common causes include firmware updates on the access points (which can reset guest hotspot settings), changes to the UniFi Network Application version, modifications to firewall rules or VLAN configurations, or DNS server changes on the guest network. Run through the Go Live page in your Art of WiFi dashboard to re-verify and re-apply the configuration.
In some cases, yes. With recent UniFi firmware versions, adding the IP addresses of the DNS servers used on the guest network to the pre-authorization access list has resolved DNS proxy issues where guest devices could not resolve the captive portal hostname.
Posted on: April 14th, 2026
By: Erik Slooff
On: Captive Portals
UniFi
captive-portal
troubleshooting
About the author
Erik Slooff
Owner & Lead Developer
For more than 10 years I’ve specialised in UniFi® guest-WiFi solutions—ranging from email-capture and SMS phone-number verification to Azure Entra ID single-sign-on and multi-site analytics dashboards. Posting as @slooffmaster in the Ubiquiti Community, I’ve contributed 160 + posts, 8300 + replies and 300 + accepted solutions that help network admins worldwide. Today our solutions secure and provide analytics for 2500 + UniFi networks across retail, hospitality, government and education in 70 + countries. Customers use our solutions to authenticate users, meet regional privacy requirements (GDPR, CCPA, etc.) and unlock marketing or loyalty insights, and more. When I’m not refining captive-portal flows, you’ll find me benchmarking new UniFi firmware or contributing to our open-source code on GitHub.
Copyright © 2026 Art of WiFi B.V.