WISPr Portal Diagnostic Tool

[Type]: Network Troubleshooting
[Language]: Python/Flask
[Focus]: Captive Portal Testing

> Overview

A specialized diagnostic web application designed for troubleshooting Wireless Internet Service Provider (WISPr) portal authentication and redirection in RUCKUS One network environments. This tool provides network engineers with detailed visibility into captive portal authentication flows, helping diagnose connectivity issues that can be challenging to troubleshoot with standard network monitoring tools.

When users connect to wireless networks with captive portal authentication, they're redirected through a complex authentication flow involving multiple URL parameters and API calls. This tool simulates and logs every step of that process, making it invaluable for diagnosing authentication failures, redirect issues, and integration problems.

> Key Features

Authentication Simulation

Simulates WISPr captive portal authentication flows to test network configurations

Parameter Logging

Displays detailed URL parameters and headers during network connection handshake

Multiple Auth Modes

Supports "Always Accept" and "User Credentials" authentication modes for testing

API Communication Log

Comprehensive logging of client-server-API communications for debugging

> Why WISPr Matters

WISPr (Wireless Internet Service Provider roaming) is a protocol for captive portal authentication in wireless networks. It defines how clients are redirected to authentication portals and how credentials are validated. Common issues include:

  • Redirect Failures: Clients not reaching the authentication portal
  • Parameter Issues: Missing or malformed URL parameters
  • AAA Integration: Authentication server communication problems
  • Session Management: Timeout or state tracking issues

This tool helps network engineers diagnose these issues by providing visibility into every step of the authentication process, from initial redirect to final authorization.

Troubleshooting Power

Essential tool for network engineers managing guest wireless access. Quickly identify whether connectivity issues stem from portal configuration, AAA server integration, or client-side problems. Particularly valuable when deploying or troubleshooting RUCKUS One wireless networks with captive portal authentication.

> Technical Implementation

Built as a Flask web application with support for both local development and cloud deployment. The tool provides two authentication modes for testing different scenarios:

  • Always Accept Mode: Automatically approves all connection attempts - ideal for testing redirect flows
  • User Credentials Mode: Validates against external AAA servers - tests full authentication chain

Tested extensively with RUCKUS One cloud management and RUCKUS R770 access points running firmware 7.1.0.510.1041.

> Technology Stack

Python 3.x
Flask
Google Cloud Run
RUCKUS One API
WISPr Protocol
HTML/JavaScript

> Use Cases

This tool is particularly valuable for:

  • Guest Network Deployment: Validate captive portal configuration before going live
  • Authentication Troubleshooting: Diagnose why users can't authenticate to guest wireless
  • AAA Integration Testing: Verify proper communication with RADIUS/AAA servers
  • Client Behavior Analysis: Understand how different devices handle portal redirects
  • Migration Validation: Test portal functionality when moving between platforms