This article describes the installation and configuration steps for TP-Link Omada Cloud-Based Controller.
You will need Omada Controller v5.3.1 or above in order to proceed. Our test was performed with Omada Cloud controller v5.9.41.
Login to Omada Controller.
Go to the Authentication / Portal page.
Configure as follows:
To configure the RADIUS server go to the Authentication / RADIUS Profile page and configure with:
Go to Authentication / Profile / Access Control, enable Pre-Authentication Access, and add the following domains:
Apply changes.
If your WiFi Hotspot certificate is issued by Sectigo (or a similar CA), add the CA’s OCSP/CRL hosts so devices can verify certificates even before login.
For Sectigo, for example:
Apple & DigiCert validation endpoints
Apple devices also contact their own endpoints for certificate checks and captive-portal detection. It helps to allow these:
Common DigiCert endpoints
Apple often uses DigiCert.
Again, allow at least TCP 80 and 443.
As Cloudflare may inject its own script, please whitelist:
static.cloudflareinsights.com
Very important: what NOT to whitelist
Do not add Apple’s captive-portal test domain to the walled garden:
captive.apple.com
If captive.apple.com is reachable without redirection, iPhone/iPad will think it already has full internet and will not open the captive portal popup.
So:
captive.apple.com must not be in the pre-auth / walled-garden list.
It should be intercepted and redirected to the WiFi Hotspot portal (https://wifihotspot.io/).
Optional: HTTPS redirect behaviour
If your gateway/Omada has a setting like “Redirect HTTPS to portal”, and you still see unstable behaviour on iOS:
Test checklist (for admins)
On an iPhone/iPad, forget the WiFi network, then reconnect.
Verify that a pop-up window appears showing the WiFi Hotspot portal (wifihotspot.io).
If it doesn’t:
TP Link Omada Controller