Check if user is still existed after user logout from NXC captive portal. If you
still could see user’s IP address (192.168.10.33 as below screenshot) from the
“Chain FORCE_AUTH”, it means the device (192.168.10.33) is used to access
NXC via other account (like admin).
Check the authentication policy is written in firewall NAT table in “Chain
FORCE_AUTH_POLICY”.
As below screenshot, NXC will block source IP from range
192.168.10.33~192.168.10.200 which is the authentication policy configured
from CONGIGURATION > Captive Portal.
Figure 154 Tera Term > NXC > Router > debug system iptables list table nat
> Chain FORCE_AUTH_POLICY
Capture the packets on NXC.
Please adjust Captured Packet Files to 100 MB to avoid oversize.
Figure 155 MAINTENANCE > Diagnostics > Packet Capture > Capture