iOS devices (iPhone, iPad) optimise network connectivity by attempting to reuse previously assigned IP addresses when reconnecting to Wi-Fi networks. While this improves connection speed and battery efficiency, it can interfere with correct detection and display of captive portals — especially on guest networks without strict DHCP enforcement. Cisco Wireless LAN Controllers (WLC) expose a setting called DHCP Addr. Required that significantly improves the captive-portal experience for iOS devices.Documentation Index
Fetch the complete documentation index at: https://wiki.netgraph-connect.com/llms.txt
Use this file to discover all available pages before exploring further.
Problem
Without DHCP Addr. Required enabled:- iOS devices attempt to use a cached IP address from a previous connection.
- They may skip the DHCP process unless forced to revalidate.
- If the old IP address is invalid or doesn’t match the current network, connectivity issues occur.
- Captive-portal detection (via the Captive Network Assistant) may fail or be delayed.
Solution — enforce DHCP address assignment
Enabling DHCP Addr. Required on the WLC SSID:- Blocks client traffic until the full DHCP handshake completes.
- Forces every device to request and obtain a valid IP address before any other network access is allowed.
- Triggers iOS devices to perform a fresh DHCP discovery immediately upon connecting.
- Ensures correct network parameters (IP, Gateway, DNS) are in place and the Captive Network Assistant fires reliably.
Conclusion
Enabling DHCP Addr. Required on WLC guest SSIDs is crucial for a smooth and reliable captive-portal experience, particularly for iOS devices. It prevents stale IP-address reuse, accelerates correct network access and improves the overall guest experience on public or enterprise guest Wi-Fi networks.Related
DHCP Option 114
Modern captive-portal discovery that sidesteps probe-endpoint quirks.
Walled garden
Where Sign In endpoints and probe URLs are whitelisted pre-auth.
MAC randomization in Apple products
iOS 18 / macOS 15 MAC behaviour for the same guest fleet.
Support checklist
The full triage path for guest-access incidents.

