It is enabled OOTB on my Slate AX, f/w 4.2.3; I only changed the tracking IPs. I couldn’t imagine it not being also active w/ Repeater mode. I’ve had one or two strange little ‘gotcha’s’ that seem to be related to multi-hop latency when different GL devices are behind other routers in my LAN.
ps -w | grep mwan
4551 root 1388 S /bin/sh /usr/sbin/mwan3rtmon
22157 root 1308 S /bin/sh /usr/sbin/mwan3track wan eth0 online 192.168.1.111 9.9.9.9 149.112.112.112
Tried that and this time the browser got redirected to the captive portal, then timed out. That does not happen when connecting the laptop directly, after the very first time registering the laptop every next time it just connects without the captive page. So I am pretty sure MAC spoofing is not enough and they are using whatever fingerprinting abilities of the Aruba devices. I will probably drop the attempts now, it obviously requires more than a cheap device and unprepared user to get in. Thanks for all the help anyway!
It’s been getting difficult to have hotspot at hotels, cruise ships, planes etc. Companies are catching on and they are losing revenue if they don’t do something.
I would have thought that these sites would also block TP-LINK routers first as they are undoubtedly much more prevalent and popular than GL.iNET as travel routers.
Glad that you have cracked it. Interestingly, I have had to once set mine to 2.4GHz manually (from auto) before it would work. I guess one will have to book an extra day of holiday from now on to account for the time lost fixing these things!