Users are not logged out of hotspot when this problem occurs. Keep-alives also fail..
Problem also occurs if phone is added to bypass list and can browse fine without traditional authentication steps.
That's not the impression I got reading your original post:
Bypassing hotspot - I ping the phone, I can see packets timeout once it sleeps, I send a message, it wakes, pings resume, messages and notifications arrive.
How do you bypass the hotspot in this scenario?
Back to your more recent post....
When adding the phone to the bypass list fails, is the phone added to the bypass list by IP address or by MAC address? Does the phone still appear in the hotspot > hosts list in the same manner? Has its DHCP lease expired? (I'm assuming not since you're testing this, you're probably forcing it to go to sleep almost immediately, but I'm just trying to think of stuff to look at here)
Does the phone answer ARP requests when it is asleep? (I would assume that it must or else how would it ever work?)
Essentially, I've found that even hotspot bypass is not 100% in some cases. We used to have these Dell switches behind hotspots, and no amount of bypassing would ever make them reachable via their assigned NAT pinholes, once the hotspot entry disappeared. If you telnet into the switch from some other device behind the hostpost, and from the switch you would ping the default GW, then suddenly the device is reachable via the dstnat pinhole again. I was never able to figure out exactly what it was about the way these Dell switches behaved that caused this. Every other device we ever put behind a hotspot was always reachable via dstnat + hotspot bypass, even if the device's dynamic entry in the hosts table had timed out.
I would think that whitelisting the push servers in the walled garden may circumvent this enough to prevent the hotspot from interfering with it, even if the bypass doesn't fix it.