Definition

captive portal

A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hot spots for Internet users.

When a potential user first logs on to a network with a captive portal, a Web page is encountered that requires certain actions before Internet access is granted. A simple captive portal forces the user to at least look at (if not read) an acceptable use policy (AUP) page, and then click on a button indicating agreement to the terms of the policy. Presumably, this can help absolve the provider from liability in the event the user commits criminal or other destructive activity while logged on. In some captive portals, advertisements for the provider's sponsors are displayed, and the user must click through them or close the windows in which they appear before accessing the Internet. Some captive portals require the entry of a pre-assigned user ID and password before accessing the Internet. Such authentication may discourage the use of wireless hot spots as sites for carrying on criminal activities. Most servers with captive portals include anti-virus and firewall programs to help protect users' computers from the Internet and from each other.

Even when a simple captive portal is used in a free public-access network, certain people may repeatedly connect, using the network on an almost continuous basis to download music, videos, or other large files. This activity, called bandwidth hogging, can be minimized by additional programming in the captive portal. Such programming can control the speed at which large files are downloaded, limit the size (in kilobytes or megabytes) of files that can be downloaded, restrict the number of downloads that can occur in a single session, or block connection to Web sites commonly used for downloading large files. This is called bandwidth throttling or traffic shaping.

This was last updated in August 2005
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Rugged mobile devices must be more than durable in harsh environments

    The durability of ruggedized mobile devices is only the first consideration for mobile managers with workers who take devices into hazardous environments. Connectivity, usability and portability are also important features.

  • Mobile phone beats out smartphone as device of choice

    Mobile phones edged out smartphones as the most commonly used devices in organizations, according to SearchMobileComputing.com's recent survey, which also found that many companies support any kind of devices brought in by users.

  • Mobile data services -- getting connected

    Mobile data computing continues to grow as more service providers offer services and at increasing speeds. Different ways to connect to the mobile data network are discussed in this tip by Paul DeBeasi.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: