SlideShare a Scribd company logo
1 of 1
Download to read offline
What is captive portal?
Now many clients requires a feature called captive portal of a router. Then what is
captive portal? A captive portal is a web page accessed with a web browser that is
displayed to newly connected users of a Wi-Fi network before they are granted
broader access to network resources.
How do we use the captive portal? Captive portals are commonly used to present a
landing or log-in page which may require authentication, payment, acceptance of
an end-user license agreement or an acceptable use policy, or other valid credentials
that both the host and user agree to adhere by. Captive portals are used for a broad
range of mobile and pedestrian broadband services - including cable and
commercially provided Wi-Fi and home hotspots. A captive portal can also be used
to provide access to enterprise or residential wired networks, such as apartment
houses, hotel rooms, and business centers.
Captive portals are primarily used in open wireless networks where the users are
shown a welcome message informing them of the conditions of access.
Administrators tend to do this so that their own users take responsibility for their
actions and to avoid any legal responsibility. It is discussed whether this delegation
of responsibility is legally valid.
Now E-Lins’ series routers already support Captive portal can you can freely contact
with E-Lins Communication Co., Limited for further needs.
Visit E-Lins Technology for more details!

More Related Content

What's hot

Infographic wifi
Infographic wifiInfographic wifi
Infographic wifiKarnam Saha
 
A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...LeMeniz Infotech
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTForgeRock
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemwegdam
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
10 essential use cases of blockchain in banking
10 essential use cases of blockchain in banking10 essential use cases of blockchain in banking
10 essential use cases of blockchain in bankingAmniAugustine
 
DevDay: Open Banking and Blockchain, IntellectEU
DevDay: Open Banking and Blockchain, IntellectEUDevDay: Open Banking and Blockchain, IntellectEU
DevDay: Open Banking and Blockchain, IntellectEUR3
 

What's hot (12)

SSEIIF SA
SSEIIF SASSEIIF SA
SSEIIF SA
 
FLEXMEET
FLEXMEETFLEXMEET
FLEXMEET
 
Infographic wifi
Infographic wifiInfographic wifi
Infographic wifi
 
A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...A privacy preserving framework for managing mobile ad requests and billing in...
A privacy preserving framework for managing mobile ad requests and billing in...
 
Max chion mastercard
Max chion mastercardMax chion mastercard
Max chion mastercard
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystem
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
10 essential use cases of blockchain in banking
10 essential use cases of blockchain in banking10 essential use cases of blockchain in banking
10 essential use cases of blockchain in banking
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
 
DevDay: Open Banking and Blockchain, IntellectEU
DevDay: Open Banking and Blockchain, IntellectEUDevDay: Open Banking and Blockchain, IntellectEU
DevDay: Open Banking and Blockchain, IntellectEU
 

Similar to What is captive portal?

5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFiAlepo
 
Alepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFiAlepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFiPeerasak C.
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllKarri Huhtanen
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllRadiator Software
 
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...Purdicom
 
Wifi hotspot offload_monetization
Wifi hotspot offload_monetizationWifi hotspot offload_monetization
Wifi hotspot offload_monetizationguykamanda
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017Saurabh Verma
 
Wifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationWifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationJustus @GreenPacket
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...Green Packet
 
IM 311 Title - Captive portal
IM 311 Title - Captive portalIM 311 Title - Captive portal
IM 311 Title - Captive portalLeo Juntilla
 
Wi-Fi's Role in the internet of people, places, and things
Wi-Fi's Role in the internet of people, places, and thingsWi-Fi's Role in the internet of people, places, and things
Wi-Fi's Role in the internet of people, places, and thingsTaren Patterson
 

Similar to What is captive portal? (20)

What is Captive Portal.pdf
What is Captive Portal.pdfWhat is Captive Portal.pdf
What is Captive Portal.pdf
 
What Is Captive Portal.pdf
What Is Captive Portal.pdfWhat Is Captive Portal.pdf
What Is Captive Portal.pdf
 
How Popular of a Hotspot.pdf
How Popular of a Hotspot.pdfHow Popular of a Hotspot.pdf
How Popular of a Hotspot.pdf
 
5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi
 
hotspot(wi-fi)
hotspot(wi-fi)hotspot(wi-fi)
hotspot(wi-fi)
 
Alepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFiAlepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFi
 
Wifi pricing
Wifi pricingWifi pricing
Wifi pricing
 
DS_Kloudyy_v2015
DS_Kloudyy_v2015DS_Kloudyy_v2015
DS_Kloudyy_v2015
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
 
Wp passpoint wi-fi
Wp passpoint wi-fiWp passpoint wi-fi
Wp passpoint wi-fi
 
KLOUDYY_2015_New-1Features
KLOUDYY_2015_New-1FeaturesKLOUDYY_2015_New-1Features
KLOUDYY_2015_New-1Features
 
Hotspot!
Hotspot!Hotspot!
Hotspot!
 
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
CASE STUDY: Curve IT and Purdicom are excited to announce the first, of many,...
 
Wifi hotspot offload_monetization
Wifi hotspot offload_monetizationWifi hotspot offload_monetization
Wifi hotspot offload_monetization
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017
 
Wifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationWifi offload-through-eap-authentication
Wifi offload-through-eap-authentication
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 
IM 311 Title - Captive portal
IM 311 Title - Captive portalIM 311 Title - Captive portal
IM 311 Title - Captive portal
 
Wi-Fi's Role in the internet of people, places, and things
Wi-Fi's Role in the internet of people, places, and thingsWi-Fi's Role in the internet of people, places, and things
Wi-Fi's Role in the internet of people, places, and things
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

What is captive portal?

  • 1. What is captive portal? Now many clients requires a feature called captive portal of a router. Then what is captive portal? A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi network before they are granted broader access to network resources. How do we use the captive portal? Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement or an acceptable use policy, or other valid credentials that both the host and user agree to adhere by. Captive portals are used for a broad range of mobile and pedestrian broadband services - including cable and commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers. Captive portals are primarily used in open wireless networks where the users are shown a welcome message informing them of the conditions of access. Administrators tend to do this so that their own users take responsibility for their actions and to avoid any legal responsibility. It is discussed whether this delegation of responsibility is legally valid. Now E-Lins’ series routers already support Captive portal can you can freely contact with E-Lins Communication Co., Limited for further needs. Visit E-Lins Technology for more details!