What is the captured portal?

The prisoner portal is a method of verification used to verify that the user has permission to access the Internet. This verification method requires the user to open a web browser. The web browser is then directed to a special website that may require the user to log in, insert payments or agree to acceptable use policies. This web browser authentication method is commonly used by Wi-Fi hotspots. This requires the captured portal to ignore all packets sent from the client computer until the user opens the web browser and does not complete the verification process. This prevents users from accessing other Internet services, such as clients for sending messages until they complete the verification process.

The prisoner portal is often used to urge the user to agree to the conditions of using the network before Being capable of accessing the connection. It is assumed that this will help release the network provider from liability resulting from network usee. Users who violate the conditions of use may consider their approach limited or disconnected.

Most prisoner portals use a relatively simple system to verify users using SSL login (Secure Sockets Layer). When the user is successfully verified, IP address (Internet Protocol) and Mac (Media Access Control) are added to the user list. This system is unsecured and can be used by malicious users to circumvent the captured portal. Using IP and MAC authorized user, harmful users can access a network connection. It seems that any measures that this malicious user in the network has taken has been taken by an authorized user.

The lack of security of the intermediate model for captured portals has led to many developers to create more sophisticated methods of authentication in captivity. These methods differ in programs. AllNY methods seek to reduce the risk that a malicious user can obtain unauthorized access to the network.

The prisoner portal may be an effective means of ensuring access to the network. However, the way the captured portal works is prevents users from accessing the network on platforms that do not provide a web browser. This includes some wireless game platforms that allow access to Wi-Fi for multiplayer games.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?