Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

How to build a captive Wi-Fi portal

Keeping tabs on who's using your network.

Article comments

Q: How do captive portals work?

It's an everyday scenario: you go to a hotel or Wi-Fi hotspot and find a wireless or wired connection, but instead of getting your homepage when you bring up your browser, you get a custom page from the service provider asking you to pay for the service. You've hit a captive portal, and it's how the service provider makes sure that they get paid for what they are offering.

The technology is relatively simple because you are, by definition, using their network. They configure their systems to accept your initial network traffic (in this case, your request for Web content from your homepage's server) but instead of passing that request along, they redirect you to their sign-in page. This redirection can be done in a number of ways, but the basic functionality is built into the http standard (the status codes in the 300-range describe the various options). Any non-web traffic, such as SMTP for email, or FTP, is typically blocked using a firewall of some type, but may be caught and redirected by a particularly sophisticated captive portal.

Once you sign in and pay up, the captive portal stops interfering with your traffic, and reverts to the usual 'pass through' mode. The next time you try to connect, it checks your identity (usually by looking at your machine's relevant MAC address) and silently lets you through if you are still in the time-window of service. Otherwise, it's back to square one.

So, to summarise, the captive portal provider needs: a redirection mechanism for Web traffic, a traffic-blocking mechanism of some sort (firewall, 802.1x, etc) to constrain you, a sign-in facility, a payments gateway of some sort, and some form of identity repository for keeping track of who is a paid-up known customer and who is not. None of these components are particularly obscure or difficult to find, but if you are looking to build a captive portal you probably shouldn't try to reinvent the wheel. You can find complete packaged hardware-and-software solutions from the usual suspects (Cisco, Juniper, etc), as well as smaller-scale software solutions from multiple vendors. If you want to use free and open-source software, you'll easily be able to find many solutions on-line.

Tim Cranny is Chief Architect at Senforce Technologies. He is also an editorial board member of the Wireless Vulnerabilities and Exploits (WVE) project. This article appeared in Network World.


Share:

More from Techworld

More relevant IT news

Comments

Cpaif said: For aneasier way to build acaptive portal onecan try Windows hotspot software FirstSpotat httppatronsoftcomfirstspo

COOMM said: sir i think you should learn the differences of how to build and what is a captive portal

Michael said: this article is pure trash wasted time reading it The topic might as well read how to make a taco salad It has nothing to do with actually building a captive portal

Jeff said: This article is useless The title idicates that the article will show one how to actully build a captive wifi portal This article does nothing of the sort Waste of a click to view this page

Lorenww said: The technology may be simple but actually making it work with multiple pay pal accounts and multiple landing pages is very difficult We have built this and is available to the public You own the software and all revenue generated fully customizable by youYour hotspots are up and running in minuteshttpwwwwifigatorcomThis is the only wifi captive portal software that you have control ofThanks and hope this helpsCheersLorenww



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Site Map

* *