Skip to main content

Casos de uso de WiFi para invitados: Cómo diferentes industrias están utilizando el WiFi gratuito

Una referencia técnica exhaustiva para líderes de TI sobre la implementación de WiFi para invitados como una plataforma estratégica de adquisición de datos y análisis. Esta guía cubre la arquitectura, los casos de uso específicos de la industria y las mejores prácticas para transformar la conectividad en valor empresarial medible.

📖 6 min de lectura📝 1,303 palabras🔧 2 ejemplos3 preguntas📚 8 términos clave

🎧 Escuchar esta guía

Ver transcripción
Guest WiFi Use Cases: How Different Industries Are Using Free WiFi A Purple Intelligence Briefing — approximately 10 minutes --- INTRODUCTION AND CONTEXT — approximately 1 minute Welcome to the Purple Intelligence Briefing. I'm your host, and today we're cutting straight to what matters: how organisations across retail, hospitality, healthcare, venues, and transport are deploying guest WiFi not just as a connectivity amenity, but as a genuine business intelligence and revenue tool. If you're an IT manager, a network architect, or a CTO who's been asked to justify the cost of your guest WiFi infrastructure — or better yet, turn it into a profit centre — this episode is for you. We'll cover the technical architecture that underpins these deployments, walk through real implementation scenarios, and give you a clear framework for evaluating where your own organisation sits on the maturity curve. Let's get into it. --- TECHNICAL DEEP-DIVE — approximately 5 minutes Let's start with the fundamentals, because the gap between a basic free WiFi deployment and a fully instrumented guest intelligence platform is enormous — and most organisations are sitting somewhere in the middle without realising it. At its core, a guest WiFi deployment has three layers. First, the network layer: access points, controllers, VLANs, and your authentication mechanism. Second, the captive portal and identity layer: how guests authenticate, what data they consent to share, and how that identity is persisted across sessions. Third, the analytics and integration layer: where connection events, dwell time, location signals, and profile data flow into your CRM, marketing automation, and reporting stack. The authentication layer is where most of the commercial value is captured — and where most deployments are under-engineered. WPA3 is now the standard for enterprise guest networks, and IEEE 802.1X with RADIUS-based authentication gives you per-user policy enforcement. But for consumer-facing guest WiFi, the captive portal remains the primary identity capture mechanism. Done properly — with GDPR-compliant consent flows, social login options, and progressive profiling — a captive portal is your first-party data acquisition engine. Now, let's talk industry by industry. In retail, the primary use case is footfall analytics and dwell time measurement. When a shopper's device connects to your WiFi — or even just probes for networks nearby — you can map their journey through the store, measure time spent in specific zones, and correlate that with transaction data. A mid-sized UK retail chain with 80 stores deployed Purple's guest WiFi platform and within 90 days had visibility into which store zones had the highest dwell time but the lowest conversion rates. That's a merchandising insight that previously required expensive mystery shopper programmes. The WiFi analytics platform surfaced it automatically. The secondary retail use case is personalised re-engagement. Once a guest has authenticated and consented, you have a known identity tied to a device. When they return to any store in your estate, you can trigger automated campaigns — a loyalty points reminder, a personalised offer based on their last purchase category, or a simple welcome-back message. The key technical requirement here is cross-venue identity resolution, which requires a centralised identity store rather than per-venue silos. Moving to hospitality. Hotels are arguably the most mature vertical for guest WiFi use cases. The baseline expectation is reliable, high-throughput connectivity in every room and public space. But the sophisticated operators are going further. They're using WiFi authentication as the digital front door — integrating the captive portal with their property management system so that a guest who checks in online is automatically recognised when they connect to WiFi, without having to re-enter credentials. That's a seamless experience that also gives the hotel a verified, consented digital identity for that guest. The wifi resort use case extends this further. A large resort property — think a holiday complex with multiple restaurants, a spa, a pool area, and a conference centre — can use location-based WiFi signals to understand where guests are spending time and trigger contextual offers. A guest who's been in the spa zone for 45 minutes might receive a push notification for a post-treatment dining offer. That's not magic — it's SSID zoning, dwell time thresholds, and a webhook into the marketing automation platform. For wifi bar and restaurant deployments, the primary use case is table turn analytics and loyalty capture. A busy bar group in a city centre can use WiFi probe data to understand average dwell times by day part, identify peak congestion periods, and feed that into staffing models. Simultaneously, the captive portal captures email addresses and consent, building a first-party database that powers re-engagement campaigns far more cost-effectively than paid social. Healthcare is a different beast from a compliance standpoint. Patient and visitor WiFi must be completely isolated from clinical networks — that's non-negotiable. VLAN segmentation with strict inter-VLAN routing policies, combined with a dedicated SSID for guest traffic, is the standard architecture. The use cases here are less commercial and more operational: patient wayfinding using WiFi-based indoor positioning, visitor engagement through digital information portals, and staff communication on non-clinical devices. GDPR and the Data Security and Protection Toolkit in the UK impose additional constraints on what data you can collect from patients, so the consent flow design is critical. Venues and events — stadiums, arenas, conference centres — present the most demanding technical challenge: high-density deployments where you might have 60,000 people in a 90-minute window, all trying to connect simultaneously. The architecture here requires careful RF planning, directional antennas, channel bonding, and load balancing across multiple access points per section. The wifi zoo use case is a good analogy for this kind of environment — a zoological garden with 5,000 visitors on a bank holiday weekend has similar density challenges to a stadium, just spread across a larger outdoor area with different RF propagation characteristics. The commercial opportunity in venues is significant. Sponsor activation through branded WiFi login pages, real-time crowd analytics for operations teams, and post-event re-engagement campaigns are all proven revenue streams. A Premier League football club using Purple's platform reported a 34% increase in email database growth year-on-year after deploying a GDPR-compliant captive portal across their stadium. Finally, transport. Train operators, airports, and bus networks have been offering passenger WiFi for years, but the analytics maturity is still catching up. The primary use case is passenger experience — reliable connectivity that keeps passengers engaged and reduces perceived journey time. But the data layer is increasingly valuable: understanding which routes have the highest WiFi engagement, correlating connectivity quality with passenger satisfaction scores, and using the authentication event as a trigger for journey-relevant communications. --- IMPLEMENTATION RECOMMENDATIONS AND PITFALLS — approximately 2 minutes Right, let's talk about what goes wrong — because the gap between a well-designed deployment and a problematic one is usually in the details. The most common pitfall is treating the captive portal as an afterthought. Your captive portal is your brand's digital handshake with every guest. A poorly designed portal — slow to load, confusing consent language, broken on certain device types — will result in low authentication rates and a degraded guest experience. Invest in the UX. Test it on iOS, Android, and Windows devices. Make the consent language plain English, not legal boilerplate. The second pitfall is GDPR non-compliance. If you're collecting email addresses and consent through a captive portal, you need a lawful basis for processing, a clear privacy notice, and a mechanism for guests to exercise their data rights. This isn't optional. A data protection audit of your guest WiFi deployment should be part of your annual compliance programme. Third: network segmentation failures. Guest traffic must never be able to reach your corporate network or POS systems. If you're in retail, PCI DSS compliance requires strict network segmentation. Validate your VLAN configuration with a penetration test, not just a configuration review. Fourth: scalability planning. If you're deploying at a venue that hosts occasional large events, your baseline infrastructure may not handle peak load. Design for your 95th percentile traffic scenario, not your average day. My recommendation: before you deploy, map your use cases to your data architecture. Know exactly what data you're capturing, where it's stored, how long it's retained, and how it flows into your downstream systems. That mapping exercise will surface compliance gaps and integration requirements before they become production incidents. --- RAPID-FIRE Q&A — approximately 1 minute Question: Do I need WPA3 for a guest network? Answer: Yes, for new deployments. WPA3-SAE provides stronger protection against offline dictionary attacks. Legacy devices that don't support WPA3 can be handled with a transition mode SSID. Question: How do I handle GDPR consent for returning visitors? Answer: Store consent records with a timestamp and version number. If your privacy policy changes, re-prompt for consent. Use a consent management platform that integrates with your WiFi portal. Question: What's a realistic ROI timeline for a guest WiFi analytics deployment? Answer: Most retail and hospitality operators see measurable ROI within 6 to 12 months, primarily through reduced cost of first-party data acquisition and improved campaign targeting efficiency. Question: Can I use guest WiFi data for AI-driven personalisation? Answer: Yes, but the data pipeline needs to be designed for it. You need clean, consented, structured identity data flowing into a platform that supports real-time segmentation and API-driven campaign triggers. --- SUMMARY AND NEXT STEPS — approximately 1 minute To wrap up: guest WiFi is no longer just a connectivity amenity. Across retail, hospitality, healthcare, venues, and transport, it's a first-party data acquisition channel, a customer intelligence platform, and increasingly, a direct revenue driver. The organisations getting the most value are the ones who've invested in the identity and analytics layer — not just the access points. They've designed GDPR-compliant consent flows, integrated their WiFi platform with their CRM and marketing automation stack, and built reporting that connects WiFi engagement data to commercial outcomes. If you're evaluating where to start, my recommendation is this: audit your existing guest WiFi deployment against three criteria. One: are you capturing consented first-party identities at a meaningful rate? Two: is your analytics platform giving you actionable insights, not just connection counts? Three: is your data architecture compliant and scalable? Purple's guest WiFi and analytics platform is designed to address all three. You can explore the platform at purple.ai, or speak to a solutions architect about a deployment assessment for your specific environment. Thanks for listening. Until next time.

header_image.png

Resumen Ejecutivo

Para las empresas modernas, proporcionar WiFi gratuito para invitados ya no es un centro de costes, es un canal crítico de adquisición de datos. Esta guía examina cómo los gerentes de TI, arquitectos de red y CTOs de los sectores minorista, hotelero, sanitario, de recintos y transporte están transformando la conectividad estándar en inteligencia empresarial accionable. Al implementar mecanismos de autenticación avanzados, una segmentación de red robusta y plataformas de análisis integradas, las organizaciones pueden capturar datos de primera parte con consentimiento, medir el tráfico peatonal físico e impulsar los ingresos a través de la reinteracción dirigida.

Este documento de referencia proporciona un análisis técnico en profundidad de la arquitectura necesaria para soportar estos casos de uso, desde los estándares 802.1X y WPA3 hasta el diseño de Captive Portal y el cumplimiento de GDPR. Describe estrategias de implementación neutrales respecto al proveedor y destaca cómo plataformas como Guest WiFi y WiFi Analytics de Purple se alinean directamente con los resultados comerciales. Ya sea que esté gestionando una implementación en un estadio de alta densidad o una red minorista distribuida, esta guía ofrece la orientación práctica y arquitectónica necesaria para optimizar su infraestructura inalámbrica.

Análisis Técnico en Profundidad

La brecha entre una implementación básica de WiFi gratuito y una plataforma de inteligencia de invitados completamente instrumentada es significativa. Una arquitectura robusta requiere una orquestación cuidadosa a través de tres capas principales: la capa de red, la capa de identidad y la capa de análisis.

Arquitectura de Red y Estándares de Seguridad

En la base, la capa de red debe proporcionar un rendimiento fiable manteniendo un aislamiento estricto. Las redes de invitados empresariales deben aprovechar WPA3-SAE (Simultaneous Authentication of Equals) para una mayor fortaleza criptográfica contra ataques de diccionario offline. Para entornos que requieren la aplicación de políticas por usuario, IEEE 802.1X con autenticación basada en RADIUS es el estándar. Sin embargo, para implementaciones orientadas al consumidor donde el aprovisionamiento de dispositivos es poco práctico, el Captive Portal sigue siendo el mecanismo principal para la captura de identidad y la aceptación de políticas.

La segmentación estricta de la red es innegociable. El tráfico de invitados debe aislarse en VLANs dedicadas, con políticas de enrutamiento entre VLANs aplicadas por firewalls con estado para evitar el movimiento lateral hacia entornos corporativos o de punto de venta (POS). Esto es particularmente crítico en el comercio minorista y la atención médica, donde el cumplimiento de PCI DSS y HIPAA/GDPR exige la protección de los datos de los titulares de tarjetas y de los pacientes.

guest_wifi_architecture_diagram.png

La Capa de Identidad y Análisis

El valor comercial de una red WiFi para invitados se captura en la capa de identidad. Un Captive Portal bien diseñado actúa como un motor de adquisición de datos, capturando identidades autenticadas (a través de correo electrónico, SMS o OAuth social) y registrando el consentimiento explícito para comunicaciones de marketing. Estos datos deben fluir sin problemas a la capa de análisis.

Plataformas como WiFi Analytics de Purple agregan eventos de conexión, datos de sondeo RSSI (Received Signal Strength Indicator) y perfiles autenticados. Esto permite la resolución de identidad entre recintos —permitiendo a un minorista reconocer a un cliente recurrente en diferentes ubicaciones de tiendas— y proporciona la base de datos para integraciones CRM automatizadas y campañas de marketing dirigidas. Además, Purple actúa como un proveedor de identidad gratuito para servicios como OpenRoaming bajo la licencia Connect, agilizando el proceso de autenticación para usuarios recurrentes.

Guía de Implementación: Casos de Uso por Industria

Diferentes verticales tienen requisitos y restricciones arquitectónicas distintas al implementar WiFi para invitados. A continuación, se presenta un análisis de cómo industrias específicas están aprovechando la infraestructura inalámbrica para impulsar el valor empresarial.

industry_use_cases_infographic.png

Comercio Minorista: Análisis de Tráfico Peatonal y Tiempo de Permanencia

En el sector minorista , el objetivo principal es comprender el comportamiento físico del cliente. Al capturar solicitudes de sondeo no autenticadas y datos de sesión autenticados, los minoristas pueden medir el tráfico peatonal, rastrear el tiempo de permanencia en zonas específicas de la tienda y analizar las tasas de conversión.

Estrategia de Implementación: Implementar puntos de acceso con radios de escaneo dedicadas para capturar solicitudes de sondeo pasivas. Integrar el Captive Portal con el CRM central para permitir la elaboración de perfiles progresiva. Cuando un cliente se autentica, el sistema debe activar un webhook a la plataforma de automatización de marketing, permitiendo campañas de reinteracción personalizadas basadas en su comportamiento en la tienda.

Hostelería: Conectividad Fluida y Engagement Contextual

Para entornos de hostelería , la conectividad fiable es la base. El caso de uso avanzado implica integrar el flujo de autenticación WiFi con el Sistema de Gestión de Propiedades (PMS).

Estrategia de Implementación: Configurar el Captive Portal para consultar el PMS a través de API. Cuando un huésped introduce su número de habitación y apellido, el sistema valida las credenciales y proporciona acceso durante la duración de su estancia. En un entorno de resort con WiFi, el análisis basado en la ubicación puede activar ofertas contextuales —por ejemplo, enviar una promoción de spa a un huésped que ha estado en la zona de la piscina durante un período prolongado.

Recintos y Eventos: Alta Densidad "Análisis de multitudes

Los estadios y centros de conferencias se enfrentan al desafío de una densidad de clientes extrema. Un despliegue de WiFi en un zoológico o parque temático comparte características similares, requiriendo una planificación RF cuidadosa para manejar conexiones concurrentes masivas.

Estrategia de Implementación: Utilice antenas direccionales y un balanceo de carga agresivo para gestionar la distribución de clientes entre los puntos de acceso. Implemente captive portals con la marca del patrocinador para generar ingresos publicitarios inmediatos. Después del evento, los datos de primera mano capturados (direcciones de correo electrónico y datos demográficos) se convierten en un activo crítico para futuras ventas de entradas y promociones de mercancía.

Sanidad: Segmentación de Grado de Cumplimiento

En Sanidad , el enfoque está en la eficiencia operativa y el estricto cumplimiento normativo. Las redes de invitados deben estar completamente segregadas de los sistemas clínicos.

Estrategia de Implementación: Implemente un estricto aislamiento de VLAN y filtrado de contenido web. El captive portal debe incluir flujos de consentimiento GDPR robustos, separando claramente la aceptación de los términos de servicio de las suscripciones de marketing, según lo exige el Data Security and Protection Toolkit. Los casos de uso incluyen la orientación de pacientes mediante mapas interiores y el acceso a recursos de salud digitales.

Transporte: Experiencia del Pasajero y Mapeo de Trayectos

Para el sector Transporte , el WiFi para invitados mejora la experiencia del pasajero al tiempo que genera valiosos datos de trayecto.

Estrategia de Implementación: Despliegue puntos de acceso móviles con backhaul celular (por ejemplo, routers SD-WAN) en trenes o autobuses. Para comprender la arquitectura de red necesaria para entornos distribuidos, revise Los beneficios clave de SD-WAN para empresas modernas . La plataforma de análisis puede correlacionar los datos de conexión con los sistemas de venta de billetes para mapear los flujos de pasajeros y optimizar la planificación de rutas.

Mejores Prácticas

Al diseñar y desplegar una solución de WiFi para invitados, los equipos de TI deben adherirse a los siguientes principios:

  1. Priorice la Experiencia de Usuario (UX) en el Portal: El captive portal es la puerta de entrada digital. Asegúrese de que sea responsivo, cargue rápidamente y funcione sin problemas en dispositivos iOS, Android y Windows. Para obtener orientación sobre el diseño del portal, consulte Cómo crear una página de inicio de sesión WiFi para invitados .
  2. Diseñe para la Escalabilidad: Diseñe la red para la capacidad máxima (el percentil 95), no para la carga promedio. Esto requiere estudios de sitio RF exhaustivos y planificación de capacidad, particularmente en entornos de alta densidad.
  3. Implemente una Gobernanza de Datos Robusta: Trate los datos de los invitados como un activo altamente sensible. Implemente políticas automatizadas de retención de datos, asegure mecanismos de consentimiento claros e integre una Plataforma de Gestión de Consentimientos (CMP) para manejar las solicitudes de acceso de los interesados (DSARs).
  4. Automatice las Integraciones: No deje los datos aislados en el controlador WiFi. Utilice APIs y webhooks para transmitir eventos de autenticación y datos de ubicación directamente a sus plataformas CRM y de marketing en tiempo real.

Resolución de Problemas y Mitigación de Riesgos

El despliegue de WiFi para invitados empresarial implica riesgos inherentes. Los modos de fallo más comunes y sus mitigaciones incluyen:

  • No Aparición del Captive Portal: Esto a menudo ocurre debido a una interceptación DNS agresiva o políticas estrictas de inspección HTTPS. Mitigación: Asegúrese de que la configuración de Walled Garden permita el acceso a los proveedores de identidad necesarios (por ejemplo, Google, Facebook) y al dominio de alojamiento del portal antes de que se complete la autenticación.
  • Fuga de VLAN: Los puertos de switch mal configurados pueden permitir que el tráfico de invitados atraviese las redes corporativas. Mitigación: Realice pruebas de penetración regulares y auditorías de configuración automatizadas para verificar el aislamiento de VLAN.
  • Aleatorización de MAC: Los sistemas operativos móviles modernos emplean la aleatorización de direcciones MAC para proteger la privacidad del usuario, lo que complica el seguimiento entre visitas. Mitigación: Cambie la dependencia de los identificadores a nivel de dispositivo (direcciones MAC) a identidades de usuario autenticadas capturadas a través del captive portal.

ROI e Impacto Empresarial

El retorno de la inversión (ROI) para un despliegue de WiFi para invitados debe medirse en dos ejes: ahorros operativos y generación de ingresos.

Operativamente, la autenticación automatizada (por ejemplo, la integración de PMS en hoteles) reduce los tickets de soporte relacionados con el acceso WiFi. Comercialmente, la plataforma actúa como una herramienta de generación de leads de alto volumen. Al calcular el Coste por Adquisición (CPA) de una dirección de correo electrónico a través de canales de marketing digital tradicionales frente al coste de capturarla a través del portal WiFi para invitados, las organizaciones suelen demostrar un ROI positivo en un plazo de 6 a 12 meses. Además, los conocimientos derivados del análisis de afluencia permiten tomar decisiones basadas en datos sobre los niveles de personal, la distribución de las tiendas y las negociaciones de arrendamiento, amplificando el impacto empresarial general.

Términos clave y definiciones

Captive Portal

A web page that a user of a public access network is obliged to view and interact with before access is granted. It is the primary mechanism for authentication and terms acceptance.

Critical for capturing first-party data and ensuring users agree to terms of service before consuming bandwidth.

WPA3-SAE

Wi-Fi Protected Access 3 with Simultaneous Authentication of Equals. A security standard that provides robust protection against offline dictionary attacks.

The recommended security standard for modern enterprise guest networks to ensure cryptographic integrity.

MAC Randomisation

A privacy feature in modern mobile operating systems that generates a temporary MAC address for each network connection.

Complicates tracking users based solely on device hardware identifiers, making authenticated captive portal logins essential for persistent tracking.

RSSI (Received Signal Strength Indicator)

A measurement of the power present in a received radio signal.

Used in WiFi analytics to estimate the distance of a device from an access point, enabling location-based services and dwell time calculations.

Walled Garden

A limited environment that controls the user's access to web content and services before they have fully authenticated.

Must be carefully configured to allow access to necessary identity providers (like Google or Facebook for social login) before the user is granted full internet access.

VLAN Segmentation

The practice of dividing a physical network into multiple logical networks to isolate traffic.

Essential for security and compliance, ensuring guest traffic cannot route to corporate or POS systems.

Cross-Venue Identity Resolution

The ability to recognise a returning user across different physical locations within the same brand or estate.

Enables retailers and hospitality groups to build a unified customer profile and trigger consistent marketing campaigns regardless of which location the guest visits.

Progressive Profiling

A method of gradually gathering information about a user across multiple interactions rather than asking for all data upfront.

Used in captive portals to improve conversion rates; a user might provide just an email on their first visit, and a phone number on their second.

Casos de éxito

A 200-room hotel needs to implement a guest WiFi solution that provides seamless connectivity while capturing first-party data for the marketing team, without increasing the burden on the front desk.

Deploy a WPA3-enabled network with a captive portal integrated directly into the hotel's Property Management System (PMS) via API. Configure the Walled Garden to allow access to the PMS authentication endpoint. When a guest connects, they enter their room number and surname. The portal queries the PMS; upon validation, the device's MAC address is whitelisted for the duration of the stay. Simultaneously, the portal presents a GDPR-compliant opt-in for marketing communications, syncing consented profiles directly to the hotel's CRM.

Notas de implementación: This approach eliminates the need for printed WiFi vouchers, reducing front desk friction. By tying network access to the PMS record, the hotel guarantees that only paying guests consume bandwidth, while automatically building a verified marketing database.

A national retail chain requires visibility into store conversion rates (footfall vs. transactions) and wants to trigger personalised offers to returning customers based on their previous visits.

Implement access points with dedicated scanning radios to capture passive probe requests for baseline footfall metrics. Deploy a centralised captive portal with social login (OAuth) to capture authenticated identities. Configure cross-venue identity resolution in the central analytics platform. Set up webhooks to trigger an event in the marketing automation platform whenever a known device connects, allowing for real-time, personalised email or SMS offers based on the customer's purchase history.

Notas de implementación: This solution bridges the gap between physical behaviour and digital identity. Relying solely on passive probe data is insufficient due to MAC randomisation; the captive portal is essential for establishing a persistent, cross-venue identity.

Análisis de escenarios

Q1. A hospital IT director wants to provide free WiFi to patients and visitors but is concerned about HIPAA/GDPR compliance and the security of clinical systems. What is the most critical architectural requirement?

💡 Sugerencia:Consider how network traffic is isolated at Layer 2 and Layer 3.

Mostrar enfoque recomendado

The most critical requirement is strict network segmentation. Guest traffic must be placed on a dedicated VLAN that is completely isolated from clinical networks. Inter-VLAN routing must be blocked by stateful firewall policies, ensuring that a compromised guest device cannot access patient records or medical equipment.

Q2. A retail marketing team complains that their WiFi analytics dashboard shows a high number of 'visitors' but very few actionable customer profiles. What technical limitation is likely causing this, and how should the IT team resolve it?

💡 Sugerencia:Think about how modern smartphones handle their hardware identifiers when scanning for networks.

Mostrar enfoque recomendado

The dashboard is likely relying on passive probe requests, which are subject to MAC address randomisation by modern mobile operating systems (iOS/Android). This inflates visitor counts with temporary MACs and prevents profile building. The IT team must implement a captive portal to force authentication, capturing a persistent identity (like an email address) rather than relying on hardware MAC addresses.

Q3. During a major sporting event, the stadium's guest WiFi network becomes unresponsive. The access points are online, but users cannot reach the captive portal to log in. What is the most likely configuration issue?

💡 Sugerencia:Consider the dependencies required for a device to resolve and load an external web page before authentication.

Mostrar enfoque recomendado

The most likely issue is an incorrectly configured Walled Garden or DNS interception failure. If the Walled Garden does not permit access to the DNS servers, the captive portal hosting domain, or the required external Identity Providers (e.g., Google/Facebook for social login), the device cannot load the portal page, resulting in a denial of service for new connections.