Devices that are commonly used in guest networks that force users to a captive portal (web page) to perform a set of actions that may eventually result in access to the network. Until access control is granted to guest users, all traffic is usually completely restricted to only the access control gateway itself. While these devices may perform many different functions, they are referred to in this book as the device that performs at least this basic function.