Wireless Guest Services
This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This chapter sheds some light on various methods of providing a guest wireless network. The main difference between pure guests and trusted third parties is how the network allows access and if some guests will be required to pay for their access or not. This chapter explores a few methods that have been used to address these problems. Most guest networks are sponsored, self-service, or completely open. There are many reasons for setting up a guest wireless network one way or another. In reference to security the guest network in a high-security environment might be a protected encrypted network requiring privileged information to be provided before allowing the user to access the network. Manual registration is the ultimate speed bump when it comes to guest Wi-Fi. This can help really limit who gets access to the guest network. This may prove especially valuable in deterring employees from using their personal devices on the guest network. |
---|---|
DOI: | 10.1201/b16580-5 |