![]() Inspecting Guest WiFi and specially logging it, can be seen as a huge privacy invasion and might cause you problems in some jurisdictions. I for sure like WatchGuard firewalls, but they can not be the answer to all problems - specially not to legal problems. Monitor the traffic and you can boot (ban) devices that are problematic too. The AP that specially for Guest Wifi, and you can set a splash page with legal info if needed= agreeing with legal babble you set or even sign in with credentials ( room# ?). Pair it up with their APs, and setup main AP for the everyday stuff and only allow specified devices on that network via mac address. ![]() Watchguard firebox appliances are very good solution for content filtering and IP/ geo blocking too, and throttling bandwidth if needed help too. ![]() What is being used currently to secure the wifi? Specifically in this instance the ideal on premises solution would be a security gateway that is aware of application traffic and has the ability to block specific application categories - a good UTM appliance such as a WatchGuard can do this (and other things such as content filtering which should also be done). If the hotel will not deploy regulatory compliant guest WiFi, (if required by law) ensure that you get their signature that they refused, so you are not held liable, (in a worst case example). It's now your duty to ensure that compliant guest WiFi is understood by the hotel owners, and why they need it. This is a red strike against the hotel, next time the government will expect better compliance. Depending on your country's jurisdiction, the hotel may be required by law to deploy a regularity compliant Guest WiFi. Do not get tangled up in their incompetence.īe very careful not to address a regulatory compliance issue with a technical band aid. From what I hear, this Guest WiFi company does not know what they are doing. Today the issue is illegal torrent, tomorrow the issue is some other illegal activity. I agree with Do not misunderstand Guest WiFi. The manager called them on it and they didn't provide a solution. They have software that shows if the access points are connected but that's about it. They have someone providing the guest wifi which basically just connects to the ISP router. If you have no means to collect usable statistics on the current device, than it shouldn't be too difficult to collect them on an evaluation device. It's really important to know the basic statistics of YOUR network, if you want to right-size network appliances. And in some types of users, like hotels, the 'average user requirement' will also be changing during the day, probably be the highest in the evening. While school users will have a lot of multimedia traffic, a business will have a lot of web application traffic. And to make things worse, even that would have to be updated each year for different kinds of users. There is no standard, that would actually describe how much 'power' you need per user. I will never understand how they estimate these numbers. Sometimes it appears, as would one vendor claim the same throughput&performance is good enough for up to ten times more users than another vendor will claim. With firewalls that have no actual per user limitations, the 'recommended users' number is a really problematic parameter, when you compare across different vendors. While the manufacturers provide suggestions on how many users a device can handle, if you want the user experience to not suck, go larger if your budget permits Properly Sized is the operative part of this phrase. Kevinhughes2 wrote:Any properly sized firewall that supports application-based rules will do the trick.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |