Results 1 to 6 of 6

Thread: Hotspot security for AP isolation

  1. #1
    Join Date
    Oct 2010
    Posts
    49

    Hotspot security for AP isolation

    I am looking to structure a WIFI hotspot and I was just wondering what insinuations the security setup would pretense: Wireless access component configured with AP isolation but no encryption. Redirect all transfer to a web page so that access to the web, or something else would need a suitable username and password. If I have AP isolation, and user verification, do I actually require WIFI encryption? What safety threat would be there? Does AP isolation defend next to suitable genuine users setting up an Address Resolution Protocol (ARP) spoof and packet sniffer? It would be pleasant so that users would not have to primary join the WIFI network with a network key, and after that have to validate on the webpage. Is there such too way to organize incredible like that? Essentially, I am finding for customers to join the network, type their username and password and be off. I don't require them to have entered a network key first, and after that enter their username and password to be off and surfing.

  2. #2
    Join Date
    Jul 2009
    Posts
    1,179

    Re: Hotspot security for AP isolation

    You can attempt the AeONsafe AP. It has been fine organized in Silicon Valley for hotspot networks. The AP has for each sta WPA feature, which permits each customer or each client to setup his own WPA security, in its place of a shared key. It as well comes with a wireless firewall feature, which does not permit Wi-Fi users to access LAN devices. It has a redirect web portal as well.

  3. #3
    Join Date
    Jul 2009
    Posts
    1,118

    Re: Hotspot security for AP isolation

    I have had to execute a wireless hotspot in my friend’s place some month earlier than I intended. Obviously, this has not permitted me the time to learn up on the security of the hotspot. The tool I am utilizing is:
    • AP's are COLUBRIS CN3200 with cn320 for repeaters switches are dell power connects 2724's that are handled router is DrayTek 2950.
    [*]Access necessary is:

    1. Protected encrypted access for friend place LAN. Simply executed with MAC & WPA, this goes to VLAN1 which permits access to the friend place private LAN and internet.
    2. Guest access to only the internet. Another time, it is simply executed using DHCP and an https logon with no MAC or WEP or WPA encryption. This goes to VLAN2 which simply lets access to the internet.

  4. #4
    Join Date
    May 2009
    Posts
    1,084

    Re: Hotspot security for AP isolation

    I am not familiar with switches but quite superior or pretty superior sufficient. A few ideas please note that protection cannot be unspecified and wants to be experienced.
    1. You don't emerge to have a Radius server. As a result there machines are utilizing a shared WPA-PSK key. The trouble with shared keys is that they are simply leaked and recovered from the client machines. If you don't have physical security, or expect it may be leaking the key, I recommend you implement a Radius server. This will transport a inimitable, one time, per session encryption key, in its place of the general shared key.
    2. MAC address filtering is a misuse of time. MAC address is not encrypted and can consequently be inhaled. It does not obtain a lot work to take out a suitable MAC address and utilize it.

  5. #5
    Join Date
    Nov 2009
    Posts
    955

    Re: Hotspot security for AP isolation

    I advise you install a few method of SNMP traffic monitoring, almost certainly at the router and the switches. By means of MRTG or RRD Tool, you will get graphs which will give you a few hints as to what normal traffic seems like. While something goes incorrect, you can frequently tell where and when something distorted. You require this because not anything you talked about is appropriate for mistreatment recognition or alleviation.

  6. #6
    Join Date
    Nov 2009
    Posts
    857

    Re: Hotspot security for AP isolation

    The previous time someone inquired me regarding wireless security, I rejoined that they in reality should be anxious regarding wired and physical security. They had purchased the top wireless hardware but had left live Ethernet ports all over the position, with no NAC (network access control) security or MS NAP (network access protection). I left the ports exist, but execute NAC. Does they have any client accessible open Ethernet ports?

Similar Threads

  1. Security Circus by Linux On GUI isolation
    By Ramiah in forum Operating Systems
    Replies: 9
    Last Post: 01-12-2011, 09:02 PM
  2. How Client Isolation or AP isolation work
    By arjun rantu in forum Networking & Security
    Replies: 4
    Last Post: 23-11-2010, 12:19 AM
  3. Hotspot wifi surfing and security
    By Abhibhava in forum Technology & Internet
    Replies: 5
    Last Post: 20-01-2010, 12:48 AM
  4. Torris isolation
    By strangist in forum Overclocking & Computer Modification
    Replies: 3
    Last Post: 01-12-2008, 04:45 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,887,044.19544 seconds with 16 queries