Not so much the technical details, but the policy from more of an HR standpoint.<\/p>\n
Example: We have 2 networks. Guest, and domain-connected.<\/p>\n
We let anyone who’s an employee connect their phone to the domain wifi.<\/p>\n<\/li>\n
Guests connect to guest only (posted around the building) and have to login through a portal where they (don’t) read a thing and click OK. 24 hour expiration, or as soon as they disconnect, must re-click OK.<\/p>\n<\/li>\n
Personal laptops cannot connect to domain wifi, but I know they do it.<\/p>\n<\/li>\n<\/ol>\n
Basically, I want to make it easier for guests to get connected and stay that way, and for us to block cell phones and personal laptops since our business doesn’t need anyone to have domain access to either of those ever.<\/p>","upvoteCount":34,"answerCount":49,"datePublished":"2019-03-06T19:44:42.000Z","author":{"@type":"Person","name":"matth1312","url":"https://community.spiceworks.com/u/matth1312"},"suggestedAnswer":[{"@type":"Answer","text":"
Not so much the technical details, but the policy from more of an HR standpoint.<\/p>\n
Example: We have 2 networks. Guest, and domain-connected.<\/p>\n
We let anyone who’s an employee connect their phone to the domain wifi.<\/p>\n<\/li>\n
Guests connect to guest only (posted around the building) and have to login through a portal where they (don’t) read a thing and click OK. 24 hour expiration, or as soon as they disconnect, must re-click OK.<\/p>\n<\/li>\n
Personal laptops cannot connect to domain wifi, but I know they do it.<\/p>\n<\/li>\n<\/ol>\n
Basically, I want to make it easier for guests to get connected and stay that way, and for us to block cell phones and personal laptops since our business doesn’t need anyone to have domain access to either of those ever.<\/p>","upvoteCount":34,"datePublished":"2019-03-06T19:44:42.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/1","author":{"@type":"Person","name":"matth1312","url":"https://community.spiceworks.com/u/matth1312"}},{"@type":"Answer","text":"
We have 3 SSIDs on two different networks.<\/p>\n
EDIT: I should clarify that our guest wifi is a regular wifi network, not one of the builtin “guest services” one like Captain Hotsauce talks about below.<\/p>","upvoteCount":8,"datePublished":"2019-03-06T20:20:21.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/2","author":{"@type":"Person","name":"big-green-man","url":"https://community.spiceworks.com/u/big-green-man"}},{"@type":"Answer","text":"
Verify your guest network is on a separate VLAN from your corporate network and ditch the guest services, then your guests just need the SSID and password. For the corporate you could set up MAC filtering and/or change the SSID/password and hide it. Check with HR to verify you don’t need the guest services (portal) for any reason before you turn it off, and MAC filtering/hiding the SSID will be a pain if you have a large user base as IT will need to touch all devices individually, but that will accomplish your stated purpose. Letting personal laptops connect to the corporate domain is wildly irresponsible, if you have any juice with the decision makers I’d start there personally.<\/p>","upvoteCount":8,"datePublished":"2019-03-06T20:54:13.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/3","author":{"@type":"Person","name":"conormcgrath","url":"https://community.spiceworks.com/u/conormcgrath"}},{"@type":"Answer","text":"
We have 2 SSIDs<\/p>\n
Corporate with WPA-Enterprise. Only domain joined PCs that are also in a specific security group are able to connect to this. We went with authenticated domain computers instead of users because we didn’t want employees being able to connect a personal device to the corp wifi with their user credentials.<\/p>\n<\/li>\n
Guest network that is open for anyone to connect to, VLAN’d out to a separate Internet connection. Security is also set where devices cannot talk to each other on this network, only the gateway.<\/p>\n<\/li>\n<\/ul>\n
Tx power on the APs is set lower to limit the signal to inside buildings. Also, the SSIDs are on a schedule, so it’s not available 24/7, just during business hours.<\/p>","upvoteCount":11,"datePublished":"2019-03-06T21:00:29.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/4","author":{"@type":"Person","name":"davidgpaul","url":"https://community.spiceworks.com/u/davidgpaul"}},{"@type":"Answer","text":"
We have a small office, 3 SSIDs and 2 networks.<\/p>\n
Corporate wi-fi.Same access as hardwired workstations. Employees connect with their AD credentials.<\/p>\n<\/li>\n
IOT network - separate VLAN from the corporate network. Devices on this network can talk to each other and the public internet. We’re using it for wall mounted TV’s, chromecasting, etc. IT provides this password as needed.<\/p>\n<\/li>\n
Guest network - same VLAN as IOT. Restricted to public internet access only. Devices on this network can’t see other devices on the network. Password is posted in the office. Most employees connect their personal devices to the guest network.<\/p>\n<\/li>\n<\/ol>","upvoteCount":3,"datePublished":"2019-03-06T21:03:02.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/5","author":{"@type":"Person","name":"chriscage","url":"https://community.spiceworks.com/u/chriscage"}},{"@type":"Answer","text":"
Guest only on a separate VLAN, internet only. Mostly used by all of us connecting our phones to it.<\/p>","upvoteCount":3,"datePublished":"2019-03-06T21:29:31.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/6","author":{"@type":"Person","name":"bryandoe","url":"https://community.spiceworks.com/u/bryandoe"}},{"@type":"Answer","text":"
We actually just changed this on Monday. It used to be one corporate wifi and one guest (unsecured, accept policy). Employees were allowed to use corporate wifi for personal devices. Now we changed the password and only set it up on devices with a valid reason to be on our network. Everyone else can use guest<\/p>","upvoteCount":3,"datePublished":"2019-03-06T21:55:21.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/7","author":{"@type":"Person","name":"matt2257","url":"https://community.spiceworks.com/u/matt2257"}},{"@type":"Answer","text":"
3 Separate SSIDs<\/p>\n
Corporate wifi authorized through AD radius server own unique vlan that has access to normal resources<\/p>\n<\/li>\n
Guest wifi own Vlan public internet only<\/p>\n<\/li>\n
IOT same as guest vlan but no splash screen when connecting.<\/p>\n<\/li>\n<\/ol>","upvoteCount":0,"datePublished":"2019-03-06T23:01:44.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/8","author":{"@type":"Person","name":"benyuan","url":"https://community.spiceworks.com/u/benyuan"}},{"@type":"Answer","text":"
At least three SSIDs on three separate VLANS:<\/p>\n
We had 3 networks: one for company phones and laptops, one for production equipment and also a guest network. We used a central controller for all our sites. We installed certificates on company laptops and phones that would allow the device to automatically connect no matter what site you at. The production network was strictly for vehicle mounted devices and was hidden. We added a guest network that went to the Internet. To access it I or the service desk had to create a temporary account on the central controller. We would collect name, business name, email and reason for access. They would also have to go through the portal and accept terms and conditions. We could set the account to expire anywhere from 1 hour to 30 days. Using this method guests, usually vendors or contractors, can bypass our filters that blocked some of their sites. Employees were not allowed to connect any personal device to any network, period. Only corporate equipment could get on to access any corporate resource. I liked the way it worked, I could let vendors or contractors have their Internet for a limited time and didn’t have to worry about any rogue devices connecting.<\/p>","upvoteCount":2,"datePublished":"2019-03-07T00:18:58.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/10","author":{"@type":"Person","name":"it-bags","url":"https://community.spiceworks.com/u/it-bags"}},{"@type":"Answer","text":"
Guest wifi sits on a separate VLAN and connects to it’s own Edge Router that connects to a cable modem. No password needed. Connections bandwidth limited to 1Mbps. Edge hands out DHCP and translates all DNS queries to OpenDNS. Porn is blocked. All non-company devices connect to this.<\/p>\n
The secure wifi bridges to the LAN. Password known only to IT; never given out. Period. Our servers provide DHCP and DNS. No employee personal devices on this network. Period.<\/p>","upvoteCount":4,"datePublished":"2019-03-07T00:56:29.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/11","author":{"@type":"Person","name":"Robert5205","url":"https://community.spiceworks.com/u/Robert5205"}},{"@type":"Answer","text":"
I guess my question would be, why have an ‘open’ SSID that directly connects into your internal network? And when I say ‘open’ I mean that because if staff knows the password, they are using it for personal devices or giving it away to others to use.<\/p>\n
Most organizations I work with have a few SSIDs within their environments, and this is backed up by the replies in this thread as well.<\/p>\n
One SSID for Guest access, this should be straight internet and could be gated with a T&C language or just open, depending on the organization. This is usually on a separate VLAN or even a separate connection itself, depending on the environment that doesn’t even touch or connect to at all any internal resources. Usually this SSID is pretty locked down regarding adult content, P2P or other various suspicious activities. It is also usually throttled pretty heavily to let guests check email and social media but not stream 4K HD videos or the like.<\/p>\n<\/li>\n
Staff SSID: This usually is throttled as well, but not nearly as much as the guest network. It usually is on a separate VLAN that has a few routes to internal resources like email or an internal website. Depending on the organization, there could be access to file servers and such, but usually there isn’t.<\/p>\n<\/li>\n
Domain SSID: This is a very much locked down and (usually) hidden SSID where IT is the only one that knows the password and logs in directly to any organizational devices that need domain access.<\/p>\n<\/li>\n<\/ol>\n
Those are the main 3 that I always see…there are a few others depending on the organization and policies within it.<\/p>\n
Regarding the first question, I don’t recommend completely removing the T&C from guest SSID, it is a CYA measure that you can use if you find anyone using wifi for malicious purposes. Regarding the guest connection challenges, there should be some settings on your WAP controllers that allow you to adjust the timeout for a session. 24 hours is a good number.<\/p>\n
About the second question, set up a Staff SSID where you have a route to email but nothing else internal and give folks that password. There is no reason that you have an ‘open’ SSID straight into your domain that folks outside IT knows…<\/p>\n
Hope this helps!<\/p>","upvoteCount":2,"datePublished":"2019-03-07T04:02:40.000Z","url":"https://community.spiceworks.com/t/what-is-your-wifi-policy-for-users-guests-phones/700895/12","author":{"@type":"Person","name":"darren-for-cdw","url":"https://community.spiceworks.com/u/darren-for-cdw"}},{"@type":"Answer","text":"