reliable hotspot while providing maximum convenience for your users.
Technical tips: - Do not use an open Wi-Fi:
- Always protect your network by means of access control, e.g. by using a professional hotspot solution. If you go without, you risk unauthorized access to your network and losing control over it.
- Professional hotspot solution:
- Use a professional hotspot solution that offers various possibilities to authenticate with proper access credentials. For example, the LANCOM Public Spot option provides web-based user authentication, so you can be sure that only your guests are able to login to your Wi-Fi with the access credentials that you issue to them.
- Use reliable equipment:
- When operating a hotspot, you should expect the radio field to be under heavy load especially at peak times. Your hardware should be able to withstand this load.
- Avoid purchasing low-priced equipment and instead rely on quality products that can deliver high bandwidths, handle high client densities, and offer a great user experience thanks to optimized Wi-Fi.
- Issuing access credentials:
- Make sure that issuing access credentials for your employees and guests is as easy and flexible as possible. For example, by printing out vouchers, by requiring then to accept the terms and conditions of use, or by registering themselves via e-mail or SMS.
- Separate subnets (guests, administration and service):
- The different subnets each need their own SSID (e.g. for the guest network, the administration network, the restaurant network, etc.).
- Current standards require all of the SSIDs to be encrypted with WPA2, with the exception of the guest network. This is generally unencrypted, since guest authentication is performed via a web-based interface. Consequently, only guests with access credentials are able to log in. To maximize security, the SSID of the guest network can be additionally encrypted with WPA2.
- It is important that you also separate the subnets at the network level. There are a number of options for doing this. Your IT system vendor can advise you on this matter and implement network separation accordingly.
- For information about configuring separate subnets, see
|