I am a server administrator of a company that offers wired and wireless network/Internet services to various guests...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
of a hotel. I can detect connected laptops, but wireless handheld devices and tablets are not displayed. How can I detect mobile devices on the network, or is there a better way?
It sounds like you’re trying to run your wireless guest network like it’s a typical enterprise network. It’s important to understand that it’s not. Guest networks are a completely different animal from corporate networks, and have different security concerns. In an enterprise, your security efforts are focused on protecting all of the devices connected to your network from each other and the sensitive information stored on your network from those users. You have to balance your security controls with the need for systems to communicate with each other directly. However, this is mitigated by the fact that all of the users on your network are trusted, at least to some extent.
In the case of a guest network, you have a different challenge: isolating guests from each other so they cannot cause each other damage. There is probably no reason to allow guests to communicate with each other directly. There’s also no sensitive information on the network that your company needs to protect. (This is true, right? Your guest network should be completely segregated from your corporate network; if it's not, then that's an entirely different problem).
So, instead of trying to apply enterprise management tools to your guest network for detecting mobile devices, consider using one of the many products designed expressly for this purpose. You’ve certainly seen the popular captive Web portals used on many public networks. These systems route users who connect to the guest network to a registration page that requires consent to the terms of service, registration and payment of a fee (if applicable). Only after passing through this portal do users gain the Internet access they desire. At the same time, the portal collects information about the devices on your network that you can analyze to gain insight into their characteristics. This sounds like the right answer to your problem.
Dig Deeper on Wireless LAN Design and Setup
Related Q&A from Mike Chapple
The PCI SSC extended the deadline for organizations to update TLS encryption standards before announcing PCI DSS 3.2. Expert Mike Chapple examines ...continue reading
Biometric security systems come with many advantages, but do they also come with many regulations? Expert Mike Chapple discusses biometric ...continue reading
A recent FTC lawsuit against Wyndham Hotels highlighted concerns for enterprises that have suffered a data breach. Expert Mike Chapple discusses the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.