ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    At office Wifi access

    Scheduled Pinned Locked Moved Self Promotion
    46 Posts 7 Posters 12.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender
      last edited by

      We currently don't allow staff to use the WiFi for personal devices (nor visitors). Our 10 Mb connection is just enough to handle our current workload, let alone all of the additional FB'ing etc that will happen if people were able to have their personal devices on the network.

      Today I was asked what the harm is in allowing them on the network.

      My response was that unless we setup an additional network that is completely and whole separate from our business network it would grant anyone who has access to our WiFi access to our internal systems, and any viruii they have, etc.

      I offered to investigate creating a separate network (VLAN) and some way to limit their bandwidth usage at the firewall so they don't cripple us.

      So I have a few questions for you fine folks.

      I know Ubiquity UAPs can support up to 4 SSIDs, and that they can dole out VLAN assignments based on those SSIDs, so separation at the WiFi layer seems pretty straight forward.

      I'm also running HP switches that all have Layer 3 support, they are all currently routing between the VLANs automatically. Clearly this can't be allowed. How would allow a switch to be part of the isolated VLAN (multiple switches actually) yet disable the routing between networks?

      I'm still running a SonicWall firewall. Though I'm considering a Peplink (because I'm considering a second internet line for redundancy).

      So I'll also need to setup the Sonicwall to either have the VLAN on the same port as the internal traffic, or split it out via the switch to another port on the Sonicwall.

      If/when I go to the Peplink or another device, I'll need to do the same.

      Thoughts?

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        My first thoughts are...

        • No need for two networks. Treat the employees as guests as far as anonymous public access is concerned.
        • Ubiquiti APs can do guest networking without need for complex VLANs. Consider just using that.
        DashrenderD JaredBuschJ 2 Replies Last reply Reply Quote 2
        • scottalanmillerS
          scottalanmiller
          last edited by

          VLANs are always separate. They are their own networks. Just don't create a route between networks and you have full isolation.

          DashrenderD 1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender @scottalanmiller
            last edited by

            @scottalanmiller said:

            VLANs are always separate. They are their own networks. Just don't create a route between networks and you have full isolation.

            I never created the route between the networks - the Switch did that on it's own, perhaps because I gave the switch an IP in both VLANs.

            1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @scottalanmiller
              last edited by

              @scottalanmiller said:

              My first thoughts are...

              • No need for two networks. Treat the employees as guests as far as anonymous public access is concerned.
              • Ubiquiti APs can do guest networking without need for complex VLANs. Consider just using that.

              How does using a Guest network protect my servers from users of the Guest network?

              JaredBuschJ 1 Reply Last reply Reply Quote 0
              • JaredBuschJ
                JaredBusch @scottalanmiller
                last edited by

                @scottalanmiller said:

                • Ubiquiti APs can do guest networking without need for complex VLANs. Consider just using that.

                Umm, no....

                Without a VLAN or completely separate AP not plugged into the core switch, the traffic is on the internal network.

                DashrenderD 1 Reply Last reply Reply Quote 0
                • DashrenderD
                  Dashrender @JaredBusch
                  last edited by Dashrender

                  @JaredBusch said:

                  @scottalanmiller said:

                  • Ubiquiti APs can do guest networking without need for complex VLANs. Consider just using that.

                  Umm, no....

                  Without a VLAN or completely separate AP not plugged into the core switch, the traffic is on the internal network.

                  Exactly, While Scott might have thought I am only giving access to employees, that wouldn't be my end goal. Even if it was though, I would not want the user's personal devices infecting my business network.

                  1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch @Dashrender
                    last edited by

                    @Dashrender said:

                    How does using a Guest network protect my servers from users of the Guest network?

                    It doesn't.

                    1 Reply Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch
                      last edited by JaredBusch

                      @scottalanmiller said:

                      • No need for two networks. Treat the employees as guests as far as anonymous public access is concerned.

                      Now this, I agree with. There is no reason for two networks. Employees with devices should still have no access to the local network. The caveat here is that you will likely need to allow the OWA connection to your mail server if it is internal. If that is not internal, then there is zero reason for any contact between the guest WiFi network and the LAN.

                      Just reread your post I don't see you mentioning two wireless networks other than a public one and the current private one.. So no idea what @scottalanmiller was getting at there? But the point is valid.

                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller
                        last edited by

                        Ubiquiti has a guest networking option that does isolation without VLANs. It's not as secure as a VLAN and requires that you use a different subnet for the guest network for it to be effective, but they do offer a VLAN-less guest network isolation feature where the AP blocks traffic to everything but the designated gateway, DNS and DHCP servers.

                        1 Reply Last reply Reply Quote 1
                        • scottalanmillerS
                          scottalanmiller
                          last edited by

                          From the Unifi AP FAQ:

                          I just want to provide free and simple guest access

                          Recommendation: In Wireless Configuration, enable "Apply Access Policies".

                          This turns on guest isolation and subnet restrictions (which can be customized in Settings->Guest Control), etc. - making sure guest cannot access your corporate network. If you choose Open for security, it's pretty much a connect-and-go, no guest portal, no "Terms of Use" or anything. UniFi controller doesn't even have to be running! You still have the option to choose WPA-Personal - just need to have a way to tell the guests the Passphrase.

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller
                            last edited by

                            http://wiki.ubnt.com/UniFi_FAQ#Guest_Access

                            1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender
                              last edited by

                              Interesting.

                              Though that would still be technically 2 networks, two different SSIDs.

                              OK I will look into that.

                              1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller
                                last edited by

                                I've not tried using the guest access system myself, but just basing the idea on their documentation.

                                1 Reply Last reply Reply Quote 0
                                • JaredBuschJ
                                  JaredBusch
                                  last edited by

                                  This method requires communication with the controller. The controller is handing out DHCP and such.

                                  You will still have to setup firewall rules and routing.
                                  On the router side, it is no different than a VLAN (because a VLAN is just a different subnet at the IP layer anyway).

                                  scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @JaredBusch
                                    last edited by

                                    @JaredBusch said:

                                    This method requires communication with the controller. The controller is handing out DHCP and such.

                                    You will still have to setup firewall rules and routing.
                                    On the router side, it is no different than a VLAN (because a VLAN is just a different subnet at the IP layer anyway).

                                    VLANs can be the same subnet. It's a bit different because one is hard isolation and the other is soft.

                                    So it's not as simple as they make it sound? That makes sense, although it seems like with logic in the bridge (AP) that they could have some serious isolation without the effort of VLANs.

                                    1 Reply Last reply Reply Quote 0
                                    • DashrenderD
                                      Dashrender @JaredBusch
                                      last edited by

                                      @JaredBusch said:

                                      This method requires communication with the controller. The controller is handing out DHCP and such.

                                      You will still have to setup firewall rules and routing.
                                      On the router side, it is no different than a VLAN (because a VLAN is just a different subnet at the IP layer anyway).

                                      Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @Dashrender
                                        last edited by

                                        @Dashrender said:

                                        Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.

                                        Often they do.

                                        DashrenderD 2 Replies Last reply Reply Quote 0
                                        • DashrenderD
                                          Dashrender @scottalanmiller
                                          last edited by Dashrender

                                          @scottalanmiller said:

                                          @Dashrender said:

                                          Agreed - looks like UNBT is just setting up VLANing inside the APs, but otherwise just using the standard network fabric - of course you either have to have two interfaces on the router/firewall one for each IP range, unless the router/firewall supports multiple IPs non VLAN'ed on a single interface.

                                          Often they do.

                                          because of routing on a stick?

                                          I guess I've never seen someone try to route on a stick that wasn't using VLAN, but I suppose there is no reason you couldn't. The main bad thing about this, is if either side can change their IP to the other network, they would gain full access to that network.

                                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                                          • stacksofplatesS
                                            stacksofplates
                                            last edited by

                                            Capture.PNG

                                            Here's how we have it set up. I've removed other info, but just select the Guest Policy and it limits the devices on the Guest SSID to only interwebs traffic. They do have more advanced options under the Guest Control section.

                                            1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post