Can I set up WiFi just for Internet?

Posted on 2011-05-05
Last Modified: 2012-05-11
    I was reading this online poll where it asked people whether they run an open WiFi network. One respondent replied he does, but "my wifi is on a separate subnet, and only has access to the internet, not any of the machines in the house."
     Is it possible to do that? If so, how exactly (does it require anything more than just going into the wireless router settings)?
Question by:john8217
    LVL 17

    Accepted Solution

    What you could do is this (for example). Have your router set up with the following:-

    Subnet Mask:

    Set up DHCP to hand out IPs in the range - with a Subnet mask of and a default gateway of

    Your home PCs could be on and IP from - with a subnet mask of and a gateway of

    Alternatively, if your router is sophisticated enough, yuo could look at VLANs
    LVL 2

    Assisted Solution

    Most of the time it is the router that has these features.  VLANs are one way, but some routers have the ability to treat each wireless user as a single standalone entity - it can see nothing other that going out through the internet, which is what you're probably describing, it's a private mode, quite often - Cisco wireless access points have this feature, such as 1250 series, but I doubt you have a Cisco router.  There are other ways to achieve this too, such as creating multiple SSIDs, each user logs into a wireless router with their own SSID and therfore can see no-one else.  Another way is to have different subnets, but this is somewhat more tricky since it all has to be configured corectly, if not some can "see" other PC's on the network, whereas others cannot "see" them!  All depends (often) on the router you have.  The user you are describing seems to have a wired network and a wireless network: the wireless cannot "see" the wired network and vice-versa, since they are on seperate subnets, which is probably done via the routers ability to allow separate subnets (not all routers have this feature).

    Author Closing Comment


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now