Go Premium for a chance to win a PS4. Enter to Win


How do I prevent smartphones using my guest network

Posted on 2012-12-30
Medium Priority
Last Modified: 2013-01-01
I have two ssid for my wireless network running off a Cisco 2504. I have a business SSID and a guest SSID. How can i prevent smartphones from connecting to my guest SSID. I have the guest SSID secured with WEP and my business is WPA2. I dont want employees and guest using the guest SSID on their smartphones, but guest can use their tablets and laptops. I dont want VOIP on my wireless network?
Question by:miamitech305

Accepted Solution

jeffster earned 2000 total points
ID: 38731958
I don't think there's going to be an easy way to do that without being infinitely granular and blocking mac addresses.

It may be none of my business, but why would you care about smartphones using voip but not worry about tablets/laptops consuming your bandwidth with internet video?  VOIP typically uses less than 128kbps per connection stream while internet video can consume over 8mbps (8000kbps for perspective).
LVL 20

Expert Comment

ID: 38732613
Jeffster is right... it's not going to be possible without administrative pains.

You could potentially create a captive portal for guest, and regularly update the username/password. This will still be a pain as I'm sure you would have to update on a weekly or daily basis as users will share the guest credentials. Alternately, only enable the guest SSID while guests are onsite, but if you always have guests onsite this isn't much of an option.
LVL 10

Expert Comment

ID: 38733363
You could do it with MAC authentication with RADIUS but you would need to keep the computers that are authorized to your network up to date all the time.

Author Comment

ID: 38733830
Thank you, Im not worried movies because my firewall blocks that traffic.

Expert Comment

ID: 38734860
You know, you can always block VOIP traffic at the firewall too.....

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
This program is used to assist in finding and resolving common problems with wireless connections.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question