12-26-2023 11:18 AM
Hello everyone! We are currently using [WPA2][PSK][AES] for guest internet access at our place of business. Does anyone have any suggestions for a more secure encryption method for guest access? And something that doesn't required a ton of administration.
12-26-2023 11:24 AM - edited 12-26-2023 11:27 AM
Hello @kleemisch
WPA3 is the latest and more secure Wi-Fi security protocol, providing enhanced protection compared to WPA2. Additionally, a captive portal allows you to implement a simple authentication process for guests without requiring a PSK.
Implement a captive portal to manage guest access. This way, guests can connect to the Wi-Fi network without entering a pre-shared key. Instead, they will be redirected to a login page where they can enter credentials or accept terms and conditions.
12-26-2023 11:26 AM
Most use case one time setup for Guest network and forget it as long as it working as expected, and some monitoring and planning ( IP address and performance )
check the best guide :
Note : if you are using ISE then your get more visibility.
Its all depends on maintenance free, how you like guest to authenticated portal or pre-defined methods.
12-26-2023 11:41 AM
Employees at our place of business use the guest wireless to connect their cell phones. Would they have to go to the portal each day when they connect for the first time?
12-26-2023 11:54 AM
As i mentioned there are different method you can deploy.
All employees only connect (or any 3rd party also connect)
If only employee connect - then i use single registration using their offcial email ID with device.
If 3rd party BYOD like guest, you can just display terms and policy accept and allow users to connect certain period only.
12-26-2023 11:46 AM
What the key management you use?
MHM
12-26-2023 11:25 PM
To deploy a more secure/robust guest access the only option nowadays is to configure WPA3 Transition mode with Transition Disable, as there could be (and there are) lots of devices not supporting WPA3 to date becuase (1) they don't support SHA256 AKM or (2) the lack of support for 802.11w-PMF).
A more secure Guest access is that with a rotating PSK, this way you avoid outsiders who know the PSK to connect. This can be done with a simple Python script using random characters or predefined strings from a list, and autogenerate a QR code to be scanned for connectivity easyness.
Lastly, and very important if you are in the EU, is that you need to log user connectivity to be GDPR compliant, not all activity, but only the MAC address and/or valid email from those guests that use the guest access (the rest of information such as phone number would be personal information and that cannot be collected). This can be done with any Captive Portal solution, which does not provide a more secure access, but provides you with valid information to look at in case of any suspicious activity, or in case authorities request that. You can configure authorization for extended periods to all guests so they don't have to register every time, or use sponsor portals to grant semi-permanent or permanent periods to specific MAC addresses.
12-28-2023 08:13 PM
Use WPA3 OWE for devices that support it. 1/3 of our guest devices support it. No PSK needed and more secure than a shared PSK.
01-04-2024 10:50 AM
> more secure than a shared PSK
No. It's more secure than an open SSID with no encryption but it is not more secure than a PSK. But it solves the requirement for encryption on open networks.
https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/217737-configure-enhanced-open-ssid-with-transi.html#toc-hId--970008306
12-28-2023 10:28 PM
My advice is not to keep a SSID full open (not even by using OWE unless this is a pure guest SSID) as this way you invite all users out there to freely connect so 1) their devices increase channel and AP utilization a lot, which 2) impact performance on legit corporate users due to the increase in contention, 3) may exhaust your WAN BW (this is not recommended to use quotas as this way QoE from legit corporate users sharing the same channel also decreases) and 4) if your perimetral security is not properly filtering all unwanted traffic, this may serve as a door to commit illegal activities using your brand.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide