Guest WiFi

Most Relevant Content

  • Guest WiFi – How to Setup on MikroTik AP

    Guest WiFi helps to keep your network safe and secure. Any sensitive wireless network should have a guest network. So, Guest WiFi is so essential for an office network. In a corporate office, guests or visitors frequently come and get connected to get internet for a few times. It is so much security issue to keep guest or visitor in the core network because among them someone can damage important network resources. So, to keep them isolated from the core network, Guest WiFi network can be the best solution. What is Guest WiFi? Guest WiFi is a separate wireless network name or SSID created on the same WLAN interface. This SSID will have different security profile/password for wireless device connection. Besides this, the SSID can have different DHCP server to assign IP address to the wireless devices of the guest. It is always better to keep the Guest WiFi network separated from the core network for security purpose. How Guest WiFi Works Guest WiFi is a separate SSID, created on a physical WLAN interface, where guest or visitor can connect to get internet for a while. According to our choice, we can configure simple DHCP Server or Hotspot Server/Captive Portal. [...]

    READ MORE »

  • More Similar Content

  • »

    MikroTik Multiple SSID with Separate LAN and DHCP Server |   October 30, 2019

    One of the most amazing features of MikroTik Wireless Router is creating Multiple SSID (Virtual AP) on a physical wireless interface. So, creating a Guest WiFi AP with separate LAN block, SSID and DHCP Server is so easy using MikroTik WiFi AP Router. In the previous article, I discussed how to configure MikroTik WiFi Access Point on physical wireless interface with DHCP Server using hAP Lite (RB941-2nD) Wireless Router. In this article I will discuss how to configure a Virtual [...]

    READ MORE »

  • You May Also Like

  • »

    Hardening MikroTik RouterOS by Limiting Login Services |   February 6, 2021

    MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]

    READ MORE »

  • »

    How to Secure MikroTik RouterOS Login Users |   February 19, 2021

    MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.

    READ MORE »

  • »

    MikroTik VPN Configuration with Site-to-Site PPTP |   February 19, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network and using this VPN tunnel a private network user can send and receive data to any remote private network as if his/her network device was directly connected to that private network. MikroTik PPTP is a popular client-server VPN service that provides a secure and encrypted link across public network. MikroTik PPTP can be applied in two methods. Connecting remote workstation/client: In this [...]

    READ MORE »

  • »

    Securing MikroTik Router with Port Knocking |   March 21, 2021

    MikroTik Port Knocking strategy helps to protect MikroTik Router from hackers and unauthorized access as well as enhances MikroTik RouterOS security.

    READ MORE »

  • »

    Mikrotik Router Basic Configuration Using Winbox |   August 24, 2015

    MikroTik is one of the most popular routers. MikroTik Router has a lot of networking services that help to build a stable and smooth network so easily. It is said that any ISP Company or any Enterprise Office cannot go a single day without MikroTik Router. So, system administrators who are not using MikroTik Router yet, they will soon start using MikroTik Router, I think. As a system administrator, I am also using MikroTik Router about 5 years in my network [...]

    READ MORE »

  • »

    Getting Started with Red Hat Linux |   May 20, 2017

    Red Hat Linux is an open source server operating system.  Although open source Red Hat is a commercial Linux distribution. So, most of the Linux administrators use CentOS because CentOS is a free and open source, enterprise-class and community-supported  server platform as well as it is functionally compatible with Red Hat Enterprise Linux. In my previous article, I showed how to install CentOS 7 core packages in your server machine. Today I will introduce you with Red Hat Linux’s command [...]

    READ MORE »

  • »

    MikroTik Winbox 4: New, Fast and Simple RouterOS GUI |   September 16, 2024

    MikroTik Winbox 4 is a new era of MikroTik network management. Winbox 4 is a new, fast and simple RouterOS GUI. Winbox 4 has a modern and intuitive Graphical User Interface which is preferred and loved by the MikroTik network engineer to manage RouterOS. MikroTik Winbox 4 is now available for download and can be download for Windows, Linux and macOS. Winbox 4 has new features which was absent in previous Winbox version. In this article, we will see how [...]

    READ MORE »

  • »

    How to Block VPN Access with MikroTik Router |   May 14, 2019

    Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]

    READ MORE »