Guest WiFi

Most Relevant Content

  • Guest WiFi – How to Setup on MikroTik AP

    Guest WiFi helps to keep your network safe and secure. Any sensitive wireless network should have a guest network. So, Guest WiFi is so essential for an office network. In a corporate office, guests or visitors frequently come and get connected to get internet for a few times. It is so much security issue to keep guest or visitor in the core network because among them someone can damage important network resources. So, to keep them isolated from the core network, Guest WiFi network can be the best solution. What is Guest WiFi? Guest WiFi is a separate wireless network name or SSID created on the same WLAN interface. This SSID will have different security profile/password for wireless device connection. Besides this, the SSID can have different DHCP server to assign IP address to the wireless devices of the guest. It is always better to keep the Guest WiFi network separated from the core network for security purpose. How Guest WiFi Works Guest WiFi is a separate SSID, created on a physical WLAN interface, where guest or visitor can connect to get internet for a while. According to our choice, we can configure simple DHCP Server or Hotspot Server/Captive Portal. [...]

    READ MORE »

  • More Similar Content

  • »

    MikroTik Multiple SSID with Separate LAN and DHCP Server |   October 30, 2019

    One of the most amazing features of MikroTik Wireless Router is creating Multiple SSID (Virtual AP) on a physical wireless interface. So, creating a Guest WiFi AP with separate LAN block, SSID and DHCP Server is so easy using MikroTik WiFi AP Router. In the previous article, I discussed how to configure MikroTik WiFi Access Point on physical wireless interface with DHCP Server using hAP Lite (RB941-2nD) Wireless Router. In this article I will discuss how to configure a Virtual [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Port Forwarding using Winbox |   July 23, 2018

    MikroTik Port Forwarding or Port Mapping is a NAT application that is used to redirect a request from MikroTik IP address and port number combination to a local IP address and port number. For example, if you have a Web Server or FTP Server in your private/local area and want to access this local server from outside of your local area (from internet/public), you can apply MikroTik port forwarding or port mapping and can easily access your Web Server or [...]

    READ MORE »

  • »

    MikroTik Hotspot Auto Login by MAC Address |   July 1, 2020

    Hotspot is an awesome service in MikroTik Router. MikroTik Hotspot is popularly used in ISP, Hotel, Airport, Coffee Shop, Enterprise office and many other organizations. By default MikroTik Hotspot uses HTTP CHAP login method where user must provide username and password to get internet service. Sometimes we may face that some users are not eager to provide username and password to get internet service or we cannot ask some users to put username and password to get internet due to [...]

    READ MORE »

  • »

    MikroTik WiFi MAC Authentication with UserMan RADIUS Server |   December 23, 2019

    MikroTik Wireless Router is popularly used as WiFi AP. MikroTik WiFi AP has a lot of features to tune WiFi network as your requirements. MAC authentication is one the amazing and useful features in MikroTik WiFi. MAC authentication enables filtering MAC address that means no MAC can be able to connect to WiFi AP without authentication.  MAC authentication can be done either local database or RADIUS Server. MAC authentication with RADIUS Server provides facility to manage multiple APs from centralized [...]

    READ MORE »

  • »

    MikroTik RouterOS User Authentication via RADIUS Server |   November 19, 2017

    MikroTik RouterOS has a strong local user database that is enough to manage a single MikroTik RouterOS user. But if your network has more than one MikroTik Routers, it is always better to use a RADIUS server to manage RouterOS user centrally. MikroTik User Manager RADIUS Server is a centralized user authentication and accounting application that gives the ISP Company or network administrator ability to manage not only RouterOS users but also PPP, Hotspot, DHCP and Wireless users. How to [...]

    READ MORE »

  • »

    MikroTik RADIUS Server (User Manager) Installation |   October 28, 2017

    RADIUS Server is a centralized user authentication, authorization and accounting application. RADIUS authentication gives the ISP or network administrator ability to manage PPP users, login users and Hotspot users from one server throughout a large network. MikroTik RouterOS has a RADIUS client that is able to authenticate login users, Hotspot users and PPP users through a RADIUS server. MikroTik team also developed a totally separate RADIUS server package named User Manager that can be used to authenticate MikroTik users smoothly. [...]

    READ MORE »

  • »

    MikroTik EoIP Tunnel for Bridging LANs over the Internet |   April 22, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]

    READ MORE »

  • »

    CentOS 7.5 Installation with GUI and LVM Partition |   March 7, 2019

    Red Hat/CentOS Linux is a popular server operating system. Specially who work on mail server, web server, web proxy server, ftp server and file server are so familiar with the Red Hat/CentOS Linux. In my previous article, I discussed how to install CentOS 7.5 Linux step by step with the standard partition. But if you want to work on mail server, web proxy server, ftp server, file server or any other application where disk space changes frequently, the standard partitioning [...]

    READ MORE »

  • »

    Computer Network Topology Outline |   September 12, 2017

    The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]

    READ MORE »