Whats the actual spec? # of client per router/wifi

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

mammador

Platinum Member
Dec 9, 2010
2,128
1
76
I know we're getting way off topic here, but if you think you'll be able to keep smart phones, tablets, non IS equipment off your wireless the business is going to over ride it. Bring your own device (BYOD) is coming, whether you want it or not.

Better to embrace it or get ready for it now instead of having to slam something in without planning.

Hiding the SSID? That will be found out and employees will all share it so they can get their phones on the wireless.

Using enterprise WPA2 with radius authentication? Employees will just use their credentials on their smart phone/tablet.

Using a pre-shared key? That WILL get found out and distributed no matter how much you try to keep it secret.

This also gets back to wireless capacity and performance planning, you're going to have to get used to the fact that you're going to have all these piss poor radios on wireless and design for the worst case device (a phone or tablet).

But the issue here is finding enough APs to accommodate all the wifi hosts. If it's all for business operations, fine, but for personal use it's not needed. Most firms generally complement wired with wireless, or even use wired as primary with wireless as a back-up. The OP hasn't said if it's policy/the norm in his firm to use wifi nodes primarily.

A company's ICT resources should really be used chiefly for business operations, not for employees who want to surf the Web to check out sport results/Facebook or to e-mail his gf. If he wants to do that, use the wired work connection.
 

imagoon

Diamond Member
Feb 19, 2003
5,199
0
0
The only surefire way is MAC white lists.

And that can still be gamed, but it's usually beyond the skills of most users.

No the only sure fire way is certificate based connectivity. MAC address white listing adds nothing but an administrative nightmare.

Push out a workstation certificate and let RADIUS with WPA2-Enterprise handle it. End user devices wont have the certs and won't be able to connect even with user domain credentials.

All it takes is one semi savvy user to figure out how to change his/her mac address and it spreads like wildfire (just like the passwords.) The savvy use often will "just do it" for people. Nearly every IT guy has had to deal with "that guy" that seems hellbent on getting around all IT policy.
 

TerryMathews

Lifer
Oct 9, 1999
11,473
2
0
No the only sure fire way is certificate based connectivity. MAC address white listing adds nothing but an administrative nightmare.

Push out a workstation certificate and let RADIUS with WPA2-Enterprise handle it. End user devices wont have the certs and won't be able to connect even with user domain credentials.

All it takes is one semi savvy user to figure out how to change his/her mac address and it spreads like wildfire (just like the passwords.) The savvy use often will "just do it" for people. Nearly every IT guy has had to deal with "that guy" that seems hellbent on getting around all IT policy.

True but to prevent collision they will have to turn off their official device.
 

Paperlantern

Platinum Member
Apr 26, 2003
2,239
6
81
No the only sure fire way is certificate based connectivity. MAC address white listing adds nothing but an administrative nightmare.

Push out a workstation certificate and let RADIUS with WPA2-Enterprise handle it. End user devices wont have the certs and won't be able to connect even with user domain credentials.

All it takes is one semi savvy user to figure out how to change his/her mac address and it spreads like wildfire (just like the passwords.) The savvy use often will "just do it" for people. Nearly every IT guy has had to deal with "that guy" that seems hellbent on getting around all IT policy.

If IT is dealing with the guy hellbent on getting around policies then there is confusion in who's job is what. If I deal with a user that keeps breaking the rules I report him to HR, he gets a warning to comply. If he continues, he's fired for violating the usage policy he signed when he was hired, it's not my job to slap hands. It's HR's. Or upper management if the company is small enough to not have an actual HR department of sorts.

I'm not saying it doesn't happen, I'm sure there are plenty of situations hat arise everyday in workplaces where IT fights with a user, I'm just saying the IT dept has better things to do and discipline is best left to upper mgmt or HR.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
From experience. One its out there, folks will be joining your wireless with BYOD and the business will over rule is and hr. Both departments will be viewed as an obstacle and will be told to get in line. Along with security. The business will tell you to make it happen, you cannot resist it.

It's coming. Best be ready.
 
Last edited:

imagoon

Diamond Member
Feb 19, 2003
5,199
0
0
If IT is dealing with the guy hellbent on getting around policies then there is confusion in who's job is what. If I deal with a user that keeps breaking the rules I report him to HR, he gets a warning to comply. If he continues, he's fired for violating the usage policy he signed when he was hired, it's not my job to slap hands. It's HR's. Or upper management if the company is small enough to not have an actual HR department of sorts.

I'm not saying it doesn't happen, I'm sure there are plenty of situations hat arise everyday in workplaces where IT fights with a user, I'm just saying the IT dept has better things to do and discipline is best left to upper mgmt or HR.

Realize you have to convince someone it is important enough to deal with. So yes what you say is the "correct" way to deal with it. If HR / Management deals with it is another. Try working for a company full of project managers for example. They make the company millions, quite a few things get a "look the otherway" policy. Or as Spidey said just gets the "just do it" policy.
 

Ghiedo27

Senior member
Mar 9, 2011
403
0
0
How common is it to set up a separate BYOD subnet?

It seems like you could do it at just about any budget level from soho routers used as APs on it's own limited access vlan to authentication servers with enterprise APs with different permissions levels (you can mix authentications, right?).

That way you'd have a security and QoS win and you don't have users trying to open holes in the network.
 

imagoon

Diamond Member
Feb 19, 2003
5,199
0
0
How common is it to set up a separate BYOD subnet?

It seems like you could do it at just about any budget level from soho routers used as APs on it's own limited access vlan to authentication servers with enterprise APs with different permissions levels (you can mix authentications, right?).

That way you'd have a security and QoS win and you don't have users trying to open holes in the network.

We had a second "guest" vlan that the front desk could issue access to. This was available anywhere in the building (same AP's doing multiple SSID and vlans.) Internally we gave these people extended guest passes. IE rather than the normal 8 hour pass it was generated for 30 days.

The next step was likely to be a BYOD type with AD creds but no internal access but I never got that far.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
How common is it to set up a separate BYOD subnet?

It seems like you could do it at just about any budget level from soho routers used as APs on it's own limited access vlan to authentication servers with enterprise APs with different permissions levels (you can mix authentications, right?).

That way you'd have a security and QoS win and you don't have users trying to open holes in the network.

Very common. What you're describing is a "guest+" implementation where they have internet access and possibly restricted access to some internal hosts for applications. It's typically the first step until you start putting them on your internal secure net.
 

Paperlantern

Platinum Member
Apr 26, 2003
2,239
6
81
Realize you have to convince someone it is important enough to deal with. So yes what you say is the "correct" way to deal with it. If HR / Management deals with it is another. Try working for a company full of project managers for example. They make the company millions, quite a few things get a "look the otherway" policy. Or as Spidey said just gets the "just do it" policy.

Shouldn't be too hard when people are constantly losing connectivity and wireless isn't able to be utilized when it's needed. However I feel you, there are a few exceptions in our company of course. The partners of course, a few of the other higher-ups yeah, that always happens. I'm referring to the other 95 percent here, that is what is going to help maintain the integrity of the network and ensure it is available when it is needed.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Shouldn't be too hard when people are constantly losing connectivity and wireless isn't able to be utilized when it's needed. However I feel you, there are a few exceptions in our company of course. The partners of course, a few of the other higher-ups yeah, that always happens. I'm referring to the other 95 percent here, that is what is going to help maintain the integrity of the network and ensure it is available when it is needed.

Access points are cheap. And if you're having connectivity problems, it is a design problem that can be easily remedied.

Wireless is actually pretty easy...IF you do it right. But make no mistake, BYOD is coming whether you want it or not. In fact it's pretty much already here.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |