I am implementing new SSIDs with proper security to replace a patchwork and insecure wireless "solution" I inherited and am wondering if anyone has any input or recommendations.
Background:
My company has patchwork wifi solutions in place including, a Cisco 2405 with 3 SSIDs supporting 2 locations, a scattering of eero home-style mess network devices providing "guest" type access and then about 20 Meraki networks with wireless (these are typically a "mixed" network with MX, MS and MR devices). There is overlap of all 3 solutions in various locations. There is also a mix of SSID throughout the company requiring different PSK. (General nightmare)
Generally we have a guest and an employee network that allow access via a PSK that has been in use for 10+ years.
Devices are a mix of laptops (domain and non-domain), end user smart phones and work provided tablets and handhelds. Of course many of the devices and non-domain computers needs access to specific network resources.
My plan:
I am open to any suggestions for any item but here is where I primarily would like some input:
My options for providing access to resources on the production network for devices that are non-domain are:
Looking for any real life examples, recommendations or warnings any of you may have.
Thanks!
DerikA
Solved! Go to Solution.
>Create group policies in Meraki that I would then apply to specific devices to allow specific server resources to devices on the "Guest" SSID and bypasses the splash page. (not as easy but more secure?)
I tend to do this, and also use the option to put the device into a different VLAN.
You could also take a look at Trusted Access.
@DerikA seems to me you got a pretty good setup. Now I'm sure my other All Star colleagues will chime in on a few things if needed but that seems like a very simple setup to convert to. 😁
>Create group policies in Meraki that I would then apply to specific devices to allow specific server resources to devices on the "Guest" SSID and bypasses the splash page. (not as easy but more secure?)
I tend to do this, and also use the option to put the device into a different VLAN.
You could also take a look at Trusted Access.
@PhilipDAth I've looked at this option and would very much like to use more policy based access but unfortunately SM is not in our budget.
I have been leaning to group policies applied to the individual devices.
Question, would putting them in a separate VLAN be needed if I am using NAT mode which restricts clients from communicating with each other?
Thanks!
>Question, would putting them in a separate VLAN be needed if I am using NAT mode which restricts clients from communicating with each other?
Typically you set guest wifi so it can't talk to anything internally. So if you have a device that needs to talk to something internally and you want to keep your SSID count low, it is best to put that into a different VLAN rather than modifying the guest firewall rules to allow a specific IoT device access to something. Also if you do put it in a guest VLAN it means guest can try and talk to it.
I often use an IoT VLAN these days, especially for this purpose.