{"id":11984,"date":"2018-09-17T06:30:21","date_gmt":"2018-09-17T10:30:21","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=11984"},"modified":"2020-07-20T20:27:20","modified_gmt":"2020-07-20T16:27:20","slug":"guest-wifi","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/guest-wifi\/11984\/","title":{"rendered":"What&#8217;s a guest Wi-Fi network, and why do you need one?"},"content":{"rendered":"<p>The modern world is so hooked up to online services that when guests come around, \u201cHow ya doing?\u201d will probably be followed by \u201cWhat\u2019s your Wi-Fi password?\u201d But the hospitable host probably doesn\u2019t realize that revealing this information could pose a network security risk.<\/p>\n<p>For example, guests might accidentally download a malicious program or connect an already infected phone or laptop to the network. Many pieces of malware are able to spread themselves over a local network, and if an infected device is connected to your Wi-Fi, it will try to contaminate everything in its range.<\/p>\n<h2>Why set up a guest Wi-Fi network?<\/h2>\n<p>It\u2019s possible to be both hospitable and safe \u2014 by setting up guest Wi-Fi. A guest Wi-Fi network is essentially a separate access point on your router. All of your home devices are connected to one point and joined as a network, and the guest network is a different point that provides access to the Internet, but not to your home network. As the name suggests, it\u2019s for guests to connect to.<\/p>\n<p>A guest network is a win-win: Friends and acquaintances don\u2019t lose touch with the outside world and your data isn\u2019t compromised. Malware that somehow ended up on a guest\u2019s smartphone will not be able to get into your family photo archive or other important files.<\/p>\n<h3>How to set up guest Wi-Fi<\/h3>\n<p>Configuring a separate guest network is easier than it sounds. For a start, there\u2019s no need to lay an extra cable or pay your ISP twice. It\u2019s more than likely that your Wi-Fi router will let you set up an additional network for guests \u2014 you just need to go into the settings and activate it. To do this, enter your router\u2019s IP address in the URL bar of your browser (usually it\u2019s 192.168.1.1 or 192.168.0.1, but not always). The address should be in the router\u2019s user manual.<\/p>\n<p>In the dialog box that opens, enter the administrator user name and password. If you never got around to changing them, they might be there in your ISP contract or again in the manual. To improve security, we recommend <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/secure-home-wifi\/13371\/\" rel=\"noopener noreferrer nofollow\">changing them<\/a>, and so as not to forget them, use a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<p>In the router settings, find <em>Allow guest access<\/em> or <em>Guest network<\/em>. It\u2019s usually hidden away in the Wi-Fi section. If you have trouble finding it, check out the guide again or Google, using the model name of your router. If you have an old or low-end router model, the option to set up a guest network might not exist. But most reasonably modern routers have it.<\/p>\n<p>Having selected the relevant check box, add the name of the guest network (called SSID in the control panel of some routers) \u2014 this is the name that your friends will see in the list of available connections.<\/p>\n<p>In some routers, guest Wi-Fi access will immediately kick in; others might need extra tweaking. But in any event, even if the guest network is already active, we recommend that you make sure it\u2019s correctly configured:<\/p>\n<ul>\n<li>Set a password for the new network. This can usually be done right away, under the network name. Now only those who know the password can access your guest connection.<\/li>\n<li>Set the encryption type so that information transmitted over Wi-Fi cannot be intercepted. From the available options, select WPA2 (WPA2-PSK or WPA2-Personal in some settings) \u2014 a reliable algorithm supported by all modern wireless devices.<\/li>\n<li>Make sure that the <em>Allow guests to access local network resources<\/em> (or similar) check box is cleared. There may be no such setting, but if there is, uncheck it so that guests won\u2019t be able to see your files and other information stored on computers, which is essentially the whole point of a guest network. Some routers take the opposite tack, with a check box marked <em>Isolate<\/em>, which isolates the guest network from your local network. If you have that option, select it.<\/li>\n<li>Uncheck <em>Allow access to settings<\/em> (or similar), if such an option exists. If selected, this check box would let guest network users access router settings and reconfigure something there, including their own access permissions. That\u2019s not what you need.<\/li>\n<\/ul>\n<p>All set! You have now configured a guest Wi-Fi network that both provides secure Internet access and protects your local devices.<\/p>\n<h3>Why it\u2019s better to connect IoT devices to a guest network<\/h3>\n<p>Incidentally, a guest Wi-Fi network is a good idea not only if you have lots of friends, but also if you have lots of home smart devices. Smart TVs, smart teapots, video game consoles, and the like also need an Internet connection. But they tend to be <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/internet-of-vulnerabilities\/20303\/\" rel=\"noopener noreferrer nofollow\">far more vulnerable<\/a> than computers with the latest updates installed. That means that if they are connected to the main network and hacked, intruders can get into your other devices.<\/p>\n<p>At the mention of smart devices, many experts say that it\u2019s not that there\u2019s a possibility they\u2019ll be hacked \u2014 they\u2019ll be hacked for sure. And whereas a smart light bulb becoming part of a <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/botnet\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">botnet<\/a> is manageable, a computer turning into a zombie isn\u2019t. Among other things, botnets are used to spread various malware, and if your computer has been turned into a zombie, this malicious code basically has an open pass to its memory.<\/p>\n<p>Connecting all IoT devices to a correctly configured guest network instead of the main network provides additional protection against such attacks. Even if cybercriminals hack one of the IoT devices, they will not be able to penetrate your main network and compromise the computers and smartphones in it.<\/p>\n<p>Sure, a smart washing machine connected to the guest network could still become a member of a botnet and take part in DDoS attacks or cryptocurrency mining (that\u2019s pretty much a standard risk of buying smart things). But in that case, your computer containing bank data and other sensitive information will remain safe.<\/p>\n<p>One last tip before we sign off: Routers are in fact a typical target for botnet creators, so don\u2019t forget to periodically update the firmware of your home router. The latest versions usually patch hackable vulnerabilities.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.<\/p>\n","protected":false},"author":2581,"featured_media":11985,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2088,2323,1915,1012,628,765,1081,97,131,174],"class_list":{"0":"post-11984","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-tips","9":"tag-digital-comfort-zone","10":"tag-guest-wi-fi","11":"tag-internet","12":"tag-internet-of-things","13":"tag-iot","14":"tag-networks","15":"tag-security-2","16":"tag-tips-2","17":"tag-wi-fi"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/guest-wifi\/11984\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/guest-wifi\/14291\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/guest-wifi\/16271\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/guest-wifi\/14446\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/guest-wifi\/13403\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/guest-wifi\/16952\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/guest-wifi\/16295\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/guest-wifi\/21302\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/guest-wifi\/5294\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/guest-wifi\/23843\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/guest-wifi\/10932\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/guest-wifi\/10946\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/guest-wifi\/9740\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/guest-wifi\/17693\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/guest-wifi\/21612\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/guest-wifi\/17377\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/guest-wifi\/21148\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/guest-wifi\/21153\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/tips-2\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=11984"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11984\/revisions"}],"predecessor-version":[{"id":17057,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11984\/revisions\/17057"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/11985"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=11984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=11984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=11984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}