Educause Security Discussion mailing list archives

Re: Wireless Networks - to hide or not to hide


From: Matthew Hodgett <m.hodgett () QUT EDU AU>
Date: Mon, 19 May 2014 13:31:16 +1000

Security by obscurity is not security. It would be expected that you
have other/ layered security controls in place to defend those devices
and networks. What is your case for using a hidden SID over a properly
named one? And yes, there are plenty of devices that have problems with
hidden SIDs, it could be argued that the administration/ support cost of
dealing with those devices out-ways the benefit.

If you require using such wireless devices I would recommend a well
named non-hidden SID with other appropriate security controls for this
type of wireless network.

Good luck.
Matthew


On 15/05/2014 2:34 AM, Wood, Anne (wood) wrote:
Hi,

Our Campus Technology Services group has been testing in-house solutions that use wireless devices that do not 
connect to WPA2-Enterprise networks, such as Apple-Tvs, Rokus, Raspberry Pis, Ubiquiti power/monitoring controllers, 
etc.  We initially set up a test hidden ssid using Mac address filtering to get a sense for how these devices might 
be connected to our wireless network without causing additional confusion and/or curiosity within our user community. 
 We are finding that several of these devices are not able to maintain reliable connections to a hidden ssid and I 
have been asked to unhide this network.

I am curious if others have made decisions on supporting these types of wireless devices on their networks, why those 
decisions have been made (to support or not), and any advice that may offered to help guide my decision.

Thanks so much!
Anne


Anne M. Wood
Assistant VP & CIO
Juniata College



CONFIDENTIALITY NOTICE: The materials in this electronic mail transmission (including all attachments) are private 
and confidential and are the property of the sender. The information contained in the material is privileged and is 
intended only for the use of the named addressee(s). If you are not the intended addressee, be advised that any 
unauthorized disclosure, copying, distribution or the taking of any action in reliance on the contents of this 
material is strictly prohibited. If you have received this e-mail in error, please immediately notify the sender by 
replying to the e-mail, and then destroy it immediately. Thank you.


Current thread: