What is wifi access control

What is wifi access control

Should you use WiFi or ethernet for door access control? What are the pros and cons of using a wireless access control system?

Wireless technology in access control

Before jumping into how wireless is used in WiFi locks and wireless access control, let’s take a look at the underlying technology: Wireless Fidelity, commonly known as WiFi, is a wireless technology for local area network LAN. This technology is governed by IEEE 802.11 standard for physical and media access control MAC.

WiFi technology commonly uses a 2.4 GHz wireless band reserved for industrial, scientific, and medical ISM applications; it can also use 900 MHz, 3.6 GHz, and 60 GHz bands.

The indoor WiFi network range varies between 66 ft to 230 ft based on the type of modulation, bandwidth, and other factors. The outdoor range is always a bit longer than the indoor ranges with the same network parameters, due to lesser hindrances. A wide range of WiFi-enabled devices is available in the marketplace that includes cell phones, PCs, tablets, access control security systems, office equipment, home appliances, and others.

Wireless access control: Components

WiFi-based access systems use a combination of software and hardware resources. The main products commonly used in a WiFi-enabled security system include:

  • Electronic or wireless locks
  • Wireless readers
  • Wireless access point
  • Access control application
  • Fobs

These products communicate with each other through a wireless communication system.

How Wifi access control works

WiFi is a central technology in modern security and access control systems. Internet of Things (IoT) is one of the key models of future communication systems, which integrates equipment, devices, and home appliances commonly used in our day-to-day life. That integration is accomplished through an IP-based internet system.

In a door access control system, the legacy locks of a building are replaced with wireless-enabled electronic locks. Those locks connect to a wireless access point or wireless router, which facilitates multiple wireless-enabled devices and locks to communicate with each other within specified criteria and conditions. The control and management of the entire door security access system is done through a software application, which provides an interface to configure the desired conditions and criteria for accessing the doors.

The replica of that software can also be installed on your mobile devices as a mobile app to control the system operations. Electronically programmed fobs can also be used for manual access to a particular area. This entire door access system can work in standalone, integrated, and offline modes if properly configured. While using the manual access method, an electronic fob is inserted into the wireless reader, which reads the data on that particular fob and establishes communication with the main application for access conditions and criteria. Based on those criteria, access to the wireless door locks is granted from the core application.

Читайте также:  Пароль от сети вай фай принтера

Modern wireless door locks are able to handle multiple data input systems like thumb impressions, manual codes, images, and more through wireless door readers. It has developed and become a more advanced solution over the years.

How do wireless locks compare with other technologies?

Wireless locks are incredibly helpful in many use cases, and they often represent a very valid option. There are, however, some use cases where wireless locks are not an ideal solution. We cover all these case scenarios on our page for smart locks.

Access Your Office the Modern Way

Discover why thousands of companies run on Kisi.

Conclusion

Wireless access control systems offer many benefits for organizations, creating seamless entry with little hassle when it comes to installation. Wifi access control is often recommended to businesses for many reasons related to their security. Still, it’s also important to consider the following when deciding whether this solution is the right fit for your organization:

Pros

  • Often cheaper than legacy access control systems
  • They offer a good level of security
  • Can be installed without professionals most of the time, and are very quick to install
  • Modern systems offer peace of mind

Cons

  • They are not part of a bigger security ecosystem
  • Some systems do not work in offline mode, so this might present a problem in the case of a blackout
  • They can become obsolete quicker

If you want a complete overview of the differences between smart locks and our solution, check out our smart locks comparison page!

Источник

How to configure Access Control on the Wi-Fi Routers (new logo)

Updated 06-27-2022 09:17:02 AM 449898

Archer C1200 , Archer C5400 , Archer A2600 , Archer AX55 , Archer C4 , Archer C5200 , Archer AX53 , Archer C5 , Archer AX10 , Archer C2 , Archer AX51 , Archer AX96 , Archer A2200 , Archer C6U , TL-WR1043N( V5 ) , Archer C80 , Archer AXE95 , Archer C8 , Archer AX10000 , Archer C3150 , Archer C9 , Archer AX50 , Archer C6 , Archer C7 , Archer AX90 , Archer AX6000 , Archer C5400X , Archer C25 , Archer C24 , Archer A20 , Archer A64 , Archer C60 , Archer C2600 , Archer A1200 , Archer C21 , Archer C20 , Archer C64 , Archer AX1800 , Archer AX206 , Archer C59 , Archer C58 , Archer AX4200 , Archer C3200 , Archer C900 , Archer A2 , Archer AX75 , Archer AX4400 , Archer C3000 , Archer AX73 , Archer C50 , Archer A10 , Archer A54 , Archer AX4800 , Archer C50 , Archer C1900 , Archer C55 , Archer C54 , Archer A2300 , Archer AXE75 , Archer A6 , Archer A7 , Archer AX72 , Archer AXE200 Omni , Archer A5 , Archer GX90 , Archer A8 , Archer A9 , Archer AX68 , Archer C2300 , Archer AX5300 , Archer AX23 , Archer AX20 , Archer C3150 V2 , Archer C4000 , Archer AX21 , Archer A3000 , Archer C2700 , Archer AXE300 , Archer AX1500 , Archer C90 , Archer AX60 , Archer AX11000 , Archer AX3200 , Archer AX3000

Читайте также:  Wifi network by wps

Access Control is used to block or allow specific client devices to access your network (via wired or wireless) based on a list of blocked devices (Blacklist) or a list of allowed devices (Whitelist).

I want to: Block or allow specific client devices to access my network (via wired or wireless).

1. Log in to the web-based interface of the router. If you don’t know how to do that, please refer to

2. Go to Advanced > Security > Access Control.

3. Enable Access Control.

4. Select the access mode to either block (recommended) or allow the device(s) in the list.

To block specific device(s)

1) Select Blacklist and click Save.

2) Select the device(s) to be blocked in the Online Devices table by ticking the checkbox (es).

3) Click Block above the Online Devices table. The selected devices will be added to Devices in Blacklist automatically.

To allow specific device(s)

1) Select Whitelist and click Save.

2) Click Add in the Devices in Whitelist section. Enter the Device Name and MAC Address (You can copy and paste the information from the Online Devices list if the device is connected to your network).

3) Click OK.

Done! Now you can block or allow specific client devices to access your network (via wired or wireless) using the Blacklist or Whitelist.

Get to know more details of each function and configuration please go to Download Center to download the manual of your product.

Looking for More

Источник

How to configure Access Control on the Wi-Fi Routers (new logo)

Updated 06-27-2022 09:17:02 AM 449899

Archer C1200 , Archer C5400 , Archer A2600 , Archer AX55 , Archer C4 , Archer C5200 , Archer AX53 , Archer C5 , Archer AX10 , Archer C2 , Archer AX51 , Archer AX96 , Archer A2200 , Archer C6U , TL-WR1043N( V5 ) , Archer C80 , Archer AXE95 , Archer C8 , Archer AX10000 , Archer C3150 , Archer C9 , Archer AX50 , Archer C6 , Archer C7 , Archer AX90 , Archer AX6000 , Archer C5400X , Archer C25 , Archer C24 , Archer A20 , Archer A64 , Archer C60 , Archer C2600 , Archer A1200 , Archer C21 , Archer C20 , Archer C64 , Archer AX1800 , Archer AX206 , Archer C59 , Archer C58 , Archer AX4200 , Archer C3200 , Archer C900 , Archer A2 , Archer AX75 , Archer AX4400 , Archer C3000 , Archer AX73 , Archer C50 , Archer A10 , Archer A54 , Archer AX4800 , Archer C50 , Archer C1900 , Archer C55 , Archer C54 , Archer A2300 , Archer AXE75 , Archer A6 , Archer A7 , Archer AX72 , Archer AXE200 Omni , Archer A5 , Archer GX90 , Archer A8 , Archer A9 , Archer AX68 , Archer C2300 , Archer AX5300 , Archer AX23 , Archer AX20 , Archer C3150 V2 , Archer C4000 , Archer AX21 , Archer A3000 , Archer C2700 , Archer AXE300 , Archer AX1500 , Archer C90 , Archer AX60 , Archer AX11000 , Archer AX3200 , Archer AX3000

Читайте также:  Команды вай фай смд

Access Control is used to block or allow specific client devices to access your network (via wired or wireless) based on a list of blocked devices (Blacklist) or a list of allowed devices (Whitelist).

I want to: Block or allow specific client devices to access my network (via wired or wireless).

1. Log in to the web-based interface of the router. If you don’t know how to do that, please refer to

2. Go to Advanced > Security > Access Control.

3. Enable Access Control.

4. Select the access mode to either block (recommended) or allow the device(s) in the list.

To block specific device(s)

1) Select Blacklist and click Save.

2) Select the device(s) to be blocked in the Online Devices table by ticking the checkbox (es).

3) Click Block above the Online Devices table. The selected devices will be added to Devices in Blacklist automatically.

To allow specific device(s)

1) Select Whitelist and click Save.

2) Click Add in the Devices in Whitelist section. Enter the Device Name and MAC Address (You can copy and paste the information from the Online Devices list if the device is connected to your network).

3) Click OK.

Done! Now you can block or allow specific client devices to access your network (via wired or wireless) using the Blacklist or Whitelist.

Get to know more details of each function and configuration please go to Download Center to download the manual of your product.

Is this faq useful?

Your feedback helps improve this site.

What’s your concern with this article?

  • Dissatisfied with product
  • Too Complicated
  • Confusing Title
  • Does not apply to me
  • Too Vague
  • Other

We’d love to get your feedback, please let us know how we can improve this content.

We appreciate your feedback.
Click here to contact TP-Link technical support.

Источник

Оцените статью
Adblock
detector