Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Hotel Wireless WiFi Real name Authentication Scheme

2025-02-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Due to policy requirements and network security requirements, the vast majority of hotel wireless WiFi now require real-name authentication. Only real-name authenticated devices are allowed to connect to the hotel's WiFi network and record and retain the Internet content of the terminal.

Generally speaking, real-name authentication uses SMS authentication, because the mobile phone number has been real-name authentication, recording the mobile phone number is tantamount to the realization of real-name authentication on the Internet. The network structure can be deployed as follows, using a WSG Internet behavior management as the main route (or transparent bridge deployment).

SMS platforms need to apply online (such as Aliyun, Tencent Cloud, etc.), usually for 3-5 cents a text message.

Multiple Lans can share the same SMS platform.

WSG online behavior management as the main route (or transparent bridge)

After the above deployment and correct configuration, mobile phones and other wireless devices connected to WiFi will automatically pop up the SMS authentication page.

Enter the correct mobile phone number to receive the CAPTCHA message, enter the correct CAPTCHA and complete the login process. WSG Internet behavior Management records the authenticated mobile phone number and records the online records of the device.

You can configure the number of days to keep the log according to your needs.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report