Wireless medium
Client-to-client communication
DNS infrastructure
DHCP services
Captive portal and redirect flows
Firewall and routing boundaries
Opportunistic attackers
Insider threats using Guest
Malicious visitors
Compromised BYOD devices
“Client isolation is enabled by default”
“Guest DNS can be the same as internal”
“Portal exceptions are harmless”
“No internal routing means no risk”
Last updated 22 hours ago