top of page

How access control works for a WISP fixed broadband service

Updated: Mar 23, 2023

A WISP fixed broadband service provides a wireless Internet connection from the PtMP tower to the customer’s premises CPE antenna. The customer connects to the Internet via the access control router.


How access control works for a WISP fixed broadband service

The #access control router provides the following functions:

  • Authenticate the customer onto the network using the customer’s credential.

  • Activate the customer; however if the bill is not paid then deactivate the customer.

  • Apply the customers rate plan, maximum download and upload speeds, optional download and upload data limits.


The access #control router is installed in the #WISP’s network as illustrated in the next figure.

The access control router is installed in the WISP’s network as illustrated in the figure.

When the access control #router receives the customer's data packet from the PtMP wireless that was received from the CPE the credential is extracted and passed to a process that authenticates the customer. The authentication process consults credential database to verify that the credential is valid. A negative verification means that the access is not permitted and that data packet is discarded. A positive verification identifies the customer and enables access to the Internet. The customer connection passes through two additional processes. The first of these processes uses the customer identification to consult the billing system to verify the customer's payment status; if the account is paid then the process enables the customer's access to the Internet. The second of these processes receives the customer identification and applies the customer rate-plan that was provided by the billing system. The rate-plan identifies the maximum download/upload speeds and optionally a data cap for the customer’s billing period. The rate-plan for each customer is configured in the router. After authentication the customer is given access to the Internet with the maximum download and upload speeds that were assigned to that customer. The access control router also includes status and failure monitoring. The access control process is illustrated in the next diagram where each component is identified.


The access control process is illustrated in the diagram where each component is identified.

______________________________________________________________________ Readers are invited to share this information with others. If any reader has a question regarding this information please contact us via our contact page.


bottom of page