Should we be suffering from connectivity problems due to having a hidden SSID?
At work, we're past the "Hidden SSIDs make our network more secure" argument, but for user's 'convenience' and in order to make it less confusing with our other broadcasted SSIDs, we've added a hidden SSID to our wireless controller (for the use mostly of network admins). We've noted a couple of disconnects, and would like to know if there are some known performance/reliability implications for this kind of setup, particularly with multiple access points with the same SSID on our site.
Does having a hidden SSID on an access point affect connectivity?
I had problems with a D-Link router where I had hidden the SSID when I brought home my first Vista laptop. Every day I had to add the network, and then the next day it wouldn't find it again and so on and so forth. So I googled it. One of the things I found is an argument that not only is "hidden SSID" not even a minor security improvement, its actually a big security problem.
Here's the content from http://technet.microsoft.com/:
In my experience, the most common problem for connectivity issues against hidden SSID's is typos in the client connection config. Case-sensitivity is usually my culprit.
This is a hardware issue (or a software issue with some hardware vendors). I've suffered this problem on my wireless networks. I too run one of my wireless networks with a "hidden SSID" and have had some issues with it. I know for a fact that our older G4/G5 based Mac OS X machines will not stay connected to a hidden SSID network. I've also experienced the problem with some older Linksys wireless cards on various versions of Windows. Other cards and PC's have no problem with it. I've got several machines that have worked flawlessly on it without a hiccup. Most of these are newer machines from Dell or have newer wireless cards including newer Linksys cards (which leads me to believe it's probably a wireless chipset issue but I don't have enough to prove it).
It may not have to do with the SSIDs at all. You may want to take a look at the wireless controller itself. At one place I worked we ran two wireless networks from the same controller, one for guests and a secured one for users. What we found was that there would be random losses of connections or, at times, one of the networks would disappear. Eventually, we gave each network its own dedicated controller and the issues were resolved. Granted, this may not be the optimal solution, but it may be something you would want to look into.
Making an SSID "hidden" just prevents it from being broadcasted in the beacon; so I would expect no connectivity problems.
Check for possible sources of interference, try changing channels, etc.
Leaving the whole Security by Obscurity speech to the side... what happens if you uncloak the SSID long enough to use it for however long it usually takes for the clients to have connectivity problems? If it works fine when unhidden, but has problems when hidden, you have your culprit. If you still have connectivity issues when unhidden, then your problem lies elsewhere.
A "closed network" means that the SSID is not included in the beacon frames. Beacon frames are still sent periodically because they're important for the operation of the network, so you won't see any changes in the amount of traffic or in any performance aspect of the operation of an 802.11 wireless network.
From a security standpoint, the SSID will still be visible in probe requests and association requests, so it's not much of a security feature. But because you're talking about using it for your network admins, I think it's a decent usability choice--you are keeping your normal users from seeing one more option in their list of wireless networks that they could associate to.
As others have said, one downside is that people have to remember exactly how to type it. With older version of Windows and some driver software, if you type in the name of an SSID that doesn't exist, you'll end up creating an ad-hoc network with the mistyped name that other users might try to join, which gets you back to having end users who are trying to join the wrong network.
I suppose some older drivers could have trouble associating to networks with hidden SSIDs, but that "feature" of 802.11 is really old, so I would be surprised if it actually caused connection problems.
Each additional BSSID you add (which is how most modern APs and controllers create new SSIDs) will add some amount of overhead in beacons and management traffic to your network regardless of whether the SSID is advertised or not. If you can accomplish some other way of giving admins the extra access they need (RADIUS-based VLAN assignment, role-based policy enforcement on the controller, etc.) without creating a new SSID, you might think about that. But there probably won't be much difference in practice.
Some special-purpose instruments and embedded systems show all "available networks" via a list of broadcasted SSID, however they are now more and more few and far between. I think the only other thing to consider is what was mentioned above, about checking for interference and maybe doing a scan of all wireless networks in the area for possible overlapping. With hidden SSIDs you may never have a networked company XBOX360, that's for sure ;)
I would question what security benefit is gained from hiding the SSID beacons, in lieu of the headache posed by badly implemented clients.
All data from authenticated clients is still passed over the air with the SSID stamped in plaintext. These identifiers are likely to be seen by a third-party taking more than a glancing look at secured networks in the area.