Experience on setting wireless routers

Source: Internet
Author: User

With the development of China's wireless routing industry, we also promote the upgrade of wireless technology. Here we mainly analyze the specific methods and precautions for setting wireless routers, the campus network of our school is installed with a broadband billing system of IPB Version 3.6.2. You need to enter the user name and password and charge for connecting to the Internet. One user name can only be used on one IP address, we have three computers in our office. I want to buy a wireless router. The three computers share a user name and IP address to access the Internet. Do you have any idea about the wireless router settings?

For your reference: the wireless router sets up a small D and a few colleagues to share a simple three-bedroom and two-bedroom apartment, which can be regarded as a happy day. Just like D, I like surfing the Internet. Since everyone has their own computers, everyone is ready to "please" the bandwidth at the door. After the account opening procedures are completed, the troubles will come: Everyone needs to access the Internet in their own room, but there is no reserved network interface when the room is decorated, so Mr. D had to buy a bundle of network lines and routers for cabling. This idea was ruthlessly rejected by our sisters as soon as it was proposed, and they have a very good reason: If so, the web line like spider web will make the beautiful walls unsightly, when a friend came, he had no face, and the landlord made it clear that he didn't want to attach anything to the wall. D thinks it makes sense, so he began to look for other ways. Soon, Tom found a perfect solution: wireless Internet access! This method is simple. You only need to buy a wireless router and install a wireless network card on the computer that needs to access the Internet. Then you can share the Internet with the wired network! Of course, there will be a relatively large amount of investment in the early stage, but now a set of wireless Internet access kits is only about 400 yuan, consistent with the number of sisters, pass!

After buying a wireless router and several wireless network adapters from e-capital, the first thing d needs to do is find a suitable location for the router. Because the effect of wireless network transmission is significantly affected by distance and obstacles, as a result, A vro on a central node must be located in the middle of the physical locations of several computers that share Internet access. It is not isolated from the space of each house, of course, it is not a place that is prone to frequent bumps. As a result, with the efforts of D and sisters, the router "settled" to a relatively high position in the living room.

After finding a proper location, connect the power of the router and connect the broadband connection line to the WAN port of the router. Then the router starts to work. Next, D installs the driver of the wireless network card on each computer, and then sets the IP address, subnet mask, DNS, and so on of the wireless network card like the ordinary network card set by the wireless router. Then, the network card quickly detects the signal sent by the router. At this time, the vro and NIC are both in the original state, and no security performance is configured. Therefore, you only need to select a connection to establish a wireless connection. The following describes how to configure the wireless router to ensure its security and applicability.

Generally, each device that complies with the TCP/IP protocol has its own IP address, and a wireless router is no exception. Generally, routers have their own fixed IP addresses in the LAN. This design also facilitates users to configure and test the wireless router by accessing this IP address. Of course, the IP addresses of wireless routers of different brands are different. For details, refer to the instructions. Note that the IP address of the wireless network card must also be set according to the Network Configuration Requirements of the router, so that they are in the same IP network segment. For example, the IP address of the TP-LINK WR541G wireless router purchased by D is 192.168.1.1, the IP address of the NIC must also be specified as the address on the 192.168.1.XXX network segment, otherwise the connection between the two cannot be correctly established. Open IE, enter 192.168.1.1 in the address bar, and press enter to view the login interface of the router. You must log on as an administrator. The default settings of the factory device can be found in the Manual. D In the login interface enter the default user name and password TP-LINK router default settings are Admin), and then click the OK button to enter the wireless router settings interface, the following is how to set according to your own requirements.

Internet access

To use a vro to share the internet, you must first inform the vro of the current Internet access method. Select "network parameters> WAN Port Settings" on the left side of the wireless router settings window, and select your own Internet access method from the "WAN port connection type" menu. If your Internet access method is ADSL virtual dialing, select "PPPoE". If you have a fixed IP address provided by the network service provider, select "static IP Address ". If you are a residential broadband user like D, such as Great Wall broadband, telecom LAN, etc.), every time you log on to the Internet, the IP address is automatically obtained from the network server, you must select "Dynamic IP ". Other information, including the subnet mask, DNS server, and gateway, can be obtained by consulting the network server when installing the bandwidth. Because small D selects a dynamic IP address, the router automatically obtains information such as the DNS server and gateway, saving the trouble of small D settings. Of course, you still need to set the DNS server, Gateway information, and subnet mask on each connected computer.

1. SSID settings

The Service Set Identifier SSID) is the identification string used by the Wireless Access Point. The client can use it to establish a connection with the wireless router. In general, SSID is the name you give your wireless network. There are no other technical factors. It should be noted that all wireless routers or APS launched by the same manufacturer use the same SSID, which provides an intrusion opportunity for attackers who attempt to connect to the wireless network illegally. Once they connect to the wireless network using a common initialization string, it is easy to establish an unauthorized link, which poses a threat to our wireless network. Therefore, D will first rename the SSID and take a common name: link. By default, the SSID broadcast function is enabled on the wireless router, so that other users can search for the existence of the wireless router through the SSID. However, Mr. D does not want his wireless network to be searched by someone else through the SSID number. Therefore, he canceled the check box "allow SSID broadcast. D tips: After SSID broadcast is disabled, the wireless network can still be used, but it will not appear in the list of available networks found by others.

2. Set Transmission Mode

Wireless routers generally provide multiple transmission modes. For example, WR541G 1g wireless routers have 11 mbps bandwidth in 802.11b mode and 54Mbps bandwidth in 802.11g mode. D. The default transmission mode is 11 Mbps, and the wireless router and network card purchased by him support the transmission mode of 54Mbps. Therefore, I did not hesitate to change the transmission mode to 54 Mbps. D tips: some users may choose a 54M router and a 11M wireless NIC due to the order of device purchases. In this case, you must change the transmission mode to 11 Mbps on the wireless router settings page. Otherwise, a compatibility problem may occur, leading to a network failure.

3. Set the network key

Of course, your network cannot be used by outsiders. Therefore, security settings may be essential, which is also emphasized by sisters many times. Therefore, Xiao D cannot be careless. In the security options on the settings page, D sets the security authentication type to "auto-selected" and the key format to "hexadecimal ", then, the secret is set to 128 bits with high confidentiality and the corresponding password is set. D tips: If you want to set different keys for each wireless network card, you can activate key 2, key 3, and key 4 respectively.

Here, I would like to remind you that the data transmission encryption function is disabled when many wireless routers or APs are leaving the factory. If you use it without setting it, then your wireless network becomes a "undefended" decoration. Other people only need to use some simple wireless sniffing software such as "network stumbler "), you can search your network and then enter it. Therefore, it is extremely important to encrypt your wireless network. After the preceding settings are complete, click "save". The vro automatically restarts to apply the new settings.

Firewall settings

Setting only one key obviously does not meet the network security requirements of sisters. Therefore, Tom comes with a "double insurance", that is, using MAC address filtering. We know that each wireless network card has an identity sign, that is, the MAC address. Generally, the MAC addresses of any two wireless NICs cannot be the same. Therefore, based on this feature, we can enter the MAC address of the network adapter that is allowed to access the wireless network into the MAC address allowed list of the wireless router or AP, and enable the MAC address filtering function, the wireless network adapter that is not in the list cannot use the network service even if it intrude into our network. On the settings page of the wireless router, click "Security Settings> firewall settings", select the "Enable Firewall" check box on the right side, and then you can set the MAC address filtering.
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.