Familiar with wireless LAN Transmission Mechanism

Source: Internet
Author: User
Tags strong password

Wireless network technology is commonly used, but is the working principle of wireless network technology really clear? Here we will introduce it in detail. The wireless LAN network transmits signals through microwave, so the signal transmission security of the wireless LAN makes many wireless Internet users a little worried. In fact, as long as they are familiar with the signal transmission mechanism of the wireless network, we can also use some security measures to ensure the security of the wireless LAN.

What is obviously different from a wired LAN network is that a wireless LAN network transmits signals through a microwave, which is invisible and invisible, therefore, the signal transmission security of the wireless LAN makes many wireless Internet users a little worried. In fact, as long as we are familiar with the signal transmission mechanism of the wireless network, we can use some targeted security protection methods, we will be able to ensure the security of the wireless LAN.

Do not use point-to-point working mode

Generally, common workstations in a wireless LAN often have two basic working transmission modes: the basic architecture mode and the point-to-point working mode. When the wireless LAN network uses the basic architecture mode, all wireless workstations in the LAN need to use a wireless router device for signal processing. In other words, whether we are surfing the web content online, or share transmission and communication with other workstations in the same LAN. All data signals of the wireless workstation must go through the wireless router device. Most wireless LAN networks belong to this type.

If a wireless LAN network works in point-to-point mode, the interaction between the workstation and the workstation in the wireless LAN can be carried out directly without the need of a wireless router or other wireless node equipment. In some specific situations, this work mode is more conducive to the rapid network access of workstations. For example, if we want to share the transfer files with other workstations in the LAN, we can choose the point-to-point work mode. However, if we enable the point-to-point mode, illegal users in the vicinity of the local wireless network can secretly access important private information in the local network without knowledge, in this way, the security of local wireless LAN will be greatly reduced.

To effectively prevent leakage of private information in the local network, we strongly recommend that you disable the point-to-point mode unless you have to enable this mode, once the information exchange tasks between workstations are completed, point-to-point work mode must be disabled immediately.

ID of the wireless network that rejects broadcasts

To make it easy for common workstations in a wireless LAN to quickly discover devices connected to a wireless node, each device on a wireless node basically has a network service ID name, this name is generally called the SSID identifier of a wireless node. A common workstation can establish a normal wireless network connection with a wireless node device only through this identifier. If you do not know the SSID identifier, therefore, normal workstations cannot be added to a wireless LAN. Therefore, to prevent unauthorized users from secretly using the local wireless network, we must try to prevent unauthorized users from knowing the SSID identifier information of the Local Wireless LAN.

Currently, the factory settings of many wireless node devices on the market allow wireless network identifier broadcast. Once this function is enabled, this means that the wireless node device will automatically publish the local wireless network identifier name information to all common workstations covered by the wireless network. Although the SSID identifier broadcast function allows you to easily join a local wireless network, it also allows some illegal users to easily find a local wireless network, in this way, the security of the local wireless network will be affected. To protect the security of the local wireless network, we strongly recommend that you disable the SSID identifier broadcast function.

Of course, you should note that if an illegal user already knows the local wireless network SSID identifier, even if we refuse the wireless router to broadcast the wireless network identifier information in the future, illegal users can also secretly join the local wireless network. Therefore, when we set the SSID name information for wireless node devices, we should try to make the name more complex, do not be too fragile or simple, so that illegal users cannot guess the SSID identifier name of the local wireless network.

Strengthen the management password of wireless nodes

Once illegal users in the vicinity of a wireless LAN find a local wireless node, they often try to log on to the background management interface of the wireless node and modify its wireless network parameters, if they have guessed the password, the local wireless Internet access parameters may be modified randomly by illegal users, resulting in the Local Wireless LAN network not working properly. More seriously, once these illegal users change the background management password of the wireless node, even the local network administrator may not be able to enter the background interface of the wireless node to manage and maintain the wireless Internet access device.

Because the background management passwords set by default by many wireless node devices are relatively simple, for example, set the password to "admin", "0000", "1234", or "aaaa. If we do not promptly modify these default backend management passwords and connect our wireless node devices to the wireless network, when an illegal user uses professional tools to learn the manufacturer and model of the local wireless node device, the management password of the local wireless node device will undoubtedly be obtained by the illegal user, at this time, the security of the local wireless network will be seriously threatened. Therefore, before connecting a wireless node device to a wireless network, you must follow the instructions to log on to the background management interface of the device and find the options for modifying the background management password, the default password is changed to a strong password to ensure that illegal users cannot guess the management password of the wireless node, so as to ensure the security of the local wireless LAN.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.