Four simple steps to protect Wireless Network Security

Source: Internet
Author: User

Step 1: first, modify the default user name and password that allow us to access the vro in the wireless router settings menu.

These Default usernames and passwords are available on almost all technical support websites. Therefore, anyone can access the vro set by the vendor. It is very important to change the user name and password, because if you enter the correct password to the router, any other security measures we can take will be bypassed.

Step 2: we need to change the default network name, that is, the SSID, with the unique name selected by ourselves.

The name of the broadcast network appears on the "available wireless networks" list on our PC. Once we select a new name for our network, we will make it invisible to others. Vrouters of different brands use different methods to provide this function. On Some routers, these routers will ask if we want to "broadcast" The SSID. Some routers will ask us whether to hide or publish this SSIS. No matter which word is used, it means the same. Once this function is enabled, your network will not appear in the "available network" list of others, thus reducing the trouble for others to use. It should be noted that, after hiding the network, Windows Vista users need to set the connection device to "connect even if the network is not broadcast ". You can find this option in the Network Connection Properties in the "manage wireless networks" window.

Step 3: Configure "security mode ".

A new vro can have up to three options: WEP, WPA, or wpa2. The difference between the three options is that WEP is an old-fashioned method that is not secure; WPA has greatly improved; and WPA2 is the best choice currently. Most vrouters purchased in recent years should provide at least WEP and WPA security options. When selecting WPA or WPA2 security options, these options require us to further select an "encryption type": TKIP or AES. AES is better in both options. When setting security options, it is often found that not many network devices support every possible setting. Some routers recommend different security levels of connection: WPA2-AES for laptops and WPA-TKIP for Xbox 360 consoles. If you do not have this option, you can select lower security settings or upgrade to a newer Network Device with more secure features.

Step 4: Enable the MAC address filtering function on the network.

All devices that can form a network connection have a unique 12-character identifier called a MAC address. This identifier can usually be found in the Network Properties of the device we are trying to connect. This identifier appears in a six-character double-character group. Each character is separated by a colon (:) or a break. By enabling MAC address control for our vrouters, We can enter an identifier for those devices that are allowed to access our network. All other devices without an identifier are not allowed to access our network.

By taking these steps to configure the security features of our routers, we will create a "triple lock" to protect our information privacy and system integrity ". These security measures can almost discourage the most stubborn hackers from accessing our network, because there are still easy opportunities in other places, and no one is willing to spend too much effort here. If the rest is where they are going, it's good for us.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.