1, to enterprise-level encryption
If you create a WPA or WPA2 encryption key, and you must enter this key when connecting to a wireless network, you are using the WPA pre-shared key (PSK) mode. Enterprise-class networks, large or small, should be protected with enterprise mode, as this protection mode adds 802.1x/eap authentication to the wireless connection pro
in today's network era, almost every family has a wireless router, but many users are often vulnerable to the impact of the network, not only slow down the internet, but also may affect security. Is your home router secure? In fact, if the wireless router does not carry out security settings, it is easy to be outlaws t
the IP address, the bug network suggested that everyone can be allowed to use the IP address to add all in, and set it as "Allow access", The IP address that is not added is not connected; Similarly, if you want more advanced security, you can add the MAC address of the wireless client network card that is allowed to access in MAC address filtering, and set it t
is simple enough to reduce the wireless router's operating mode from 802.11n to 802.11g or from 802.11g to 802.11b. Although the speed is reduced, but it brings stability benefits, so to a certain extent reduce the speed of transmission can make our wireless network more stable. As shown in the following illustration:
▲ Spin Down
This figure is shown at spee
1, set up wireless encryption
Anti-RUB network is the simplest and more effective one way is to encrypt the wireless network, considering the WEP encryption method is very easy to be cracked, so we strongly recommend that you choose WPA2 encryption, and select AES algorithm to ensure that no line by the security and p
outdoor orientation or omnidirectional antenna. For wireless network interconnection of remote outdoor sites, the high-gain outdoor orientation or omnidirectional antenna must be used together to achieve point-to-point connection, omnidirectional antennas support point-to-point connections 。
3. lightning arresters. In order to ensure the normal operation of the wireles
scenarios with concentrated communications, such as hotels, airports, stations, important departments, office buildings, and gathering places.
3. OMC data analysis: OMC traffic statistics are an important way to understand network performance indicators and reflect the actual running status of wireless networks. Through the analysis of its statistical data, we can find
wireless network you have searched has been encrypted. The following figure is a WPA-encrypted wireless network
3 Click Change advanced settings to enter the wireless network connection properties and remove the unre
creates wireless network "Mywlan", uses the key "12345678" to connect the test.
Note:
If the lower right corner of the network icon to open the "Wi-Fi" display as "off"
2. If the Device Manager appears "WAN Miniport (Network Monitor)"
3. After you enter the command to p
). scan the access point modprobe wlan_scan_sta 9 ). start wireless network card H0 ifconfig ath0 up get Nic information 10 ). wlanconfig ath0 list scan Nic information is as follows, default is the name of the wireless LAN, 00: d0: f8: e0: a8: 88 is the physical address of the wireless router, 54M is a
to wireless encryption, hiding the SSID is an effective way to after hiding the SSID, others will not be able to find your wireless network name, can effectively prevent the access of unfamiliar wireless devices, set up methods: Login Router Management interface Click "System Management"-"
power is very small and the frequency is very low, unexpected lesions may also be induced and should be vigilant.
How to avoid the harm caused by wireless radiation
The radiation of the wireless network depends on the transmit power. The more the radiation from the wireless launch point, the more intense the radiation
), and reconnect to the wireless network;
(2) If the above scheme (1) is invalid, please continue to find the desktop computer icon right click Management---Device Manager---network adapter inside find their own wireless card right click Properties---Power management---Remove the "allow the computer to tur
and more chip manufacturers are gradually able to provide WiFi Chip Solutions. This also increases the market competitiveness, reduces costs, and accelerates the popularization of the market. In addition to Broadcom, Cisco, Intel, Qualcomm Atheros, and mediatek have also launched related 802.11ac products. There are also a variety of grades, not only for enterprise level, but also for home market products.
Smart Home life
Thanks to advances in WiFi technology, the 802.11ac standard greatly impr
brand, you should also search for related comments online to make a trade-off.
3. Use WPA2 encryption only
The wireless N standard does not support WEP, so the connection speed with this type of encryption is limited to 54 Mbps, even with N standard devices. In addition, the first WPA version cannot even provide maximum wireless performance on N networks. Theref
devices from connecting to the network. This function is achieved by comparing the MAC address of the device that is trying to connect to the router and the MAC address of the device saved by the router. Unfortunately, this feature is usually turned off when the router is out of the factory, because it requires some effort from the user to make it work correctly, otherwise it will not be able to connect to
In Linux, the wireless network card is used to set up an AP. due to the need of the experiment, we need to set up a wireless AP. after a long time, we finally finished the setup. Www.2cto.com my machine is equipped with two NICs, the wired Nic is connected to the network through the
next time you Win8, you will know that you are automatically connected to this wireless network.
Enter the wireless network security key and, if necessary, click the Eye icon to the right of the key input box, and then click Next when you have finished typing.
The WIN8 system asks if you want to enable s
Problem one, the wireless signal is not searched
1. If you are really close to your wireless router, you can try restarting the wireless router
2. It could also be a cell phone problem. We can try to "scan" the Wi-Fi in the phone and refresh the wireless network list.
3
WDS wireless network expansion using OpenWrt on WHR-G300N V2Click OpenWrt
The hardware of Buffalo WHR-G300N V2 is the same as that of the WHR-G301, so you can use the firmware for it directly. If you haven't flushed OpenWrt in Buffalo WHR-G300N V2 or updated to 15.05, you can follow the procedure below:
Go to OpenWrt official website to download WHR-G301 firmware: update from official firmware or from Ope
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.