how to prevent network attacks!
We take DIR-605 wireless router as an example, to see what needs to be set, we can avoid being rubbed.
Step 1: Modify the SSIDLog on to the vro configuration page and click "wireless installation ".
As you can see, the SSID in the default vro status is dlink and the SSID is broadcast.
Modify the SSID name to testwpa.
regulations.
Some NAC solutions may include network intrusion prevention and detection capabilities. However, you want to make sure that the solution is also dedicated to providing wireless protection functionality.
If your client is running WindowsServer2008 or above and WindowsVista or more versions of the operating system, you can use Microsoft NAP functionality. In addition, you can consider third-party solutions, such as the packetfence of open source software.
7. Do not trust the hid
buildings. Therefore, it is very easy for someone to intrude into the network ." Therefore, WLAN security measures have a long way to go.
Security measures for wireless LAN
1. Use wireless encryption protocols to prevent unauthorized useUser
The most basic method to protect wireless network security is encryption. You can enable WEP Encryption By simply setting AP, wireless network card, and other devices. The wireless encryption protocol (WEP) is a standard method for encrypting traffic on wir
from security attacks.
There are a variety of methods for wireless network encryption, different Internet needs, you can use different encryption methods; now this article is to use the most common TP-LINK Model Wireless routing equipment for the configuration of the blueprint, introduce the wireless network encryption process to your friends in detail.
1. Refuse to broadcast SSID externally
We know that the reason why other people can secretly share
address MAC in the world, you can manually set a list of wireless network card MAC addresses for a group of hosts allowed to access in Wireless AP or wireless router, implements physical address filtering. This requires that the MAC address list in the AP be updated at any time.
Setting MAC address filtering is too heavy for large wireless networks, but not for Small wireless networks, so we should not be bothered. The MAC address can be forged theoretically, so it is a low-level authentication
Nowadays, wireless router is a necessary device for many broadband users, wireless broadband has brought a lot of convenience for users to enjoy digital life. However, wireless network transmission through the wireless signal, there are many netizens in the use of wireless routers, wireless broadband has been "rub the net" problem.1. Turn off SSID broadcastsSSID is the name of the wireless network, when the wireless network is set up, users will gener
following information BSSID the address of the access point, Here mainly refers to a small range of wireless devices connected to obtain the address, for example, two laptops through the wireless network connection, both sides of the wireless network card assigned address.The name of the SSID network, when we search for a network, it is this to distinguish between each of the different network access points.Capabilities Network access performance, he
We should avoid being hijacked while using routers to protect our privacy and property security.
A, hidden wireless signal name (SSID number) so that people do not search. After being hidden, no one can scan your wireless signal. You must also know the SSID number and password if you want to connect. Don't casually tell someone about your wireless router's SSID
LinkSys Wireless routers on the market as an example to see the wireless router security settings.
The LinkSys Wireless Router uses a smart Wizard to set up a wireless router to help you. Therefore, many friends may not know how many IP addresses they have configured, but even the IP addresses of the wireless router. Here is a simple method to obtain this information. In most cases, the Windows operating s
We must be familiar with computer operating system vulnerabilities. In fact, vrouters and computers also have operating systems and vulnerabilities, this article describes in detail some problems related to the Linksys vro security vulnerability and how to prevent it. After research, the Linksys router has a security vulnerability. Attackers can remotely hijack the Link
This article describes how to configure a linksys wireless router, I hope this article will give you a better understanding of router settings.1. Buy a wireless router to better experience wireless Internet access. In addition to running the wizard on the CD, set a linksys wireless router, another method is to enter the router configuration page to configure the router, which is also the most common method.
, and workstation on the network. You can change the key frequently to increase network security. When changing the key used by a wireless device, remember to change the keys for all radio devices and Access Points on the network at the same time.
2. Disable the Broadcast SSID.
To be able to communicate, the wireless router and the host must use the same SSID. During communication, the wireless router first
settings, then your wireless network becomes a "unlimited" decoration. We recommend that you use WPA encryption.
Wireless Router Security Settings:MAC address-DNA in the online world
Since each wireless network card has a unique physical address MAC in the world, you can manually set a list of wireless network card MAC addresses for a group of hosts allowed to access in the Wireless AP (or wireless router, implement physical address filtering? This requires that the MAC address list in the AP b
is no effective connection with the telephone line, separator, ADSL modem. Connect the phone crystal head of the telephone main LINE to the separator marked with "LINE" port, and the separator marked with "MODEM" port to the adsl modem marked with "LINE" port through the telephone LINE, the lanport of the ADSL modem is connected to the WAN port of the wireless router through the network cable. The separator is marked with the "PHONE" port, which can be connected to the telephone, and can access
First of all, the Android code connected to WiFi a few steps : (The following refers to the specific API function self-examination ha, write the time by virtue of the impression of roughly written down)Reprint please specify the source:Fat Tiger : HTTP://BLOG.CSDN.NET/LJPHHJ1. First to turn on the wifi connection switch, mwifimanager.setwifienabled (TRUE)2. Geta list of WiFi connections by getting ListMwifimanager. getscanresults)3. Get the list list. (Mwifimanager. getconfigurednetworks)4. (1)
What is WDS?
The full name of WDS is Wireless Distribution System, which is a Wireless distributed System. In the wireless application field, he used to help communication between wireless base stations and wireless base stations.
In terms of home applications, the function of WDS is to act as a repeater for wireless networks. by enabling the WDS function on a wireless router, it can extend and expand wireless signals, so as to cover a wider range. To put it bluntly, WDS enables Wireless AP or
Setting up Wi-Fi with the Command lineSIMON MONKThis tutorial works best if your router is broadcasting the SSID. Make sure the "broadcast SSID" set up on your router! This could not work with "private" SSID setupsSetting up WiFi in occidentalis, is also pretty straight forward. You just need to add the name of your wireless network (its
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.