first set the wireless device card to managed mode so that you can work properly with wpa_supplicant . You can do this by setting iwconfig_eth0= "mode managed" in /etc/conf.d/net .
It looks simple, doesn't it? However, we also need to configure the wpa_supplicant itself, which will be more cumbersome, depending on the level of security of the AP you are connecting to. The following example is extracted from the /usr/share/doc/wpa_supplicant-/wpa_supplicant.conf.gz and simplified, and
wireless network devices to take encryption measures to keep the wireless network away from security attacks.
The method of encrypting wireless network has a variety of different, different internet demand, can adopt different encryption method; Now this article to use the most common Tp-link model without wiring from the equipment for the set blueprint, to friends details wireless network encryption process.
First, reject the SSID external broadca
Are we free to use these wireless products when we buy them home? The answer is no, it's not casual in the process of using these wireless products, especially when there are no lines set up. The author of this article will introduce you to the use of wireless products in the process of security should pay attention to the misunderstanding, to help users create a more High-performance home wireless network.
Encounter and "Ann", Crisis:
The issue of wireless device security has been commonplace
In this article, the article next morning, on the Cisco AIR-SAP1602I-C-K9 this AP in the state of the FAT AP configured to surf the Internet in a step-up experiment. The configuration is divided into two parts, the first part can be configured in the CLI state of a management IP, the role of the IP is to manage, and LAN is not the same network segment, but also in the same network segment, it does not affect users to surf the internet, but if not the same network segment, the use of remote Web c
5.
Figure 4: Mobile Antenna2. Experiment WLAN settings It is very important to set up this experiment environment properly, because we only want to complete all the operations in this experiment environment. In the attack process described below, A client connected to the AP will be forcibly terminated. This attack may cause serious damage to wireless users in the neighboring region. To prevent users from being attacked, it is to protect users who do not belong to the lab WLAN. If the operatin
are solutions to all problems. As long as we perform the correct configuration according to the correct method, our network is still safe.
Service Set Identifier (SSID)
You can set different SSID for multiple wireless access points AP (AccessPoint), and require the wireless workstation to display the correct SSID to access the AP, so that users in different grou
There are many methods for configuring wireless routers. These methods are simple but practical. So I have studied the methods for configuring wireless routers. I will share them with you here and hope they will be useful to you. As more and more users choose wireless networks to improve the mobility of their work, the security of wireless networks has attracted much attention. It can be said that wireless networks are more difficult to protect than wired networks, because the number of fixed ph
this way, when the idle time exceeds a certain value, the wireless router will automatically disconnect from the Internet, when you connect to the Internet, you need to dial again. This reduces the chances of external intruders accessing the wireless router.
Wireless Network Security setting method 3: Modify the SSID and disable the SSID Broadcast Function
Go to the configuration page of the wireless route
Wireless Security is an eternal topic and an important and important topic to be discussed. The following sections will introduce six wireless security technical specifications. We hope this article will play a role in solving wireless security issues.
Service Set Identifier (SSID), one of the wireless security technical specifications)
You can set different SSID for multiple wireless Access points and requ
In terms of routing, we should pay more attention to the wireless route security settings. So what problems should we pay attention to in these aspects? Below we have summarized some points and hope to help you. For more information, see the document. At present, major brand manufacturers have added a variety of methods in the configuration design of wireless route routers, such as keys, prohibiting SSID broadcast, to ensure the security of wireless r
. However, if we enable the point-to-point mode, illegal users in the vicinity of the local wireless network can secretly access important private information in the local network without knowledge, in this way, the security of local wireless LAN will be greatly reduced.
To effectively prevent leakage of private information in the local network, we strongly recommend that you disable the point-to-point mode unless you have to enable this mode, once the information exchange tasks between workstat
How can we standardize the security of wireless networks? Here we will give a detailed introduction to network technical specifications for new users or network administrators.
Service Set Identifier (SSID) for wireless network technical specifications)
You can set different SSID for multiple wireless Access points and require the wireless workstation to display the correct
the local wireless network can secretly access important private information in the local network without knowledge, in this way, the security of local wireless LAN will be greatly reduced.
To effectively prevent leakage of private information in the local network, we strongly recommend that you disable the point-to-point mode unless you have to enable this mode, once the information exchange tasks between workstations are completed, point-to-point work mode must be disabled immediately.
ID of
address translation to hide the IP address of the internal host, others include service port filtering, 802.1X user identity authentication, VPN, and well-known SPI status packet detection.Wireless LAN generally has the following security measures:1. WEP Wired Equivalent encryption ).2. The identifier of the SSID service area.3. filter the MAC address of the wireless client device on the user side.4. Supports standard 802.1x Security Authentication P
that the wireless interface is working, you can use the following command to scan nearby wireless networks:$ Sudo iw dev wlan0 scan | less
Based on the scan results, you can get the network name (its SSID), its information strength, and which security encryption is used (for example: WEP, WPA/WPA2 ). From this point on, it will be divided into two routes: Good, easy, and slightly complex.
If the network you want to connect is not encrypted, you can
For general users, it is very important to understand the wireless route encryption method. This not only prevents others from bypassing the network, but also increases our network security, identity authentication is required for data transmission, which may affect the transmission speed. However, this is more than enough for ADSL with 1 mbps bandwidth. Therefore, we recommend that you encrypt the wireless router to Ensure network security. For the wireless route encryption method, the basic WE
proprietary.What is Karma?Karma is a way to respond to an STA (Wireless station, cell phone, tablet, etc) probe (Probe Request) by forging a bogus response packet (Probe Response). Let the client mistakenly believe that there is a WiFi hotspot in the range that has ever been connected, thereby cheating the client connection.Through the above explanation we can conclude that the third type of fishing method and the first two compared with one of the biggest breakthrough: you can get STA once con
. Third trick: Turn off or modify the SSID nameThe SSID is the name of the wireless network that appears when searching for a wireless network. For enterprise users, the name is designed to make it easier for employees to find and connect to their own corporate wireless networks, but for individual home users, exposing the SSID only leads to illegal intruders.
Failure phenomena:The two SSID emitted on the same AP, but the two SSID is in a different network interface, but it is found that the user will have a 54M rate when connected to the SSID1, but if the client is connected with SSID2, then the 11n or 11a rate will occur.Problem Analysis:First of all, see why all users Only connect to SSID 1 will appear 54M, because
password breaking progress or routing deadlocks (repeat the same PIN or timeout ). If the AP disables WPS or does not have a QSS drop, the following error occurs: WARNING: Failed to associate with XX: XX (ESSID: XXXX) 7. you can use the mac address to find the routing brand. Sometimes, When PJ is used, the SSID is usually changed to another bad judgment. You can open the following URL: http://standards.ieee.org/develop/regauth/oui/public.html Enter t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.