Wireless Security is an eternal topic and an important and important topic to be discussed. The following sections will introduce six wireless security technical specifications. We hope this article will play a role in solving wireless security issues.
Service Set Identifier (SSID), one of the wireless security technical specifications)
You can set different SSID for multiple wireless Access points and requ
earlier and has now been upgraded to WPA encryption. WPA is a standard-based and interoperable WLAN Security Enhancement solution, the data protection and access control level of existing wireless LAN systems can be greatly enhanced; WPA enhances the algorithm for generating encryption keys, even if hackers collect and parse group information, it is almost impossible to calculate a general key. The emergence of WPA makes network transmission more secure and reliable.
It should be noted that the
In terms of routing, we should pay more attention to the wireless route security settings. So what problems should we pay attention to in these aspects? Below we have summarized some points and hope to help you. For more information, see the document. At present, major brand manufacturers have added a variety of methods in the configuration design of wireless route routers, such as keys, prohibiting SSID broadcast, to ensure the security of wireless r
. However, if we enable the point-to-point mode, illegal users in the vicinity of the local wireless network can secretly access important private information in the local network without knowledge, in this way, the security of local wireless LAN will be greatly reduced.
To effectively prevent leakage of private information in the local network, we strongly recommend that you disable the point-to-point mode unless you have to enable this mode, once the information exchange tasks between workstat
How can we standardize the security of wireless networks? Here we will give a detailed introduction to network technical specifications for new users or network administrators.
Service Set Identifier (SSID) for wireless network technical specifications)
You can set different SSID for multiple wireless Access points and require the wireless workstation to display the correct
the local wireless network can secretly access important private information in the local network without knowledge, in this way, the security of local wireless LAN will be greatly reduced.
To effectively prevent leakage of private information in the local network, we strongly recommend that you disable the point-to-point mode unless you have to enable this mode, once the information exchange tasks between workstations are completed, point-to-point work mode must be disabled immediately.
ID of
address translation to hide the IP address of the internal host, others include service port filtering, 802.1X user identity authentication, VPN, and well-known SPI status packet detection.Wireless LAN generally has the following security measures:1. WEP Wired Equivalent encryption ).2. The identifier of the SSID service area.3. filter the MAC address of the wireless client device on the user side.4. Supports standard 802.1x Security Authentication P
that the wireless interface is working, you can use the following command to scan nearby wireless networks:$ Sudo iw dev wlan0 scan | less
Based on the scan results, you can get the network name (its SSID), its information strength, and which security encryption is used (for example: WEP, WPA/WPA2 ). From this point on, it will be divided into two routes: Good, easy, and slightly complex.
If the network you want to connect is not encrypted, you can
For general users, it is very important to understand the wireless route encryption method. This not only prevents others from bypassing the network, but also increases our network security, identity authentication is required for data transmission, which may affect the transmission speed. However, this is more than enough for ADSL with 1 mbps bandwidth. Therefore, we recommend that you encrypt the wireless router to Ensure network security. For the wireless route encryption method, the basic WE
proprietary.What is Karma?Karma is a way to respond to an STA (Wireless station, cell phone, tablet, etc) probe (Probe Request) by forging a bogus response packet (Probe Response). Let the client mistakenly believe that there is a WiFi hotspot in the range that has ever been connected, thereby cheating the client connection.Through the above explanation we can conclude that the third type of fishing method and the first two compared with one of the biggest breakthrough: you can get STA once con
. Third trick: Turn off or modify the SSID nameThe SSID is the name of the wireless network that appears when searching for a wireless network. For enterprise users, the name is designed to make it easier for employees to find and connect to their own corporate wireless networks, but for individual home users, exposing the SSID only leads to illegal intruders.
Failure phenomena:The two SSID emitted on the same AP, but the two SSID is in a different network interface, but it is found that the user will have a 54M rate when connected to the SSID1, but if the client is connected with SSID2, then the 11n or 11a rate will occur.Problem Analysis:First of all, see why all users Only connect to SSID 1 will appear 54M, because
password breaking progress or routing deadlocks (repeat the same PIN or timeout ). If the AP disables WPS or does not have a QSS drop, the following error occurs: WARNING: Failed to associate with XX: XX (ESSID: XXXX) 7. you can use the mac address to find the routing brand. Sometimes, When PJ is used, the SSID is usually changed to another bad judgment. You can open the following URL: http://standards.ieee.org/develop/regauth/oui/public.html Enter t
nearby wireless networks:
$ Sudo iw dev wlan0 scan | less
Based on the scan results, you can get the network name (its SSID), its information strength, and which security encryption is used (for example: WEP, WPA/WPA2 ). From this point on, it will be divided into two routes: Good, easy, and slightly complex.
If the network you want to connect is not encrypted, you can use the following command to connect directly:
$ Sudo iw dev wlan0 connect [
Preface
Today, the customer reported that ht_ap0 was programmed for the wireless serial number SSID, and his colleagues reported it to me after they changed it through the background. I think it is incorrect. Is it a wireless drive crash? That should be impossible to play...
Tracing
Our router regularly reports the data SSID. Who knows, the server is not saved to the database. I am very angry with this. Th
IntroductionBefore Wireless LAN is widely used, the most urgent problem is network security. Network integrity is a concern of IT professionals, business managers, and relevant personnel responsible for wireless infrastructure security. 802.11 is the first standard for wireless Ethernet. The standard covers many subsets, and each subset has different focuses. 802.11a, 802.11b, and 802.11g define the core physical layer specifications, 802.11i is designed to address the security issues in the 802
wireless LAN job security will be greatly reduced.
In order to effectively avoid the disclosure of privacy information on the local network, we strongly recommend that you remove the use of point-to-point mode, unless you have to enable it in the last resort, and once you have completed the information exchange task between workstations, you must immediately disable the point-to-point mode of work.
Deny broadcast wireless network identifier
In order to facilitate the common workstation in wi
As more and more users choose wireless networks to improve their mobility, the safety of wireless networks is also starting to get a lot of attention. It can be said that wireless is more difficult to protect than a wired network, because the number of fixed physical access points in a wired network is limited, and any point that a signal can achieve in a wireless network can be used.
At present, the major brand manufacturers in the wireless router configuration design has increased the key, th
network. Restart the computer and still be unable to search the network. No way, had to restart the route, not surprisingly the problem remains.
Careful observation of the wireless card lights, there is nothing unusual; touch it with your hands without overheating or smelling the odor. Check the wireless router, the wireless LED is flashing normally, and the temperature is within normal range. No line by, wireless network card hardware is normal, it seems that the problem should be in the rele
today, wireless routers are a number of broadband users of the necessary equipment for the family, wireless broadband for users to enjoy the digital life has brought a lot of convenience. However, wireless network due to transmission through the wireless signal, there are many netizens in the use of wireless routers, there has been wireless broadband was "rub net" problem. Be "rub net" not only speed will become slow, and chat record, personal photograph, account password and so on information a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.