associated response message received. This is described later in the correlation phase. However, in the actual application, considering the security of wireless network, it usually chooses the authentication of access and key negotiation.
First stage: ScanningCustomer STA before the dart, the first to find their own satisfaction of the Pinkerton. Because Biaoju to meet the needs of the market, in different regions have different Pinkerton responsible for the business, and customers may move in
for WPA authentication:
1: PMK (PSK)
2: PTK (PMK, "pairwise key expansion", AA, SA, anonce, snonce)
Brief description of the four handshakes:
1: The Wireless Access Point AP sends a random number anonce to the client Sta.
2: STA receives anonceThen, select a random number snonce, calculate the PMK (PSK) using the WPA password (passphrase) and the ap ssid, and useThe PRF-X function is used to calculate the PTK, and the first 16 bytes of the PTK a
an internal network, he can use a malicious computer to intercept or even modify the network data transmitted by two legitimate swords by forging a gateway.
Ii. Common wireless network security measures
Based on the above security threats to wireless networks, it is not difficult to find that "Access Control" is the most direct measure to ensure the security of wireless networks. At present, the wireless network security measures are basically used to defend intruders at the access level. Commo
are only 1-3 dB. (In the future, we can take some time to talk about the antenna gain, at present, it is easy to understand that the larger the number of dB, the stronger the antenna's sending and receiving capabilities) the wireless router is 2-5 dB. To transmit signals to some closed corners, many people usually choose to replace larger-gain antennas on wireless NICs or routers, or choose enterprise-level wireless routers with higher output power, in this way, the intensity of the radio wave
H3C has always been committed to high-end network products, and its self-developed WA1208E is widely applied in wireless city networks. Its stability, practicability and security have been well received by everyone. Today, we will take WPA/WPA2 encryption as an example to explain how to set the WA1208E wireless encryption mode.1. First, create the SSID name [H3C] ssid wa1208New
We should avoid being hijacked while using routers to protect our privacy and property security.
A, hidden wireless signal name (SSID number) so that people do not search. After being hidden, no one can scan your wireless signal. You must also know the SSID number and password if you want to connect. Don't casually tell someone about your wireless router's SSID
();For (INT I = 0; I Stringbuilder. Append ("index _" + new INTEGER (I + 1). tostring () + ":");// Convert scanresult information into a string package// Include bssid, SSID, capabilities, frequency, and levelStringbuilder. append (mwifilist. Get (I). tostring ());Stringbuilder. append ("/N ");}Return stringbuilder;}
// Obtain the MAC addressPublic String getmacaddress (){Return (mwifiinfo = NULL )? "Null": mwifiinfo. getmacaddress ();}
// Obtain the
are using a 11g product, the three encryption methods are compatible. However, we do not recommend that you choose WEP, an old and easier-to-crack encryption method.
Step 2: Modify the default user name and password
After setting wireless encryption, we need to modify the Default Login username and password of the wireless router. Why? The reason is very simple, because the default user name and password set by the wireless router of the same model or even the same manufacturer are almost the s
functionality required for configuration is the same.
The first step is to modify the SSID
After landing router configuration interface, click on "Wireless Installation"? "Manual Wireless Internet Installation"
The following figure shows that the SSID in the default state of the router is DLink, while the SSID is broadcast state.
Modifying the
Original article: Grassroots Maintenance-Router network
On the Internet to see how to prevent the problem of hijacked routers is very good, it is true that we use the router at the same time should be prevented from being hijacked to protect our privacy and property security. Today, I share my personal experience of preventing routers from being hijacked.
A, hidden wireless signal name (SSID number) so that people do not search. After being hidden,
-Black capabilities, and security logs. With the built-in firewall function of the router, you can set different filtering rules to filter all abnormal information packets from the Internet, so that internal network users can access the Internet with peace of mind.
Pay more attention to wireless network security
Wireless networks are more vulnerable to intrusion than wired networks for users who access wireless networks in their homes, because the computers at the attacked end do not need to be
page. If it succeeds, they will immediately gain control of the vro switch.
2. Use encryption
All wireless networks provide some form of encryption. As I mentioned before, as long as the attacking computer is within the valid range of the wireless router/repeater, it will have a great opportunity to access the wireless network, once it can access the internal network, all the data transmitted in the network is transparent to him. If the data is not encrypted, hackers can use some packet sniffin
service area identifier (SSID)
Generally, each wireless network has a Service Identifier (SSID). When a wireless client needs to join the network, it must have the same SSID. Otherwise, it will be "REJECTED ". Generally, the router/repeater device manufacturer has the same default SSID in their products. For example,
technology of these devices should be the same.
3. Modify the default service area identifier (SSID)
Generally, each wireless network has a Service Identifier (SSID). When a wireless client needs to join the network, it must have the same SSID. Otherwise, it will be "REJECTED ". Generally, the router/repeater device manufacturer has the same default
devices should be the same.
Home Network Security Settings 3. Modify the default service area identifier (SSID)
Generally, each wireless network has a Service Identifier (SSID). When a wireless client needs to join the network, it must have the same SSID. Otherwise, it will be "REJECTED ". Generally, the router/repeater device manufacturer has the same default
something. You only need to follow the five steps below to protect your home wireless network.
Step 1: Change the default administrator password of the vro
Basically, all routers provide a default user ID and password. Because this password is well known, you must change this default password. You can change it by running the vro installation and Configuration Wizard. This operation is simple.
If the router you are using does not provide such a wizard, you can use a browser to connect to the ro
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.