This article describes in detail how to encrypt wireless routes by using network keys and DHCP prohibited technologies, so as to prevent access by other users.
How to encrypt a wireless router? As more and more friends enter the "wireless School" family, the security of wireless networks has attracted much attention. Relatively speaking, wireless networks are more difficult to protect than wired networks, because the number of fixed physical access points in a wired network is limited, and any p
The rise of wireless networks has brought convenience to people's network life. So many users want to use wireless networks. However, many of my friends are not very clear about the wireless route connection settings. Let's introduce the Configuration Requirements in detail today.
In the pop-up wireless route connection settings interface, the SSID1 position in the "Network Name" has been automatically filled with the SSID of the selected wireless rou
There should be a lot of friends accessing the Internet through a wireless router. Have you noticed that your router is being watched by others? Is there an encrypted wireless router? Please refer to the following link for more information.
Relatively speaking, wireless networks are more difficult to protect than wired networks, because the number of fixed physical access points in a wired network is limited, and any point that can be achieved by the wireless network signal may be used. Therefor
working principles of both wired and wireless routes are basically the same: messages sent from the Intranet to the Internet are not blocked, however, information from external sources that want to enter the internal network will be forwarded to the Intranet computer only after identification and filtering. Based on this principle, this causes many Intranet BT users to be interrupted and slow during download. Of course, for wireless routers, we still need to make some additional settings to ach
server address. Note: Information such as IP addresses, subnet masks, gateways, and DNS servers are provided by broadband carriers. In addition, the ADSL of a fixed IP address also belongs to the static IP connection mode. After configuring the LAN port and WAN port, we need to configure the Wireless Parameters below. When configuring a wireless router, there is no step strictly. I suggest you configure it in the order on the wireless router configuration page.
2. Cisco wireless router configur
More and more people are using the wireless router feature to reinforce their network security. What security issues may occur when using wireless networks to access the Internet? How can we protect our privacy?
The wireless router function locks Security
As more and more friends enter the "wireless School" family, the security of wireless networks has attracted much attention. Relatively speaking, wireless networks are more difficult to protect than wired networks, because the number of fixed p
Some people always feel this way. When I access the Internet at home, if I change the router, the network speed suddenly changes. Why does the same working principle lead to different results? Next we will give you research.
Many of my friends may feel like this. After changing their own wired router to a wireless router, the stability and connection speed of BT download have obviously declined, or even cannot download BT. In fact, the working principles of both wired and wireless routes are bas
of wireless network parameters directly affects the quality of wireless Internet access. On the surface, the wireless parameter settings in a wireless router are nothing more than setting an SSID number. In actual applications, such as channel and wireless encryption, this will not only affect the speed of wireless Internet access, but also affect the security of wireless Internet access.
SSID number: SSID
your wireless network becomes a "unlimited" decoration. We recommend that you use WPA encryption.Wireless Router Security Settings: MAC address-DNA in the online worldSince each wireless network card has a unique physical address MAC in the world, you can manually set a list of wireless network card MAC addresses for a group of hosts allowed to access in the Wireless AP (or wireless router, implement physical address filtering? This requires that the MAC address list in the AP be updated at any
are explained. Rest assured that the setting interface is slightly different. The wireless setting parameters of most wireless routers and APs are similar .)
I. Initial settings of Wireless Parameters
Figure 1
From the settings bar on the management interface, we can see that this Wireless Broadband Router has the same configuration items as those of the same level of Wired routing products except for one more wireless setting, the setting methods are the same, so this article only describes th
Can we use these wireless products whenever we buy them? The answer is no. These wireless products are not casually used, especially when configuring wireless routes. In this article, I will introduce some misunderstandings about the security of wireless products and help you build a high-performance home wireless network.
Security:
Wireless device security has been a common topic, and many articles have introduced relevant content. The following is a simple example.
Many users directly connect
properly, because we only want to complete all the operations in this experiment environment. In the attack process described below, A client connected to the AP will be forcibly terminated. This attack may cause serious damage to wireless users in the neighboring region. To prevent users from being attacked, it is to protect users who do not belong to the lab WLAN. If the operating environment is located in a complex office, office building, or other area covered by many wireless networks, try
Client users can move in any region covered by different aps to maintain network connections. This is wireless roaming. When used, the wireless network adapter can automatically discover the AP with the highest signal strength nearby, and send and receive data through this AP to maintain uninterrupted network connections. I believe everyone has used mobile phones. When mobile phones are moved from the coverage of one base station to the coverage of another base station, they can provide uninter
choose the default blending mode if you don't know)
SSID: Service collection identifier, network name of wireless signal, modifiable, SSID is required.
Broadcast (SSID): Select "Off" to prohibit the router from broadcasting the SSID, and the wireless client will not be able to scan to the router's
strokes easy to settle the home wireless router security settings 1 2nd page: Five strokes easy to settle home wireless router security Settings 2
The third trick: Turn off or modify the SSID name
The SSID is the name of the wireless network that appears when you search for a wireless network. For enterprise users, the name is designed to make it easier for employees to find and connect to their own ente
based on this principle, has led to a lot of BT users in the download when the flow of stop and slow phenomenon. Of course, for the wireless router, we also need to make some additional settings to get the same download effect as the wired network. off SSID The SSID (servicesetidentifier) is typically the local area network name that is broadcast by the AP or wireless router, and is designed to allow c
working principle are basically the same: the internal network to the external network sent information will not be blocked, but to come from outside to enter the internal network information will be in the identification, screening will be transferred to the intranet computer, it is based on this principle, has led to a lot of BT users in the download when the flow of stop and slow phenomenon. Of course, for the wireless router, we also need to do some extra wireless router settings to get the
a broadband username and password
Attention matters
L Many users can not access the network because of the input of the wrong username password, please carefully check the input of the broadband username and password is correct, pay attention to distinguish between Chinese and English input, letter case, suffix is full input.
Static IP Address: Operators provide you with an IP address, gateway, DNS, and so on, in some optical fiber circuits have a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.