Common security settings for wireless routers

Source: Internet
Author: User
Tags get ip

It is important for wireless network users to understand that no matter how secure a wireless network is used, there is no real security until End-to-end encryption is deployed. Although wireless technology has many usability advantages, wireless security is never the same as the security of a wired network.

dhcp-automatically get IP, or fixed IP?

The function of DHCP (Dynamic host Configuration Protocol) is to automatically assign IP addresses to each computer within a LAN, without requiring users to set IP addresses, subnet masks, and other required TCP/IP parameters.

It is divided into two parts: one is the server side (where it refers to a wireless AP or wireless router with DHCP service capabilities), and the other is a client (a wireless client device such as a user's personal computer). All IP network settings are centrally managed by the DHCP server and are responsible for handling the DHCP requirements of the client, while the client uses the IP environment data that is assigned from the DHCP server.

If the wireless AP or wireless router has DHCP enabled, providing dynamic IP for the host that is connected to the wireless network, it is easy for others to use your wireless network.

Therefore, disabling DHCP is necessary for personal or corporate wireless networks, except in public wireless "hotspot" areas such as airports and bars, which should turn on DHCP. The DHCP server is typically set to "not enabled" under the DHCP server settings for the wireless router. This allows you to find the wireless network signal and still not be able to use the network.

We give the suggestion is: use is not very common private network segment static way, it is best not to use 192.168.0.0-192.168.0.255 this common private network segment, let a person guess on.

WEP, WPA-WEP encryption, or WPA encryption?

Wireless network encryption provides security through the encryption of data in radio waves, which is mainly used for the confidentiality of link layer information data in WLAN. Now that most wireless devices have WEP encryption and WAP encryption, do we use WEP encryption or WAP encryption? It is obvious that WEP appears earlier than WAP, and WAP is better than WEP security.

WEP uses the symmetric encryption mechanism, the data encryption and decryption using the same key and encryption algorithm. When encryption is enabled, two wireless network devices must be configured to use encryption, with the same key and algorithm, to communicate. WEP supports 64-bit and 128-bit encryption, and for 64-bit encryption, the key is 10 hexadecimal characters (0-9 and a-f) or 5 ASCII characters, and for 128-bit encryption, the key is 26 hexadecimal characters or 13 ASCII characters.

Here's how you can make WEP more secure:

(1) Using multiple sets of WEP keys, using a set of fixed WEP keys is very insecure, and using multiple sets of WEP keys increases security, but note that the WEP key is stored in flash, so some hackers can access your network by acquiring any device on your network;

(2) If you are using an older router that supports WEP only, you can use the 128-bit WEP Key to make your wireless network more secure.

(3) Regular replacement of your WEP key.

(4) You can go to the manufacturer's website to download a firmware upgrade, you can add WPA support after the upgrade.

WPA (Wi-Fi Protected Access) addresses the security issues that WEP cannot solve. Simply put, the problem with the low security of WEP comes from the use of one key for each device share on the network. This key has unsafe factors, its scheduling algorithm on the weakness of the malicious hacker can be relatively easy to intercept and destroy the WEP password, and then access to the internal network resources.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.