Wireless Network Service Set Identifier (SSID) of a wireless router)
You can specify the Wireless Network Service Set Identifier (SSID) as needed. For example, you can specify the Wireless Network Service Set Identifier (SSID) as the company name or other. To ensure that the wireless network adapter is roaming between different APs, you must set the same Wireless Network Service Set Identifier (SSID) for these aps. Otherwise, roaming is not supported. Similarly, the Wireless Network Service Set Identifier (SSID) of the network adapter must be set to the same as the Wireless Network Service Set Identifier (SSID) of the AP. Otherwise, the network adapter cannot be connected.
Channels of wireless routers
If only one AP exists in the same region, the AP channel is optional. The default value is "automatic selection ". If several APS exist in the same region at the same time, you need to configure the channels of each AP to minimize the frequency interference between adjacent APs. Generally, for products that use American standards, the 11 channel is used. If three APs are placed in the same region, the channels can be set to 1, 6, and 11, in this way, it will not cause interference.
WPA/WPA2 encryption for wireless routers
The transitional wireless network security standard developed by the Wi-Fi Alliance is equivalent to the lite version of 802.11i. It uses the data encryption technology of TKIP (Temporal Key Integrity Protocal), although it still uses the RC4 encryption algorithm, however, a dynamic session key is used.
TKIP introduces four new algorithms: 48-bit initialization vector (IV) and IV sequence rule (IV Sequencing Rules), and Per-Packet Key Construction), Michael Message Integrity Code (MIC) and key re-acquisition/distribution. WPA greatly improves the security of data transmission in wireless networks, but it has not solved the security problem of wireless networks once and for all. Therefore, the enthusiasm of vendors for adoption does not seem high. Currently, Windows XP SP1 supports WPA.
802.1x Authentication for wireless routers
It is difficult to manage the static WEP Key. when changing the key, you must notify everyone. If a key is leaked, there is no security, and there is a serious security vulnerability in static WEP encryption, wireless listeners can obtain the WEP Key after receiving a certain amount of data.
802.1x was initially used for wired Ethernet authentication access to prevent unauthorized users from using the network. Later, it was found that 802.1x can be used for wireless networks to better solve the security access of wireless networks.
802.1x EAP-TLS implements two-way authentication between users and networks through digital certificates, which can prevent illegal users from using the network and prevent users from connecting to illegal APs.
802.1x uses dynamic WEP encryption to prevent the WEP Key from being cracked. To solve the problem of digital certificate issuance, TTLS and PEAP have been improved for TLS authentication. You can use a traditional user name and password to authenticate inbound traffic.
The selection of wireless routers is measured in your mind. You should be aware of which wireless router to choose.