Dispel threat-Wireless network anti-Black Complete introduction _ Internet Surfing

Source: Internet
Author: User

As the wireless LAN to radio waves as a data transmission medium, so the security issue will always bring home users more or less threat, and then we choose to support the WPA protocol in the number of IP806LM wireless router, as an example, hands-on teaching you to carry out Wireless LAN Security settings.

  Change the default wireless network name

Each wireless network has a distinguished name, known as the Wireless Network name (network name) or the service Set Identifier (services set IDentifier, SSID). All wireless routers or wireless APs have their own wireless network name, and all wireless network clients must provide the corresponding wireless network name before they can successfully establish a connection.

However, most manufacturers that produce wireless products will use their own name (or "default") as the default name for the wireless access point. Also, most wireless routers or wireless APs initiate the wireless network name broadcast mode (SSID broadcast) to enable the user to connect, allowing wireless devices in the coverage to detect wireless signals. However, these settings are open to wireless network hackers.

So after you purchase a wireless product, you first need to change the default wireless network name and turn off the wireless network name broadcast mode.

1. Like other wireless broadband routers, the IP806LM width is also supported for Web page management. Enter "http://192.168.0.1" in the browser (192.168.0.1 is the IP address of the wireless router).

2. After opening the Web page, login management interface, you can click on the main Menu "wireless" into the Configuration interface (Figure 1).

3. Uncheck the "broadcast SSID" in the configuration page to save the data.

Tip: If you want to connect to this wireless router, you need to manually add the SSID when configuring the wireless card.

  Establish access control Checklist

Most wireless routers or wireless APs allow users to create an Access control list using the Wireless Card access control (MAC address), and the wireless router or wireless AP only accepts the wireless card on the license list to connect. and the wireless network card that is listed in the Deny list is blocked from connecting to the wireless networks, also known as media access control address filtering (MAC addressing filtering).

The so-called MAC access control address is actually a physical address assigned by the vendor to the network card, consisting of 12 characters in hexadecimal notation to identify the location of the computer in the network. Users using the Windows operating system can find the MAC address of the NIC through the "Ipconfig/all" command.

The access control list established by using the MAC access control address of the wireless network card allows the home wireless router to only allow the client on the access control list to connect and avoid hacking into the home's wireless network.

1. In the wireless configuration interface mentioned above, you can see the two columns shown in Figure 2.

2. Here you can choose the right wireless client to access your local area network or the Internet.

3. Click the "Select Client" button to select the PC you want to access in the list (Figure 3). You don't have to worry about the user changing the IP address, because the limit is based on the hardware address (MAC address) of the network card.

  adopting WEP/WPA secrecy technology

Wired Equivalent PRIVACY,WEP is a data encryption algorithm for providing protection equivalent to a wired LAN. Using the technology's wireless LAN, the data for all clients and wireless access points is encrypted with a shared key, with a key length of 40 or 128 digits, and the longer the key, the more time the hacker needs to crack and thus provide better security protection.

WPA, an upgraded version of the IEEE 802.11 universal encryption mechanism WEP, is more sophisticated on security protection than WEP, mainly in the areas of identity authentication, encryption mechanisms and packet checking, and it also improves the management of wireless networks.

We recommend that users preferably choose a wireless product with WEP 128-bit encryption and WPA authentication to secure the data in the wireless LAN.

Or on the wireless page, click the "Settings" button after "wireless security" and go to the Wireless Security page (Figure 4). You can select the encryption method in the Drop-down menu on the page as needed.

WEP follows the 802.11B standard, the data is encrypted before transmission, but this encryption is not strong enough.

WPA-PSK (Wpa-psk is a version of WPA) is similar to WEP in that data is encrypted before transmission, but WPA is more secure than WEP and generally uses WPA.

  Using WEP:

Usually set to Automatic mode (Figure 5), with 64-bit encryption, you need to enter the key, the key value is 0~9 and a~f, a total of 10 bits. Using 128-bit encryption, you also need to enter the key, the key value is 0~9 and a~f, a total of 26 bits.

  Use WPA-PSK:

1. Enter http://192.168.0.1 in the browser (this value is the default IP for general home broadband routers). After you enter the Admin interface, you can see the wireless settings.

2. Enter the name of the wireless network you want to create (SSID), note the selected items in the Author box (Figure 6), these settings are very important.

3. Click "Wireless Security" after the "Settings" button, data encryption settings. Then choose the encryption method, select "Wpa-psk" Here, this is the most secure encryption method that the router provides IP806LM, then save after entering the password (Figure 7). Then set the wireless client to connect to this broadband router slightly.

4. On the client with the wireless network connection, enter the wireless network Configuration page of the Wireless Networking Properties window. Click the "Add" button to enter the SSID of the wireless network you want to connect to, select "Network Authentication" as "Wpa-psk", then select "TKIP" in the "Data Encryption" column and fill in the "Network Password" (Figure 8).

Tip: The data set above should be consistent with the data on the router.

The system will automatically connect to the destination network after this setting. You don't need to set up every time you connect to the network, unless the data on the router changes.

Information security has been a major problem in wireless network technology, using the above method to set up basically already can set up a security line for your WLAN. However, we need to remind you that, because different devices are set up differently, in the above setup operation, but also carefully read the purchase of the wireless product manuals.

5. If you have already started wireless data encryption (how to set up data encryption also in the "wireless network anti-black Raiders" will be explained in detail), you need to open the properties page of the wireless network connection, enter the "Network Name (SSID)" You need to use, "Network Authentication" to choose a different way, you can use or turn off according to need Data Encryption ", select the same network authentication and data encryption methods as the wireless router, by default, the" automatically provide this key for me "is checked, and you may want to deselect this option and manually enter the password set on the wireless router (Figure 4).

6. When you click on the "OK" button to save, the computer will connect to the designated wireless network. If you change the settings on the wireless router, you must set it up on your computer.

In this way, the premise of building a wireless LAN is to select DCHP automatic IP mode on the wireless router. Now, each computer in the WLAN can be set up according to the steps described above to complete the establishment of WLAN.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.