Eight suggestions: Ensure the security of your wireless route connection

Source: Internet
Author: User
Tags strong password

Eight suggestions: Ensure the security of your wireless route connection. In today's Internet era, you will often encounter Installation Problems of wireless route connection security. The following describes the knowledge of wireless route connection security, this includes how to connect to a wireless route connection to secure your network.

Enterprise Internal LAN comprehensive construction description 1. Intranet enterprise Intranet) Construction 1. Basic information: how to share the Internet with the two computers after the Intranet is connected to broadband? Q: I have two computers in my house, they are in two rooms. I am now preparing to install a broadband network, but there is a problem that the Guangzhou broadband service provider has a list of Internet charges. I often receive phone calls from friends around me, all of which are about some IT problems, the advantages and disadvantages of layer-3 and layer-2 networks are compared.

China Telecom has completed the smooth implementation of backbone networks, namely, removing the provincial network layer and directly connecting man networks. With the increasing number of enterprises and individuals using wireless networks and wireless access, China Telecom's security problems have become increasingly prominent. More than 50% of people admitted that they had used others' wireless Internet access without explicit permission. This has to make us think about the question: how to prevent its users, especially the "neighbors", from stealing or stealing their wireless connections? Here, I will provide you with eight tips to ensure Wireless Network Security:

Use encryption technology

Currently, almost all wireless routers provide users with data encryption options. Using this function properly can avoid the possibility that their bank account details, including passwords, will not be intercepted. However, for wireless route connection security, you must note that WPA and WPA2 are more robust than WEP, so they play a greater role in ensuring wireless communication security.

Use MAC address filtering

Under normal circumstances, wireless routers and access points have the ability to prevent unknown wireless devices from connecting to the network. This function is implemented by comparing the MAC address of the device trying to connect to the router and the MAC address of the device saved by the router. However, unfortunately, this feature is usually disabled when the router leaves the factory, because it requires some efforts of the user to make it work correctly, otherwise it will not be able to connect to the network.

Therefore, by enabling this feature and only telling the MAC address of the wireless device in the router's own unit or in the home, we can prevent others from stealing their Internet connections to improve security. But do not rely entirely on this measure. You can also say that, wireless route connection security using MAC address filtering is not a life-saving solution for hackers who are desperately cloning MAC addresses and trying to connect to users' wireless networks, however, you must take this measure to reduce network risks.

Always use a password

It is critical to set a password for wireless Internet access. For wireless route connection security, selecting a strong password helps the wireless network security, but do not use the default password accompanied by the wireless router, do not use words that can be easily identified in the dictionary or the birthday of your family as passwords.

Disable a network when it is not used.

If your wireless network does not need to provide services 24 hours a week, you can disable it to reduce the chances of being exploited by hackers. Although many enterprises cannot leave the network, it is unrealistic to put this suggestion into practice. But one of the most significant improvements to system security is to disable it directly. Because no one can access a service that does not exist or is opened.

Monitor network intruders

Users should always monitor network activities and ensure that they can track their trends. The more users, especially administrators, learn about malicious hacker activities, the easier they will find coping strategies. Network administrators should collect logs about scanning and access attempts, and use a large number of existing statistical generation tools to make these logs more useful. You also need to set up a log server so that it can send a warning or email to the Administrator when a malicious activity is detected. I believe that understanding the danger is half the battle victory.

Do not Broadcast Wireless Network names

The name of the wireless network, also known as the SSID, should never be broadcast to the passengers. In addition, selecting an obscure and difficult-to-guess SSID is equivalent to a difficult problem for wireless network hackers, although he may solve this problem. Wireless route connection security considerations: Do not use some short words as the SSID, such as "router" is definitely not a good choice!

Allow Internet access only for certain periods of time

Some of the latest wireless routers that are produced now allow users to restrict access to the Internet in certain periods of the day. For example, if you do not need to access the Internet from eight o'clock A.M. to six o'clock P.M. from Monday to Friday, simply enable your router settings to disable access during these periods!

The computer has taken appropriate security measures

This is commonplace. You can check whether the system has installed the latest anti-virus software, installed the latest patch, and enabled the client firewall software. These measures can prevent Malware-based connections from reaching your wireless connection, thus protecting the wireless network. Of course, we do not deny some previous security measures here. You can find the previous security measures on the Internet and combine the measures described in this article, I believe you will be able to get a wireless route connection secure!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.