FAQs about Wireless Router Security Settings

Source: Internet
Author: User

There must be new problems in the new development. This is a certain philosophy. Therefore, there are also many security problems in the face of the ever-expanding wireless network. This section describes how to set up a wireless router safely.

Questions about Wireless Router Security Settings

DHCP-automatically obtain an IP address or a fixed IP address?

It is divided into two parts: one is the server side (here refers to a Wireless AP or wireless router with DHCP service functions ), and the other is the client (the user's personal computer and other wireless client devices )? All IP network configuration information is centrally managed by the DHCP server and is responsible for handling the DHCP requirements of the client. The client uses the IP Environment Information allocated from the DHCP server?

If the DHCP function is enabled on the Wireless AP or wireless router to provide dynamic IP addresses for hosts connected to the wireless network, can someone else easily use your wireless network?

Therefore, it is necessary to disable DHCP for personal or enterprise wireless networks, unless at the airport? DHCP should be enabled in public wireless "Hotspot" areas such as bars? Generally, set the DHCP server to "disabled" under the "DHCP server" setting of the wireless router? In this way, even if the wireless network signal can be found, the network still cannot be used?

We recommend that you use static methods that are not commonly used for private CIDR blocks. Do not use the common private CIDR blocks 192.168.0.0-192.168.0.255?

Questions about Wireless Router Security Settings

WEP? WPA-WEP encryption, or WPA encryption?

Wireless Network Encryption provides security through data encryption on the radio receiver. It is mainly used for the confidentiality of link layer information data in the wireless LAN? Currently, most wireless devices have the WEP encryption and WAP encryption functions. Do we use WEP encryption or WAP encryption? Apparently, WEP appears earlier than WAP, and WAP is more secure than WEP?

WEP adopts symmetric encryption mechanism. Does data encryption and decryption adopt the same key and encryption algorithm? After encryption is enabled, two wireless network devices must use encryption to communicate with each other. Do they have the same key and algorithm? WEP supports 64-bit and 128-bit encryption. For 64-bit encryption, the key is 10 hexadecimal characters (0-9 and A-F) or 5 ASCII characters; for 128-bit encryption, is the Key 26 hexadecimal characters or 13 ASCII characters?

Questions about Wireless Router Security Settings

Here we will show you how to make WEP safer:

(1) using multiple sets of WEP keys and a set of fixed WEP keys will be very insecure. Using multiple sets of WEP keys will improve security, but note that WEP keys are saved in Flash, therefore, some hackers can access your network by obtaining any device on your network;

(2) If you are using an old vro that only supports WEP, you can use a 128-bit WEPKey, which will make your wireless network safer?

(3) regularly change your WEP Key?

(4) Can you download a firmware update from the manufacturer's website and add WPA support after the upgrade?

What security issues cannot be solved by WEP? To put it simply, the low security of WEP comes from the sharing of one key by each device on the network? This key has an insecure factor. the weakness in its scheduling algorithm allows malicious hackers to easily intercept and destroy the WEP password and access the internal resources of the LAN?

Is WPA a new technology that inherits the basic principles of WEP and solves the disadvantages of WEP? Since the algorithm for generating encryption keys is enhanced, even if the group information is collected and parsed, it is almost impossible to calculate the general key? The principle is to generate different keys for each group based on the general key and the serial number indicating the computer MAC address and group information? Then use this key for RC4 encryption like WEP?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.