The use of wireless routers has become increasingly popular, so we should pay attention to its security performance and precautions when using it. here we will introduce it in detail.
The configuration features and precautions of the wireless route client are as follows.
Many organizations implement wireless network connections. However, due to the new concept of wireless networks, there is almost no detailed discussion about these settings. In this article, we will provide some tips to help you set up clients and access nodes, discuss how to set up wireless devices and the details about the special impact of standard line selection on wireless devices.
Precautions for setting the wireless route Client
The wireless network interface may contain PCI, USB, and PC card formats. USB devices should directly connect the computer to a powerful hub, and PCI and PC Card devices should be installed on the slot to provide the maximum exposure space for the antenna. Pay attention to moving cables away from antennas to minimize RF. Use protective cables and speakers wherever possible. Electronics ** will reduce the maximum bandwidth.
When setting the wireless client, check whether you should save the default settings. These settings will make your system run faster and compromise security issues. Some settings need to be configured in the Access Node. Make sure they are the same. The wireless route client settings are as follows:
Ad Hoc, or Peer-To-Peer Networking: some wireless devices can communicate without using access nodes. This capability increases the elasticity of the customer's system, but it may be critical to a ** Network Management Security Policy. Encryption Keys: these Keys play a role in data Encryption. The settings of the client and the Access Node must match. The default key is that allowed clients can be easily added to the network. To ensure security, the key should be changed regularly to prevent intruders from cracking the password.
Mobile IP: cellular wireless networks allow clients to walk from one wireless node to another. In a large enough network, the client can enter different subnets. Generally, an IP address may be generated **. However, using a mobile IP address to create a series of forwarding addresses allows the Access Node to reset the data to pass through the subnet. Mobile IP: it is not suitable for use in networks other than the Special continuous wireless network.
Rate Control: Rate Control allows you to define the speed of communication. Reduce the maximum bandwidth, increase the roaming range, and reduce the energy consumption, but get the most valuable features. The default setting is usually the best. Configurations that are suitable for different segments are allowed.
WEP: the encryption plan used by wireless standard (802.11b) is called Wired Equivalent Protection (WEP), which will compensate for physical security vulnerabilities. Not all wireless systems provide encryption. The default 802.11b is the 40-bit encryption that can be output internationally, but some US modes also support 128-bit encryption. Sometimes, the encryption in the default settings is disable. This option can be changed to enable.
WLAN Service Area: this value is similar to a network working group. clients in the same work Area can communicate with other nodes, configuring different WLAN service regions allows multiple types of wireless networks of the same type to overlap in the same physical area. Sometimes, the number of a service area is the default value, for example, 101. If you want to change its settings, security risks may occur.
The wireless route client sets whether you need multiple Network profiles.
Because wireless devices are always used on different networks, the seller's network devices always package wireless products. Especially for Windows 9x laptops, it does not support multiple network configurations. Ease of use is very important, especially for small office and home wireless settings.
The smallest network can store multiple network configurations for the same device. The most advanced and even convertible default printer, modem settings, regional code, remote code, and shared network configuration. These functions provide elasticity, but if the conversion is too complex, the configuration will fail. Remind you to carefully evaluate the network profiler to ensure the availability of your network. Even if the hardware is stable, you will be accused if the end user does not like this application.
The Access Point setting feature of the wireless route Client
For network design, Access Point is the most important component. It determines the number of clients that can be supported, the encryption level, Access control, login, network management, and client management, it manages all his belongings. Select the Access Node as carefully as you would when choosing a vro.
The network capability of Access Point, which detects its physical characteristics. 3Com's Access Point includes a "Power Base-T" connector that can work with CAT-5 cables. This facility is installed in a location where electricity is not easily obtained. This device includes a series of ports that can be configured or can be connected to an extended modem. Although this seems to be the opposite of a physical network, it allows custom routing packages and excessive concerns, and even sets up a temporary network (for example, in the trade of insufficient network bandwidth ). Other components include a USB or Bluetooth interface.
Access Point settings for wireless routing clients
In this section, we will explain the configuration of Wireless Access point. Other options will appear on the Access point configuration screen to help you configure the device. The initial configuration of Access Point varies with the vendor. The Access point of 3Com uses a crossover cable and a terminal. Proxim HomeRF wireless gateway uses the preferred wireless client for configuration. Other methods for setting Access point include Web, Ethernet, Telnet, or physical converter.
Some Access points require passwords. The default password is easy to obtain and makes network security vulnerable, especially when the device can be remotely configured. Be careful when changing the password. If the password is lost, you cannot change the device configuration. Resetting the system to clear the password will clear all network configurations.