Set connection secrets for Wireless Network Security

Source: Internet
Author: User
Tags strong password

The increasing popularity of the wireless network world is obvious to us. It is not easy for us to connect to a wireless network securely. Here we will introduce you to how to securely configure the network.

If the wireless network system does not take appropriate security measures, whether it is installed at home or in the office, it may cause serious security problems. In fact, some providers that provide Internet services for residential areas have already banned users from sharing Internet services with other non-authorized persons in their service agreements. An insecure wireless network may cause service loss or be exploited to launch attacks on other networks. To avoid similar wireless network security vulnerabilities, we will introduce several convenient wireless network security techniques. Use wireless encryption protocol

Wireless encryption protocol (WEP) is a standard method for information encryption on wireless networks. Currently, almost all wireless routers provide users with data encryption options. By using this function properly, you can avoid the details of your bank account (including passwords) it will not be intercepted by people who want to test it. However, it should be noted that the Wi-Fi access protection technology (WPA and WPA2) is more robust than the WEP protocol, so it plays a greater role in ensuring wireless communication security.

Use MAC address filtering for Wireless Network Security Settings

Under normal circumstances, wireless routers and access points have the ability to prevent unknown wireless devices from connecting to the network. This function is implemented by comparing the MAC address of the device trying to connect to the router and the MAC address of the device saved by the router. However, unfortunately, this feature is usually disabled when the router leaves the factory, because it requires some efforts of the user to make it work correctly, otherwise it will not be able to connect to the network. Therefore, by enabling this feature and only telling the MAC address of the wireless device in the router's own unit or in the home, we can prevent others from stealing their Internet connections to improve security.

But do not rely entirely on this measure. It can also be said that using MAC address filtering is not a life-saving solution for hackers who are desperately cloning MAC addresses and trying to connect to users' wireless networks, however, you must take this measure to reduce network risks.

Set a security password for Wireless Network Security Settings

It is critical to set a password for wireless Internet access. Selecting a strong password helps the security of the wireless network, but do not use the default password that is accompanied by the wireless router, or use words that can be easily identified from the dictionary or the birthday of the family.

Disable wireless network security settings when the network is not used

If your wireless network does not need to provide services 24 hours a week, you can disable it to reduce the chances of being exploited by hackers. Although many enterprises cannot leave the network, it is unrealistic to put this suggestion into practice. But one of the most significant improvements to system security is to disable it directly. Because no one can access a service that does not exist or is opened.

Wireless Network Security Settings-monitoring network intruders

Users should always monitor network activities and ensure that they can track their trends. The more users, especially administrators, learn about malicious hacker activities, the easier they will find coping strategies. Network administrators should collect logs about scanning and access attempts, and use a large number of existing statistical generation tools to make these logs more useful. You also need to set up a log server so that it can send a warning or email to the Administrator when a malicious activity is detected. I believe that understanding the danger is half the battle victory.

Change the Service Set Identifier and Disable SSID broadcast in Wireless Network Security Settings

The Service Set Identifier (SSID) is the identifier of wireless access. You can use it to establish a connection with the access point. This ID is set by the communication device manufacturer and each vendor uses its own default value. For example, "101" is used for 3COM devices ". Therefore, hackers who know these identifiers can easily enjoy your wireless service without authorization. You need to set a unique and unpredictable SSID for each wireless access point.

If possible, your SSID should also be prohibited from being broadcasted. In this way, your wireless network will not be able to attract more users by means of broadcasting. Of course, this does not mean that your network is unavailable, but it will not appear in the list of available networks.
Allow Internet access only for certain periods of time

Some of the latest wireless routers that are produced now allow users to restrict access to the Internet in certain periods of the day. For example, if you do not need to access the Internet from eight o'clock A.M. to six o'clock P.M. from Monday to Friday, simply enable your router settings to disable access during these periods!

Disable Dynamic Host Configuration Protocol for Wireless Network Security Settings

This seems like a strange security policy, but it makes sense for wireless networks. Through this policy, you will force hackers to crack your IP address, subnet mask, and other necessary TCP/IP parameters. Even if a hacker can use your wireless access point, he must know your IP address.

Disable or modify SNMP settings for Wireless Network Security Settings

If Your Wireless Access Point supports SNMP, You need to disable it or modify the default public and private identifiers. If you do not, hackers can use SNMP to obtain important information about your network.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.