What should I do if the wireless network is stolen? How can we improve the security of wireless networks?

Source: Internet
Author: User
Tags administrator password
Today, many of our important data and communication contents are transmitted over wireless networks. Many insecure factors are hidden in networks accessible to everyone within the receiving range. If the wireless password is disclosed due to improper use or lack of protection awareness, the network may be compromised. Light users will be preemptible bandwidth, resulting in network freezing, and severe users will suffer from network attacks and data theft, resulting in losses.
This article describes in detail how to improve the security of wireless networks. The configuration interface TP-LINK VroFor example.
The following describes feasible security protection measures from three aspects: router management, wireless security, and usage habits.
Security management router
A. Set a secure administrator password
Set complex vro administrator passwords. Do not set common simple passwords such as admin and 123456. The administrator password is like a password for opening a safe deposit box. If this password is easily guessed, information about important items in the safe box will be leaked and lost. Therefore, to ensure the security of the wireless password and other configuration information on the vro management interface, change the administrator password to an uncommon password.
B. Do not use third-party management software
If your router is our cloud router, please use the TP-LINK APP management, do not use third-party client software. Common third-party router management software include: 360 vro assistant (vro guard), Tencent vro manager, rising vro security guard, and master routing optimization. Use NonManagement Software Management Router launched by TP-LINK, may lead to router function exception, data leakage, etc. Use a browser to log on to the vro WEB interface for management.
Multiple wireless settings to protect network security
A. Set high-security wireless encryption
An unencrypted wireless network is like a unlocked door, and theft can easily access the network. Set a complicated wireless password to improve wireless security. We recommend that you set the wireless password to a combination of letters, numbers, and symbols, and the length should be at least 12 characters.
Note:If you use a router on the traditional interface, go Wireless security settings, Select WPA-PSK/WPA2-PSK,Encryption AlgorithmSelectAES, and set a password of no less than 8 bits.
B. Set wireless access control
Wireless access control is a more advanced measure of wireless security. After obtaining the key (wireless password), you need to print your fingerprint or scan your face to open the door. After configuring wireless access control, only specific terminals are allowed to access the wireless network. In this way, illegal terminals cannot connect to the wireless network even if they enter the correct wireless password. In Application Management, Enter Wireless Device Access control  Set:
Note:The router on the traditional interface Wireless Settings  >  Wireless MAC Address Filtering, Enable filtering, Filter rulesSelect The MAC Address access to this wireless networkAnd add wireless devices that only allow access to the wireless network.
C. Set guest network
The guest network and the Master network are two wireless signals sent by the router. The Master network is used for long-term connection and the guest network is used by visiting guests. The two wireless networks are enabled independently, and the visitor network can also be switched on and off regularly as needed. The access permission can also be set for the visitor network, ensuring the security of the Master network. In Network StatusSet the guest network in:
Note: touch-screen routersThe wireless password of the guest network is automatically generated at random and regularly updated. You can view the dynamic password of the guest network on the screen.
D. Disable wireless signal broadcasting
If the terminals using the wireless network are basically fixed and all terminals are connected to the wireless network, you can disable wireless broadcasting. Wireless terminals that have already connected to the signal are not affected, but terminals that have never connected to the signal cannot find the wireless signal, which improves wireless security to a certain extent.
E. One-click kill of illegal terminals
You can often observe the terminal status on the vro management interface, and check whether the list of connected devices is consistent with the actual status of the connected devices to determine whether the devices are hacked. If a suspicious device is connected to its own network Device ManagementA key is used to disable devices that cannot be connected.
Standardized use habits improve security
A. Do not use WiFi universal keys and other network software
If you have installed the network software, the software will upload your wireless network name and password to the network server to share with the public, everyone can connect to your wireless signal through the network software. Therefore, to prevent wireless password leaks, please use the network software with caution.

For more information about the dangers of the network software, seeHow does a wireless router defend against network hacking?

B.Change Wireless password periodically

Sometimes, we may accidentally disclose the password or get hacked. To avoid many insecure factors when using the same wireless password for a long time, we recommend that you change the wireless password periodically to ensure the security of the wireless network.
C. Regular detection of computer viruses
Safe use of the network, the most important thing is the awareness of network security, regular detection of computer viruses, careful installation of firewall interception software, open the operating system firewall and so on.
 
The above measures may not be implemented one by one, but you need to be aware of the importance of network security and the measures that can be taken to develop good usage habits in the future, fundamentally guaranteeing your (wireless) network Security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.