Wireless is not just as important as network security.

Source: Internet
Author: User

Author: Zhang Wei, Zhongguancun online
Page 1: Precautions for wireless connection

When wireless signals penetrate various obstacles to ensure free Internet access, some potential network security risks may gradually emerge. For wireless networks, all data is transmitted through electric waves. Therefore, in areas where wireless signals can be covered, any wireless client can receive the signal source of this access point. Therefore, compared with wired networks, wireless networks have a higher chance of eavesdropping or intrusion.

For all users who use wireless networks, appropriate security measures should be introduced from the first day of wireless network deployment, and the entire network can run securely and stably through reasonable use and control.

Precautions for wireless connection in public locations

For journalists who often participate in on-site press conferences and friends who are used to public wireless hotspots, it is necessary to disable the "document and print sharing function" of their systems. Generally, public hotspots are free to everyone, and access from one client to another is not prohibited.

On the other hand, we should also be good at distinguishing which hot spots are "Network traps" when accessing the Internet in public places ". Some hackers may set up a disguised wireless access device in public to attract users. When the signal strength of a disguised wireless device is very good, it is most likely to attract users to be cheated. At this point, the hacker can wait to receive the password entered by the victim, orVirusEnter the code in the victim's computer.

Select appropriate wireless signal coverage

We have always regarded the signal coverage of a wireless router as an important indicator of its performance. In fact, for home users, appropriate wireless signal coverage will effectively reduce the occurrence of network security events.

With the development of wireless technology, cracking and intrusion methods have become increasingly sophisticated. Many tools for cracking wireless encryption are gradually known. That is to say, when users take security measures, they may crack your network as long as intruders can find your network. However, if we properly control the coverage of signals, we can completely ensure network security.

Most wireless routers now have the power adjustment function, so that users can narrow their wireless network coverage so that they cannot find your wireless signal in the room or adjacent space, thus ensuring security.


Page 2nd: Disable hidden danger enable protection

Mac address control

As the price of wireless routers keeps decreasing, many individual users and even friends with only one computer are beginning to prefer component wireless networks.

In this case, we recommend that you use the Mac address control function to add the Mac address of the client to the list that allows access to ensure that others cannot access your wireless network.

Make good use of the access list

Enable the access control list function of the wireless router to specify which machines are allowed to connect to the access point, so that users can be aware of it and avoid other illegal connections as much as possible.

3. Disable 1. Enable

Disable SSID: The SSID allows wireless clients to identify different wireless networks. Generally, the SSID is broadcasted by the wireless router. The client can connect to the wireless network only after receiving this parameter or manually setting the same SSID as the AP. However, if we disable this broadcast, normal roaming users cannot connect to the network if they cannot find the SSID.

Disable DHCP: the purpose of disabling DHCP is that intruders will have to crack your IP address, subnet mask, and other required TCP/IP parameters, because if the intruder does not know your IP address, you cannot use your wireless network to perform any operations.

Disable SNMP: about SNMP settings, or change the public and dedicated shared strings. To prevent hackers from using SNMP to obtain important information about your network.

Enable wireless encryption: Compared with WEP encryption, the current WPA and even its second-generation technologies are quite complete. However, enterprise-level users may need to be strengthened on this basis, such as classification and authorization for users in the office area. However, for the network security of individual users, WPA can almost protect us from all attacks. All we need to do is add a password in the vro settings list to prevent illegal intrusion and protect the security of files on the terminal.

Summary:

In many cases, the security of wireless networks is not the cause of the product itself, but because we do not use suitable tools or make full use of the performance advantages of the product.

With the development of cracking technologies and related tools, some unconventional intrusion methods are also frequently used.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.