Wireless LAN Settings improve network security

Source: Internet
Author: User

How can we improve the security performance of network transmission technology? Here we will give a detailed description of the point-to-point working mode and network identifier.

What is obviously different from a wired LAN network is that a wireless LAN network transmits signals through a microwave, which is invisible and invisible, therefore, the signal transmission security of the wireless LAN makes many wireless Internet users a little worried. In fact, as long as we are familiar with the signal transmission mechanism of the wireless network, we can use some targeted security protection methods, we will be able to ensure the security of the wireless LAN.

Disable point-to-point working mode in Wireless LAN Settings

Generally, common workstations in a wireless LAN often have two basic working transmission modes: the basic architecture mode and the point-to-point working mode. When the wireless LAN network uses the basic architecture mode, all wireless workstations in the LAN need to use a wireless router device for signal processing. In other words, whether we are surfing the web content online, or share transmission and communication with other workstations in the same LAN. All data signals of the wireless workstation must go through the wireless router device. Most wireless LAN networks belong to this type.

If a wireless LAN network works in point-to-point mode, the interaction between the workstation and the workstation in the wireless LAN can be carried out directly without the need of a wireless router or other wireless node equipment. In some specific situations, this work mode is more conducive to the rapid network access of workstations. For example, if we want to share the transfer files with other workstations in the LAN, we can choose the point-to-point work mode. However, if we enable the point-to-point mode, illegal users in the vicinity of the local wireless network can secretly access important private information in the local network without knowledge, in this way, the security of local wireless LAN will be greatly reduced.

Wireless LAN Settings-reject Broadcast Wireless Network identifier

To make it easy for common workstations in a wireless LAN to quickly discover devices connected to a wireless node, each device on a wireless node basically has a network service ID name, this name is generally called the SSID identifier of a wireless node. A common workstation can establish a normal wireless network connection with a wireless node device only through this identifier. If you do not know the SSID identifier, therefore, normal workstations cannot be added to a wireless LAN. Therefore, to prevent unauthorized users from secretly using the local wireless network, we must try to prevent unauthorized users from knowing the SSID identifier information of the Local Wireless LAN.

Currently, the factory settings of many wireless node devices on the market allow wireless network identifier broadcast. Once this function is enabled, this means that the wireless node device will automatically publish the local wireless network identifier name information to all common workstations covered by the wireless network. Although the SSID identifier broadcast function allows you to easily join a local wireless network, it also allows some illegal users to easily find a local wireless network, in this way, the security of the local wireless network will be affected. To protect the security of the local wireless network, we strongly recommend that you disable the SSID identifier broadcast function.

Managing passwords for enhanced wireless nodes in Wireless LAN Settings

Once illegal users in the vicinity of a wireless LAN find a local wireless node, they often try to log on to the background management interface of the wireless node and modify its wireless network parameters, if they have guessed the password, the local wireless Internet access parameters may be modified randomly by illegal users, resulting in the Local Wireless LAN network not working properly. More seriously, once these illegal users change the background management password of the wireless node, even the local network administrator may not be able to enter the background interface of the wireless node to manage and maintain the wireless Internet access device.

Setting Wireless LAN: using encryption to protect wireless signals

In addition to the above methods to protect the security of the wireless LAN, there is also a more effective protection method, that is, to encrypt the wireless transmission signal, this method often has a high security protection effect.

Currently, there are two common encryption methods for wireless node devices: WEP encryption and WPA encryption. Among them, WEP technology is also called Peer-to-Peer security technology. Generally, RC4 symmetric encryption is performed at the network link layer. The key content of wireless Internet users must be exactly the same as that of wireless nodes, in order to access the network content correctly, this effectively prevents unauthorized users from secretly accessing the local wireless network through monitoring or other attack means. Normally, WEP encryption technology provides several key algorithms with 40-bit, 128-bit, or even 152-bit length for ordinary users. Once the wireless Internet access signal is encrypted by WEP, illegal users in the vicinity of the local wireless network cannot see the specific content even if they steal the Internet transmission signal through professional tools, as a result, the local wireless Internet access signal is not easy to leak, so the wireless LAN data transmission security and receiving security will be greatly improved. In addition, the higher the number of digits used for WEP encryption, the more difficult it is for illegal users to crack wireless Internet access signals, and the higher the security factor of local wireless networks.

However, WEP encryption technology also has obvious defects. For example, all users in the same wireless LAN often share the same key, and only one of them loses the key, then the entire Wireless LAN network will become insecure. Moreover, considering that the WEP encryption technology has been found to have obvious security defects, illegal users can often crack the encryption signal within a limited number of hours.

Due to the inherent deficiency of WPA encryption technology, another more secure encryption technology-the emergence of WPA, which can be seen as an enhanced product of WEP encryption technology, it is more secure and protective than WEP encryption technology, which includes TKIP encryption and AES encryption.
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.