Wireless Router Security Settings (1)

Source: Internet
Author: User

Are you confused about network configuration? In the wireless router security settings, how should we select an IP address? What type of encryption should we use? How can we make the network more secure? This article is based on these issues and provides a detailed explanation of the mysteries 。

Questions about Wireless Router Security Settings

DHCP-automatically obtain an IP address or a fixed IP address?

DHCP (DynamicHostConfigurationProtocol) allows you to automatically assign IP addresses to each computer in the LAN, you do not need to set IP addresses, subnet masks, and other required TCP/IP parameters 。

It is divided into two parts: one is the server (here it refers to a Wireless AP or wireless router with DHCP service functions), and the other is the client (the user's personal computer and other wireless client devices) all IP network settings are centrally managed by the DHCP server and are responsible for handling the DHCP requirements of the client. The client uses the IP Environment Information allocated from the DHCP server 。

If the DHCP function is enabled on the Wireless AP or wireless router to provide dynamic IP addresses for hosts connected to the wireless network, others can easily use your wireless network 。

Therefore, disabling DHCP is necessary for personal or enterprise wireless networks, unless in public wireless "hot spots" areas such as airports and bars, the DHCP function should be enabled. Generally, under the "DHCP server" setting of the wireless router, set the DHCP server to "not enabled". This allows you to locate the wireless network signal, the network is still unavailable 。

We recommend that you do not use static private CIDR blocks that are not commonly used. Instead, use the common private CIDR blocks 192.168.0.0-192.168.0.255 。

Questions about Wireless Router Security Settings

WEP, WPA-WEP encryption, or WPA encryption?

Wireless Network Encryption provides security by encrypting the data of the radio receiver. It is mainly used to keep the link layer information in the wireless LAN confidential. Currently, most wireless devices have WEP encryption and WAP encryption functions, so do we use WEP encryption or WAP encryption? Apparently, WEP appears earlier than WAP, and WAP is more secure than WEP 。

WEP adopts symmetric encryption mechanism, and data encryption and decryption adopts the same key and encryption algorithm. After encryption is enabled, both wireless network devices need to communicate with each other and must be configured with encryption, with the same key and algorithm. WEP supports 64-bit and 128-bit encryption. For 64-bit encryption, the key is 10 hexadecimal characters (0-9 and A-F) or 5 ASCII characters; for 128-bit encryption, the key is 26 hexadecimal characters or 13 ASCII characters 。

Questions about Wireless Router Security Settings

Here we will show you how to make WEP safer:

(1) using multiple sets of WEP keys and a set of fixed WEP keys will be very insecure. Using multiple sets of WEP keys will improve security, but note that WEP keys are saved in Flash, therefore, some hackers can access your network by obtaining any device on your network;

(2) If you are using an old vro that only supports WEP, you can use a 128-bit WEPKey, which makes your wireless network safer 。

(3) Change Your WEP Key periodically 。

(4) You can download a firmware upgrade from the manufacturer's website. After the upgrade, you can add WPA support 。

WPA can solve security problems that WEP cannot solve, the low security of WEP comes from the fact that each device on the network shares a key. This key is insecure, the weakness of its scheduling algorithm allows malicious hackers to easily intercept and destroy the WEP password, and then access the internal resources of the LAN 。

WPA is a new technology that inherits the basic principles of WEP and solves the disadvantages of WEP. Because of its enhanced Algorithm for generating encryption keys, even if the group information is collected and parsed, it is almost impossible to calculate a general key. The principle is that, based on the general key, it is used together with the serial number indicating the computer MAC address and group information, generate different keys for each group information, and then use the key for RC4 encryption like WEP 。


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.