How the home network protects wireless security

Source: Internet
Author: User
Tags command line range unique id

As we all know, no network is completely secure, even with all the protective measures in use. The goal of any security plan is to reduce the risk to an acceptable level based on demand and cost. For a home wireless network, as long as the following four steps, basically can protect the basic wireless network security:

First step: Hide ID

When you open your notebook or other mobile device and look for a wireless network, you can see a lot of network names, which are the service settings identifier (SSID). The default SSID is typically associated with the router's brand. For example, if you buy Tp-link, your SSID must begin with Tp-link. A hacker can easily know your router brand through your SSID. You can change the SSID to a name you like in a line-free management interface, at least to some extent to conceal your wireless route. Modifying the SSID is the easiest way to do it, and we can do better by turning off the SSID broadcast. Take the Linksys management interface for example, in the Setup option, the SSID broadcast can select Disable, which turns off the SSID. So your wireless network, for the average person, is hidden. At this point, in your own notebook, click the "View wireless Network" button. For example, in Windows XP, modify the Advanced Settings link, and then tap the Wireless Network Configuration tab. Click on the Add button in the Preferred Network section, then enter your modified SSID, click OK, and you can connect to your wireless network. The General people do not know your wireless network SSID, so security has been improved.

Step Two: Encrypt the network

At present, online popular, "10 minutes to crack the wireless router password", means to crack the WEP password. So it would be safer to use WPA, at least to create more trouble for hackers. After you set up encryption, you need to view wireless network properties on a computer that requires wireless Internet access, and you can enter a password in the Network Key dialog box to connect your PC to your wireless network using WPA encryption.

Step Three: Mac Filter

Each network device has a unique ID called a MAC address, typically in this format: 00-d8-a1-40-9f-62. You can use him to come outside the door of the intruder. Many routers allow you to set a range of MAC addresses that can be plugged into the Internet. This way you can tell the wireless router which is the MAC address of your own PC, and not be excluded from this range. How do I check the ID of the MAC address of my computer's network card? Select Start menu in Windows System, then run, enter "CMD" in the pop-up dialog box, and the Command line window appears after the carriage return. Enter Ipconfig/all in the Command line window. Look for this line named "Physical Address", which is the MAC address of the device.

Step Fourth: Qualifying IP addresses

Typically, a wireless router assigns an IP to each machine that is connected to a wireless network, but you can tell your wireless router to assign only a certain range of IP addresses, and your wireless router will not assign IP addresses to intruders if the computers in your network use all the IP addresses. For example, your home has two wireless internet access computers, you specify your wireless routing, Only 192.168.1.1 to 192.168.1.2, so that when your two computers are on the Internet, others can no longer allocate IP, and if you find that your computer is not assigned to IP, you know that the security downstairs to the thief to kill.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.