How to Set up wireless networks to prevent network leaks

Source: Internet
Author: User

With the rich economy, more and more users use laptops that are easy to carry, there are more or less network security problems, but they do not know how to set up wireless networks, here is a detailed introduction.

Now there are more and more units using wireless LAN. We can easily find a lot of wireless Internet signals by taking a laptop around the office building. However, these wireless Internet access signals are more or less prone to security risks. attackers who are a little familiar with wireless networks only need to perform some simple operations, the wireless network can easily obtain the privacy information in the LAN. In this case, wireless networks that do not take any security measures will naturally become a "channel" for information leaks ". So how can we protect the security of the wireless LAN and reject the network as a "channel" for external leaks? In fact, we can take a number of restrictions to prevent illegal attackers from stealing private information from the network through the wireless LAN at will.

Wireless network settings 1. Restrictions on wireless devices

Some may ask how to restrict wireless devices? Do you have to lock the wireless node devices in the Local Wireless LAN? In fact, for many models of wireless node devices, the default passwords they use at the factory are almost identical, so if we fail to change the password of the wireless node device in the Local Wireless LAN in time, then some illegal attackers may easily use the default user name and password to access the local wireless node device, so as to have all the management permissions of the Local Wireless LAN. Later, sometimes we encounter the embarrassing situation that we cannot log on to the local wireless LAN. To restrict unauthorized users from using a local wireless node device, we must remember to restrict the password of the local wireless node device in the first place and use a complicated password to replace the default password, otherwise, it would be equivalent to handing over your wireless network management rights to illegal attackers.

First, run the IE browser program in the local workstation system. In the pop-up browser address box, enter the default IP address of the wireless router, which is generally found in the operation manual of the wireless node device, for example, the default IP address used by the TP-LINK wireless router is often 192.168.1.1. After confirming that the IP address is entered correctly, click the Enter key to open the background logon interface of the wireless node device, and enter "admin" in the "user name" text box of the interface ", set the default password to null, and click OK to log on to the background logon page of the wireless node device.

In the left-side area of the background interface, expand the "System Tools" branch with the mouse, click the "Modify logon password" option, and display the area on the right of the corresponding "Change logon password" option, enter the original user name and password of the wireless node device correctly, and then enter the new user name and password in the "New User Name" and "new password" text boxes, click "save. In the future, when we need to manage the Internet parameters of the Local Wireless LAN again, we must use the new user name and password to log on to the background management interface of the wireless node device, in addition, it is recommended that new user names and passwords be kept confidential to prevent other users from disclosing their passwords.

Of course, if we find that the node devices in the Local Wireless LAN have been encrypted by illegal attackers and cannot access the local wireless LAN normally, we can forcibly restore the parameter settings of the wireless node device to the default state. For specific recovery methods, you can view the operation instructions of the corresponding wireless node device, generally, you only need to press the reset button in the control panel of the wireless node device to complete the parameter setting and recovery task.

Wireless Network Settings II. Restrictions on wireless network cards

We know that normal workstations often need to access nearby Wireless LAN networks through wireless Nic devices, while wireless Nic devices are the same as wired Nic devices, both are identified by the MAC address. It can be said that the MAC address is the unique identifier of the NIC device. Therefore, if you want to deny unauthorized access to a local wireless network through a wireless network card device, you can manually add the MAC address of the wireless network card device of the local workstation to the allowed access range of the wireless router device, however, wireless Nic devices that do not have the MAC address corresponding to the allowed access range naturally cannot access the wireless router device.

To restrict the use of wireless network cards, you must set the MAC address filtering parameters in the background management interface of the wireless router device, so as to fundamentally reject illegal attackers from using the wireless network to steal privacy information. The MAC address filtering method does not have high requirements on the use of switching devices and does not affect the overall running performance of the network. Therefore, it is easy to set up, therefore, this method is generally suitable for small-sized wireless networks and ordinary homes. To filter MAC addresses, You can import a valid MAC address list to a device on a wireless node. Only when the MAC address of a common workstation exactly matches the content in a valid MAC address table, A wireless node device allows a common workstation to communicate with a wireless network.

To make the MAC address filtering function take effect, we also need to return to the "Security Settings" branch and re-select the "firewall settings" option under the branch, in the display area on the right of the corresponding "firewall settings" option, select the "enable MAC address filtering" item, and select the "Default Filtering Rule" option on the corresponding settings page. Considering that we need to restrict wireless node devices to allow only local wireless Nic devices to access wireless networks, therefore, we also need to adjust the filter rule to "only allow enabled MAC addresses in the configured MAC address list to access the Internet ", in this way, the network card device of an illegal attacker or the wireless network card device that is not included in the address Filter list cannot access the wireless network normally, in this case, the wireless network will not become a "channel" for information leakage.
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.