Measures to avoid illegal attacks in wireless networks

Source: Internet
Author: User

As the price of wireless internet equipment is gradually "popular", wireless internet equipment technology is gradually "mature", more and more units or even households are using wireless technology for networking. While enjoying the convenience of wireless networks, the security of wireless Internet is being valued by more and more users, so how can the wireless network refuse to be attacked illegally? This article is based on the wireless network encryption protocol, to recommend a set of very feasible for your friends, Help local wireless networks refuse to be attacked illegally!

Approaching Wireless Encryption protocol

Before using the wireless encryption protocol to protect a local wireless network from an illegal attack, we might as well approach the wireless encryption protocol and lift its veil. As you know, data files use a wireless network channel to transport a bit the same as ordinary mail, if we do not encrypt the data file directly in the wireless network transmission, then the wireless workstation around the local wireless network may be those who do not take the encryption protection of data files to intercept, Then the local data file sent out will disclose the privacy information.

If we do not want these data files to disclose privacy information, then we should encrypt the target data files before transmission, or take other security measures to ensure that those who do not know the decryption method of the workstation users can not access the specific data content.

At present, in the wireless network using ieee802.11b/g communication standard, in order to improve the security resistance of the network, the wireless Network encryption protocol widely used by ordinary users mainly includes WEP encryption protocol and WPA encryption protocol, in which WEP protocol is also called Wired Equivalent encryption protocol, This kind of wireless communication protocol is often those eager to produce and sell wireless equipment manufacturers in a relatively short period of time to put together the informal wireless encryption communication standards, at present, the wireless network encryption protocol has a considerable number of security vulnerabilities exist, the use of the encryption protocol wireless data information is vulnerable to attack.

The WPA protocol is also known as the Wi-Fi Protection Access Protocol, which is typically used to improve or replace a WEP encryption protocol with a significant security vulnerability, which can be used to encrypt the transmission of data information using two techniques, a technique that is a temporary key integrity technique, The WPA encryption protocol uses a 128-bit key under this technical support, and clicking a mouse for each packet can be used to change the key, which is compatible with current wireless hardware devices and the WEP encryption protocol.

Another technology is extensible authentication technology, with which the WPA encryption protocol provides wireless users with more secure, flexible network access, and is more secure and advanced than the WEP protocol.

Enable WEP protocol for common encryption

The WEP protocol is often used in the transmission of data that is not highly confidential in wireless networks, and is widely available to ordinary home users. Enabling the WEP protocol to protect local wireless networks is very simple, and now this article takes the DI-624+A model D-link wireless router as an example to give you a detailed introduction to the steps to enable the WEP protocol:

Run the IE browser program from the client first, and in the Browse window to enter the wireless router device default background management address, and then correctly enter the Administrator account name and password, access to the device's background management page, click on the page "Home" tab, and the corresponding options to set the page to the left of the display area click " Wireless network "project, on the right list area for the project, find the" Safe way "setting option, and click the Drop-down button next to the settings item with the mouse, and from the Drop-down list shown in Figure 1, we can see that the DI-624+A model D-link wireless router supports both the" WEP "Encryption protocol and" WPA "Encryption protocol;

Select the most commonly used "WEP" encryption protocol, after choosing the right authentication method, the general wireless router provides the user with the shared secret key, the automatic choice and the open system three authentication ways, in order to effectively protect the wireless network transmission information Security, we should choose "The shared Key" authentication method here. Then correctly enter the appropriate wireless network access password in the WEP Password text box. Then click the "Execute" button in the corresponding Settings page to save the settings above, and then restart the wireless router device so that we can successfully wirelessly encrypt the local wireless network in the wireless router.

After the WEP password protocol is enabled in the wireless router device, we must also properly set up the workstation of the wireless network to ensure that they have a smooth access to the content in the wireless network. When configuring wireless internet parameters for a normal workstation, we can click the "Start"/"Settings"/"Network Connections" command, in the Pop-up Network Connection List window, right-click the network connection icon for the wireless network adapter device, and execute the "Properties" command from the pop-up shortcut menu. Open the Wireless Network Connection Properties Settings window, click the Wireless Network Configuration tab in the window, locate the preferred network settings item in the corresponding Options settings page, locate the target wireless network node, and then click the Properties button on the corresponding page.

Then go to the Association Options Settings page, select the shared option at the network authentication settings for the page, and then click OK to complete the setup of the workstation wireless Internet parameters.

In the future, when a wireless workstation in a local wireless network wants to access a wireless network, just double-click the wireless network card device in the corresponding workstation, in the Subsequent Logon Connection dialog box, correctly enter the encrypted password that you have set up before, and then click OK in the Login dialog box, so that the access and transmission of the wireless networks is safe. Even if a normal workstation near a local wireless network intercepts the data that we transmit over the wireless channel, they will not be able to see the contents if they do not guess the password.

Although the WEP protocol ensures the security of wireless access for ordinary home users, but this encryption protocol also has the obvious flaw, because this Protocol's key fixed, uses the algorithm intensity is not very high, the initial vector only has 24 bits, some illegal users may use the Airsnort and so on specialized tool can easily carry on the crack, Therefore, for users with very high confidentiality requirements, as well as individual users, the use of WEP protocol often has a certain security risks, at this time they may choose a more secure WPA encryption protocol, to protect important privacy information of the wireless network transmission.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.