Nine tips for securing a wireless network security connection

Source: Internet
Author: User
Tags snmp strong password

Wireless network systems can cause serious security problems if they do not take appropriate security measures, whether the wireless system is installed at home or in the office. In fact, some providers of Internet services for residential areas have banned users and other unauthorized people from sharing networking services in their service agreements. An insecure wireless network can cause services to be lost or exploited to launch attacks on other networks. To avoid some of the similar wireless network security vulnerabilities, here we introduce several convenient wireless network security techniques.

Using the Wireless Encryption protocol

Wireless Encryption Protocol (WEP) is a standard method of information encryption on a wireless network. Today's production of wireless routers almost all provide users with the choice of encrypted data, the proper use of this feature can avoid their own bank account details (including passwords, etc.) will not be intercepted by malicious people. However, it is important to note that the Wi-Fi Protected Access technology (WPA and WPA2) is more robust than the WEP protocol and therefore has a greater role in securing wireless communications. The

uses MAC address filtering

Under normal circumstances, wireless routers and access points have the ability to prevent unknown wireless devices from connecting to the network. This function is achieved by comparing the MAC address of the device that is trying to connect to the router and the MAC address of the device saved by the router. Unfortunately, this feature is usually turned off when the router is out of the factory, because it requires some effort from the user to make it work correctly, otherwise it will not be able to connect to the network. Therefore, by enabling this feature and simply telling the router the MAC address of the wireless device in the unit or home, we can prevent others from embezzling their Internet connection to enhance security.

But do not rely entirely on this measure, or it can be said that using MAC address filtering is not a panacea for hackers who are hell-bent on cloning MAC addresses and trying to connect to a user's wireless network, but you should use this measure to reduce network risk.

Setting a security password

Setting a password for wireless Internet access is critical. Choosing a strong password helps to secure your wireless network, but do not use the default password that accompanies the wireless router, or use a word that can be easily detected in a dictionary or a family's birthday.

Turn it off when you are not using the network

If a user's wireless network does not require 24 hours of service per week, you can reduce the chance of being exploited by the hacker by shutting it down. While many companies are not able to leave the network, it may not be realistic to put this recommendation into practice. But one of the most significant improvements to a system's security is to close it directly. Because no one can access a service that does not exist or open.

Monitors network intruders

UsersNetwork activities should be monitored and the trend tracked. The more users, especially administrators, learn about malicious hacking, the easier it is to find a coping strategy. Network administrators should collect logs about scans and access attempts, and make use of existing large numbers of statistics generation tools to make these logs more useful information. You also set up a log server to send alerts or e-mail to an administrator when it discovers that a malicious activity does occur. The author believes that understanding the danger is equivalent to winning half of the battle. The

Changes the service Set identifier and prevents the SSID broadcast

Service Set Identifier (SSID) as the identity identifier for wireless access, which the user uses to establish a connection to the access point. This identity identifier is set by the communication device manufacturer, and each vendor uses its own default value. For example, 3COM devices are used "101". As a result, hackers who know these identifiers can easily enjoy your wireless service without authorization. You need to set up a unique and unpredictable SSID for each of your wireless access points.

If possible, you should also prohibit your SSID from broadcasting outward. In this way, your wireless network will not be able to broadcast to attract more users, of course, this is not to say that your network is not available, but it will not appear in the list of available networks.

allows internet access only for certain periods of time

Some of the newest wireless routers now produced allow users to limit access to the Internet to certain periods of the day. For example, if you don't need to access the Internet from Monday to Friday between 8 o'clock in the morning and 6 o'clock in the afternoon, simply turn on your router settings to disable these time slots!

Disabling Dynamic Host Configuration Protocol

This seems like a strange security policy, but it makes sense for wireless networks. With this strategy, you will force hackers to crack your IP address, subnet mask, and other required TCP/IP parameters. Because even if a hacker can use your wireless access point, he needs to know your IP address.

To disable or modify SNMP settings

If your wireless access point supports SNMP, you need to disable it or modify the default public and private identifiers. If you don't, hackers will be able to use SNMP to get important information about your network.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.