Technology: four simple steps to protect Wireless Network Security

Source: Internet
Author: User

A wireless router is a commonly used network device. How can we enhance security performance when using it? What is the configuration? I believe the answers provided in this article will be helpful to you.

Unable to determine who the computer belongs to, Ekins wrote a brief notification using wordsoftware to tell the person about the situation and printed it with a remote printer. Ekins wants him or her to be sitting next to the computer to see and print the notification.

You can imagine the result of this incident. That person will certainly be more familiar with network security and will not appear in the Ekins network directory. This problem is solved in this way.

The current technological advances have made wireless connections an essential technology for the family, not just for convenience. Our laptops, mobile phones, MP3 players, Blu-Ray DVD players, and even televisions all require wireless network connections. To use the wireless functions of these devices, we must have a network connection. As a result, almost every household in a residential area will use the permanent transmission signals sent by wireless devices to block the wireless space.

So what are the risks of a network that does not take appropriate security measures? Many of us say that we do not store any information in our computers. Unfortunately, there are still many possible problems that make it necessary for us to ensure our network security. For example, a broken network allows others to view user information, such as logon information of an internet bank or capture account information of others, or become part of a botnet and participate in attacks on the enterprise network, just like a recent Denial-of-Service attack that interrupts Twitter websites. If someone is doing something illegal while connecting to our wireless network, tracking that illegal activity will find us. Sometimes, it can cause a lot of headaches for hackers to delete files and important system files for fun.

So these unpleasant things are enough to prompt us to take action. Follow the four simple steps below to find out the network security issues in the list of things we are concerned about.

Step 1: first, modify the default user name and password that allow us to access the vro in the wireless router settings menu. These Default usernames and passwords are available on almost all technical support websites. Therefore, anyone can access the vro set by the vendor. It is very important to change the user name and password, because if you enter the correct password to the router, any other security measures we can take will be bypassed.

Step 2: we need to change the default network name, that is, the SSID, with the unique name selected by ourselves. The name of the broadcast network appears on the "available wireless networks" list on our PC. Once we select a new name for our network, we will make it invisible to others. Vrouters of different brands use different methods to provide this function. On Some routers, these routers will ask if we want to "broadcast" The SSID. Some routers will ask us whether to hide or publish this SSIS. No matter which word is used, it means the same. Once this function is enabled, your network will not appear in the "available network" list of others, thus reducing the trouble for others to use. It should be noted that, after hiding the network, Windows Vista users need to set the connection device to "connect even if the network is not broadcast ". You can find this option in the Network Connection Properties in the "manage wireless networks" window.

Step 3: Configure "security mode ". A new vro can have up to three options: WEP, WPA, or wpa2. The difference between the three options is that WEP is an old-fashioned method that is not secure; WPA has greatly improved; and WPA2 is the best choice currently. Most vrouters purchased in recent years should provide at least WEP and WPA security options. When selecting WPA or WPA2 security options, these options require us to further select an "encryption type": TKIP or AES. AES is better in both options. When setting security options, it is often found that not many network devices support every possible setting. Some routers recommend different security levels of connection: WPA2-AES for laptops and WPA-TKIP for Xbox 360 consoles. If you do not have this option, you can select lower security settings or upgrade to a newer Network Device with more secure features.

Step 4: Enable the MAC address filtering function on the network. All devices that can form a network connection have a unique 12-character identifier called a MAC address. This identifier can usually be found in the Network Properties of the device we are trying to connect. This identifier appears in a six-character double-character group. Each character is separated by a colon (:) or a break. By enabling MAC address control for our vrouters, We can enter an identifier for those devices that are allowed to access our network. All other devices without an identifier are not allowed to access our network.

By taking these steps to configure the security features of our routers, we will create a "triple lock" to protect our information privacy and system integrity ". These security measures can almost discourage the most stubborn hackers from accessing our network, because there are still easy opportunities in other places, and no one is willing to spend too much effort here. If the rest is where they are going, it is good for us.
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.