Tips for setting Wireless Router Security

Source: Internet
Author: User

Wireless Router Security Settings: WEP, WPA-WEP encryption, or WPA Encryption

Wireless Network Encryption provides security by encrypting the data of the radio receiver. It is mainly used to keep the information data of the link layer in the wireless LAN confidential. Currently, most wireless devices have the WEP encryption and WAP encryption functions. Do we use WEP encryption or WAP encryption? Apparently, WEP appears earlier than WAP, and WAP is more secure than WEP.

WEP adopts symmetric encryption mechanism, and data encryption and decryption adopts the same key and encryption algorithm. After encryption is enabled, both wireless network devices must use encryption to communicate with each other, with the same key and algorithm. WEP supports 64-bit and 128-bit encryption. For 64-bit encryption, the key is 10 hexadecimal characters 0-9 and A-F) or 5 ASCII characters; for 128-bit encryption, the key is a string of 26 hexadecimal or 13 ASCII characters.

Wireless Router Security Settings: MAC address-DNA in the online world

Since each wireless network card has a unique physical address MAC in the world, you can manually set a list of wireless network card MAC addresses for a group of hosts allowed to access in Wireless AP or wireless router, implements physical address filtering. This requires that the MAC address list in the AP be updated at any time.

Setting MAC address filtering is too heavy for large wireless networks, but not for Small wireless networks, so we should not be bothered. The MAC address can be forged theoretically, so it is a low-level authentication method. We recommend that you set the MAC address filtering function for wireless networks in the home and small office areas.

Wireless Router Security Settings: SSID-hide yourself

A wireless router generally provides the "allow SSID broadcast" function. If you do not want your wireless network to be easily searched by another wireless network adapter, you 'd better Disable SSID broadcast ". In general, the SSID is the name given to the wireless network. It is used to distinguish different wireless networks.

SSID is the first element of wireless network discovery by a wireless network adapter. After the Broadcast SSID is enabled, the wireless network adapter automatically finds the network and tries to connect to it within the effective coverage of the wireless network. If we do not want to expose our wireless networks to the public, we should think of hiding our wireless network SSID and disable the "Broadcast SSID" function. After "Broadcast SSID" is disabled, the wireless network card does not automatically find the wireless network. To connect to this wireless network, you need to manually add the SSID. We recommend that you hide the SSID.

Wireless Router Security Settings: How to make wireless networks more secure

According to Internet data, the following software is used: Network Stumbler, WildPackets AiroPeek NX, OmniPeek 4.1, WinAircrack, etc. As long as these software has enough time to capture wireless Network communication signals in communication, attackers can crack wireless network security settings, such as WEP encryption, WPA encryption, MAC filtering, and SSID hiding.

This sounds disappointing, so how to make wireless networks more secure. Make sure that wireless access networks do not rely on WEP and other technologies as much as possible to adopt other more security measures. Currently, the main methods to achieve this goal include VPN technology, such: VPN technologies such as IPSec and SSL are used. In this way, both the access control function and the end-to-end program-to-program encryption function can be obtained.

The frequently used techniques for setting wireless router security are described here. I hope you have mastered them.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.