To protect Wi-Fi information security, you must restrict wireless node devices.

Source: Internet
Author: User

To prevent security leaks in Wi-Fi networks, You can restrict devices on wireless nodes to Ensure network security. In the subsequent articles, we will introduce other methods and impose security restrictions to prevent security leaks.

Some may ask how to restrict wireless devices? Do you have to lock the wireless node devices in the Local Wireless LAN?

In fact, for many models of wireless node devices, the default passwords they use at the factory are almost identical, so if we fail to change the password of the wireless node device in the Local Wireless LAN in time, then some illegal attackers may easily use the default user name and password to access the local wireless node device, so as to have all the management permissions of the Local Wireless LAN. Later, sometimes we encounter the embarrassing situation that we cannot log on to the local wireless LAN.

To restrict unauthorized users from using a local wireless node device, we must remember to restrict the password of the local wireless node device in the first place and use a complicated password to replace the default password, otherwise, it would be equivalent to handing over your wireless network management rights to illegal attackers.

Log on to the background management interface of the local wireless node device, find the password setting option, and enter a complicated password, in this way, you can effectively restrict unauthorized users from using wireless node devices at will. This restriction is the same as setting a password for protection in Windows. encrypted wireless devices will reject unauthorized attackers from stealing private content from the local wireless network.

Now, we take the TL-WR541G wireless router of TP-LINK model as an example, to introduce to your friends in detail on the wireless node device password restrictions specific operation steps:

First, run the IE browser program in the local workstation system. In the pop-up browser address box, enter the default IP address of the wireless router, which is generally found in the operation manual of the wireless node device, for example, the default IP address used by the TP-LINK wireless router is often 192.168.1.1. After confirming that the IP address is entered correctly, click the Enter key to open the background logon interface of the wireless node device, and enter "admin" in the "user name" text box of the interface ", set the default password to null, and click OK to log on to the background logon page of the wireless node device.

In the left-side area of the background interface, expand the "System Tools" branch with the mouse, click the "Modify logon password" option, and display the area on the right of the corresponding "Change logon password" option, enter the original user name and password of the wireless node device correctly, and then enter the new user name and password in the "New User Name" and "new password" text boxes, click "save.

In the future, when we need to manage the Internet parameters of the Local Wireless LAN again, we must use the new user name and password to log on to the background management interface of the wireless node device, in addition, it is recommended that new user names and passwords be kept confidential to prevent other users from disclosing their passwords.

Of course, if we find that the node devices in the Local Wireless LAN have been encrypted by illegal attackers and cannot access the local wireless LAN normally, we can forcibly restore the parameter settings of the wireless node device to the default state. For specific recovery methods, you can view the operation instructions of the corresponding wireless node device, generally, you only need to press the reset button in the control panel of the wireless node device to complete the parameter setting and recovery task.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.