Wireless network security Settings Tips

Source: Internet
Author: User

The wireless network brings us a lot of convenience, he let us no longer have to worry about cable line, but also make notebook these mobile devices are more mobile (do not need to consider the length of network cable). But also because wireless networks are connected by wireless electromagnetic waves, wireless networks are more vulnerable to intrusion than wired networks connected by physical wiring. However, as long as we use the wireless network to pay attention to some of the following issues, the same can guarantee the security of the network.

  One, the default settings are not available

One of the most important devices in a wireless network is a wireless router or repeater. In general, the same brand of wireless device access address is the same, such as 192.168.1.1, and its default user name, password is mostly admin, and its SSID identity is the same. If you do not modify these default settings, the intruder is very easy to find these devices through the scanning tool and access to the management interface, access to control of the device. Therefore, modifying the default settings is one of the most basic security measures. This is not only useful for wireless network devices, but also for other internet-sharing ADSL, routing and so on.

  Ii. prohibition of the SSID broadcast

Enabling the SSID broadcast will help the wireless network client automatically receive the SSID number without having to know the set of SSID settings without lines. But for a home user or a friend with a fixed user, it is not necessary to enable the SSID broadcast because it is easy to establish a connection to some unknown intruders. As an environment with fixed user clients, we can fully inform them of the SSID identifier, allowing them to manually enter them directly to establish the connection.

  Third, filter settings

The general wireless Broadband router will have the filtering aspect setting. Filtering typically includes both IP address filtering and MAC address filtering. Where the IP address filtering settings are relatively complex, usually by clicking the "Add new Entry" type of button to open the Create Filter Rule Action window, and then set the operation of the IP address, the bug network suggested that everyone can be allowed to use the IP address to add all in, and set it as "Allow access", The IP address that is not added is not connected; Similarly, if you want more advanced security, you can add the MAC address of the wireless client network card that is allowed to access in MAC address filtering, and set it to allow traffic.

  Four, manually designated IP

For convenience of client settings, there are generally no lines with DHCP functionality. In fact, for small-scale wireless networks, we can simply manually assign IP addresses to clients without having to use DHCP. Since using DHCP, it is not easy to identify which of the online users are normal users and which are illegal users. If DHCP is turned off, we only need to view the current online users and if they find that their IP address is not assigned, then it is illegal intrusion.

  Five, set the key

For wireless settings, we generally require security authentication settings. In this respect, although setting the key may increase the operational complexity of the use of the wireless client, this is also important compared to security.

  Vi. Anti-Ping

Some of the more intelligent to do without the line by all with a ping-proof function. For example, Tp-link wr340g, after you log on to the admin interface, turn on security settings, and then select "Ignore Ping from wan" in "Wan Ping" to avoid some scanner searches.

  Seven, active search wireless network

The safety of wireless networks is more of an intrusion from neighboring users. For example, the next door user also uses a wireless network, so he may be connected to the signal through the discovery of a wireless AP around, people are curious, so he might find ways to invade. Based on this, we can first close our wireless AP (Router), and then search the vicinity of the launch point, if you do not have to open their own circuit-free, if so, then must pay more attention to security precautions.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.