Alibabacloud.com offers a wide variety of articles about how to secure unsecured wireless network, easily find your how to secure unsecured wireless network information here online.
airtight WIPS650) this.width=650; "Src=" http://s3.51cto.com/wyfs02/M02/6C/76/ Wkiom1vju1hbxnasaab0rvstraq709.jpg "style=" float:right; "title=" QQ picture 20150506145158.png "alt=" Wkiom1vju1hbxnasaab0rvstraq709.jpg "/>Infrastructure attacks on wireless local area networks (WLANs) are one of the most important and immediate threats to the current enterprise network. To make things worse, the demand for Wi-
Why do we need to close the network line?The key to ensuring the security of wireless access points is to prohibit unauthorized users from accessing the network. That is to say, a secure access point is disabled for unauthorized users. Ensuring the security of wireless netwo
When I tried a wireless router at home two days ago, I suddenly found that there were more and more neighbors using wireless networks. However, most users were not encrypted, and the SSID of many machines was not modified, looking at D-Link, mesh, TP-LINK all kinds of brands are everything. Of course, some neighbors still encrypt the network. One of them is the "
to intrude than WEP. Therefore, if there is a high requirement on data security, you must use the WPA encryption method (Windows XP SP2 already supports the WPA encryption method ).
As an upgraded version of IEEE 802.11's general encryption mechanism WEP, WPA is more secure than WEP, mainly reflected in identity authentication, encryption mechanism and packet inspection, it also improves the management capability of
maintains control over the terminal. The mobile management and session management functions executed by the mobility management entity are as follows: Mobile Phone attachment and separation processes allow mobile phones to be registered and unbound from the Internet. Secure 3A mechanism. The mobility management entity implements authentication, authorization, and audit security functions, which are used to identify users, permit
environments.
3. Be sure to apply 802.11i
The WPA and WPA2 Secure EAP (Extensible Identification Protocol) mode uses 802.1X identity, not PSK, to provide each user and customer with the ability to log on to their own certificates, such as user names and passwords, and a digital certificate.
The actual encryption key is periodically changed and exchanged in the background. Therefore, to change or revoke a user's access, the thing you need to do i
The use of wireless networks has also brought wireless network security problems. Because the wireless network is different from the wired Network physical node access controllability, the wir
Wireless network security has become a hot topic recently. Many forums have some suggestions on how to protect wireless network security. However, many of these suggestions are mixed, many are actually harmful to wireless network
invisible to others. Vrouters of different brands use different methods to provide this function. On Some routers, these routers will ask if we want to "broadcast" The SSID. Some routers will ask us whether to hide or publish this SSIS. No matter which word is used, it means the same. Once this function is enabled, your network will not appear in the "available network" list of others, thus reducing the tr
Wireless networks are more vulnerable to intrusion than wired networks, because the computers at the attacked end do not need to be connected to the computers at the attacked end, attackers can access your internal network and access resources as long as they are within the valid range of a wireless router or repeater in your domain.
During the Olympic Games, whe
Do you feel at ease in the face of wireless network signals found by computers? But do you feel a little pity when you see "enable secure wireless networks. As a representative of heart and regret, I have made full use of my subjective initiative, finally learned something, and finally succeeded in the
The extensive use of wireless networks also brings about the security of wireless networks. Because wireless networks are different from wired network physical node access controllability, the security of wireless networks deserves our attention.
For the current
The security of WLAN wireless networks is defined in the following four levels:
1. Spread Spectrum and frequency hopping wireless transmission technology make it difficult for the hacker to capture useful data;2. Set strict user passwords and authentication measures to prevent illegal user intrusion;3. Set up an additional third-party Data Encryption solution, which is hard to understand even if the signal
dual-concurrency 3x3:3 MIMO 802.11n wireless AP. Provides high-performance and secure wireless access to your business. Airtight embedded the industry-leading wireless intrusion prevention WIPS technology in C-60.It is a complete set of enterprise wireless
they can log on to your network and access your files.
Although wireless networks have been vulnerable to hacker intrusion, their security has been greatly enhanced. The following methods help you increase the security factor.
Enterprise Network Security Settings 1. Install a secure
browsers, and wireless network clientsProgramThese must be upgraded in real time to reduce attacks caused by their own defects.
7. Protect any sensitive information
The personal information retained on the web page will become very useful for hacker attacks. Therefore, some encryption tools can be used if conditions permit.
8. Use encryption technology to surf the Internet
This is important when no
the trouble for others to use. It should be noted that, after hiding the network, Windows Vista users need to set the connection device to "connect even if the network is not broadcast ". You can find this option in the Network Connection Properties in the "manage wireless networks" window.
Step 3: Configure "security
10.0.0.1, so as to prevent the "rub net" people easily guessed.
4. Reduce transmit power and upgrade firmware
At present, some no line by the/AP has the ability to adjust the wireless transmission power, by adjusting the wireless transmission power, you can control the wireless network coverage, so can also prevent
user accounts and policies and does not require each access point to have a copy of the Identity Authentication database. This simplifies the management and coordination of account information.
(3) RADIUS, as a method for identity authentication for remote access, has been widely recognized and adopted for many years. People know it very well, and it is also a mature technology.
(4) The company can select the EAP authentication protocol that best suits its security needs-two-way certificates ca
reducing the trouble for others to use. It should be noted that, after hiding the network, Windows Vista users need to set the connection device to "connect even if the network is not broadcast ". You can find this option in the Network Connection Properties in the "manage wireless networks" window.
Step 3: Configure
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.