Regardless of the size of your business, using WPA2 security will be a good first step in securing Wi-Fi network security. Also, do not use the less secure PSK mode in the standard-this poses a serious potential risk.
Today, the use of Wi-Fi Protected Access II (WPA2) to protect wireless network security has become a mainstream trend, but many small and even med
This article describes the high security level of wireless signal encryption method: WPA-PSK/WPA2-PSK AES
11g Wireless Router Setup method:
Login Router Management Interface Select "Wireless Parameters"-> "Basic Settings", as shown in the following figure configuration:
Security type Select "Wpa-psk/
of users with different security requirements, WPA specifies two application modes: Enterprise mode, and home mode, including small office ).
Based on the two different application modes, WPA authentication also has two different methods. For applications of large enterprises, "802.1x + EAP" is often used, and users provide the creden。 required for authentication. However, for some small and medium-sized enterprise networks or home users, WPA also provides a simplified mode that does not requir
WEP-based encryption describes D-Link Wireless route settings. For vrouters of various models, the following is a Q A topic on D-Link Wireless route settings, we hope to include all questions about the use of vro upgrades.
DI-624 + A, DI-724UP + A is two super high-performance wireless router, can easily build A small and medium-sized enterprises at the same time the Internet environment, and has A strong firewall security characteristics, can be based on MAC address, filters IP addresses, URLs
protocol. It can work on all wireless networks that support raw monitoring. Attackers can sniff protocol packages including 802.11b, 802.11a, and 802.11 GB.
Kismet
3. Wifi Analyzer | Local download
Wifi Analyzer is a free Android app. You can find an AP on a mobile terminal of the Android platform. It lists all the details of the ap in the GHz channel and supports other devices in the 5 GHz channel. You can also share AP details in XML format by email or other applications or screenshots. It is
, WPA was used to provide users with a temporary solution before the 802.11i protocol was improved. The standard data encryption uses the TKIP protocol (temporary Key Integrity Protocol). Two authentication modes are available, one is to use 802.1x protocol for authentication; one is pre-shared key PSK (pre-shared key) mode. Wpa2 encryption method CCMP. I have to talk about the two authentication modes of W
set Tp-link tl-wdr6300 5G Wireless WDS bridging mode Step one, view the main router information
Enter the settings interface of the master router (the router that is already connected to the Internet) to view the wireless signal name (SSID), encryption mode, wireless password, channel parameters of the primary router, as shown in the following illustration. Ssid. zhangsan_5g Wireless Encryption method. WPA-PSK/WP
the three encryption tests for WEP, WPA, and WPA2, the main reason for the significant change in the transmission rate of wireless networks is that the IEEE 802.11n standard does not support high throughput rates for unicast ciphers with WEP encryption (or TKIP encryption algorithms). In short, the 11n product does not support the WEP encryption method or WPA-PSK/WPA2
Encryption" select:wpa/wpa2-psk--> Set "Key"--> click "Application"
Set the 2.4G wireless WiFi name and password in the Totolink router
2, 5G wireless wifi settings
Click "5G Wireless Settings"--> Click "Basic Settings"--> settings "SSID"--> "Security Encryption" select:wpa/wpa2-psk--> Set "Key"--> clic
Tp-link tl-wdr6300 Router set wireless name and password Tutorial Step one: Set up a wireless working band
Log on to the TL-WDR6300 router's setup interface, and then click on "Wireless band settings"--> select "Wireless simultaneously working on the 2.4GHz and 5GHz band (802.11A/B/G/N/AC)"--> "Save".
Tp-link tl-wdr6300 Router set wireless name and password Tutorial Step two: 2.4GHZ wireless network name and password settings
1, 2.4GHZ wireless network Name settings: Click the "Wi
use it to manage WiFi) graphical interface, using QT development. But we think the default version is very low, such as:Now, let's scan the attached WiFi hotspot and click the Scan button.Locate your target from the SSID list, double-click it to open the configuration page, such as:SSID is the hotspot name, authentication is no line by using the authentication method, here is WPA2-PSK, followed by encrypti
;, view the "wireless status" of the device, and write down the SSID number of the wireless network (in this exampleTP-LINK_2026BC) And the MAC address in the wireless status (in this exampleE0-05-C5-20-26-BC), As shown in the following figure:Wireless encryption: That is, the TL-WR941N wireless encryption method, the current mainstream encryption method is "WPA-PSK/WPA2-
/WPA2-PSK (consistent with the main router)--> in the "key" location to enter the main router's wireless password, enter the completion of the click "Save."
Set up the main router wireless password on the tl-wdr6500 router
4, set tl-wdr6500 wireless password: Click "Wireless Settings 5GHz"--> "Wireless security Settings"--> select "Wpa-psk/
tl-wr842n Router set WiFi account password Step one: Set the wireless network name
Login tl-wr842n router's management interface, click the "Wireless Settings"--> "Basic Settings"--> set "SSID"--> check "open wireless function", "Open SSID broadcast"--> click "Save".
Note the problem: The SSID is the name of the wireless network (WiFi), it is recommended to use a combination of letters and numbers, do not use Chinese characters and special symbols as SSID names, because some wireless de
automatically choose the way to access the Internet (recommended)" This option does not recommend that you choose, because the router is sometimes not accurate identification, resulting in the wrong way to choose the Internet.
4. Choose Wireless Working frequency band:
Select: "Wireless work at the same time in the 2.4GHz and 5GHz band"--> "Next".
Wireless Working Band Selection: "Wireless at the same time working in the 2.4GHz and 5GHz band"
5, 2.4G Wireless settings
Set "SSID"--> Se
In order to resist the increasingly rampant network behavior, to remind the vast number of mercury users pay attention to wireless network security, I division all models of wireless routers to increase the anti-RUB network security Tips page, as shown in the following picture:
1, under what circumstances will pop-up this prompt page?
When the router wireless security is set to WPA-PSK/WPA2-
)
Tkip or CCMP
Security policy with high security for large enterprises.
Wpa/wpa2-psk
Open
Psk
Tkip or CCMP
High security policy for small to medium business or home users.
Wapi-cert
Open
Pre-shared key identification
SMS4
Made, application less, suitable for large enterprises and operators.
addresses to access the wireless network.
++ ++
I now use the D-LINGK wireless router after installation all normal can use the network cable to access the Internet, when I set the notebook if you do not add the network key is also easy to use, plus the password will not go up, what is the reason?
This problem is caused by inconsistent encryption type of your router and notebook key, generally used at home personal security type: WPA-PSK/
-WR700N wireless MAC address), and wireless security is not set. Scan the wireless network in the computer environment, select the wireless SSID of the TL-WR700N, and click "connect", connect after, as shown in the following figure.IITL-WR700NSettingsProcedure1:Enter "192.168.1.253" in the browser, and enter the logon account and passwordAdmin,Open the management interface for the TL-WR700N and the setup wizard appears automatically (you can also click the manage interface me
wireless Settings page as shown in the following figure.
In the page shown above, you can set the router's SSID (that is, the wireless network name). To prevent illegal users from rubbing the net, it is recommended to set wireless security, the recommended choice "WPA-PSK/WPA2-PSK" and set the PSK passwor
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.