How to set up wireless network security from Hackers

TipsMake.com - The reason for setting up wireless security is to prevent unauthorized users from exploiting our wireless network. Security settings are even more difficult when faced with hackers who have wireless access anywhere in the network coverage area.

If you don't set up wireless network protection from hackers, you may have to stop using the network. This consequence also affects some other network problems. To set up wireless networks from hackers, you should follow some simple steps:

How to set up wireless network security from Hackers Picture 1 1. Select the antenna location

The first thing you have to do is locate the coverage area of ​​the antenna where you can limit the coverage to the area that allows it. Placing the antenna near the window is not recommended because the glass cannot stop the signal. You should place it at the center of the building.

2. Use WEP encryption

WEP means encryption protocol to secure information transmitted in WiFi. You should not ignore it because hackers can take advantage of this to access network links.

3. Change SSID, turn off the broadcast range of SSID

SSID means Service Set Identifier (self-declare network name). This is a concept in the 802.11 wireless network standard, you can understand simply the name of the Wifi network service area you are using. At any wireless access point, you should choose a unique, unique SSID. If possible, you should limit the broadcast range of SSID by antenna. This keeps the network from being displayed in the list but we can still access the network normally.

4. Disconnect DHCP

In this way, the hacker will have to decode the TCP / IP protocol suite, subnet mask, and IP address to be able to access your wireless network.

5. Disconnect or change SNMP settings

SNMP is used to monitor and manage network devices. Change personal and public SNMP settings. You can also disable the operation of this collection. Otherwise, hackers can use SNMP to receive signals from your wireless network.

6. Use the access list

To ensure more security for your wireless network and if your access point supports this feature, use an access list. An access list lets us know exactly which machines are allowed to access. Access points (including access lists) can use file transfer protocol (TFTP) to download the latest list to prevent hackers.

3.5 ★ | 2 Vote

May be interested

  • Learn about Wireless Sensor Network (WSN)Learn about Wireless Sensor Network (WSN)
    wireless sensor network (wsn) is an infrastructure-free wireless network that is deployed with a large number of wireless sensors in a special way that is used to monitor the system, physical condition or the environment.
  • Wireless LAN securityWireless LAN security
    when wireless lans are widely deployed and we know a lot about its benefits, it is also very difficult to go with it. in this article, we only mention and discuss some basic techniques for system security
  • The cybersecurity tools that every business should knowThe cybersecurity tools that every business should know
    enterprises have become the main target for most cybercrime as well as violations on the internet due to the nature of data and information of extremely high economic value that they are handling as well as hosting.
  • Wireless network traffic security - Part 1Wireless network traffic security - Part 1
    in this series, i will show you some wi-fi network security techniques. the first part in this series will help you understand the vulnerabilities associated with wireless networks.
  • Wireless LAN security (Term 2)Wireless LAN security (Term 2)
    a wireless lan consists of three parts: wireless client, access points and access server. the typical wireless client is a laptop with a wireless nic (network interface card) installed to allow access to the wireless network. access points (ap) provide three
  • Tricks to improve wifi network securityTricks to improve wifi network security
    the more developed the use of wifi network, the more problems arise, the unsafe wifi security affects the access speed. so how to improve the absolute security of home wireless network.
  • Wireless traffic security - Part 3Wireless traffic security - Part 3
    in this article, i will show you the pros and cons of promoting ssid and mac address filtering.
  • The alarming increase in the number of attacks targeted at IoT devicesThe alarming increase in the number of attacks targeted at IoT devices
    along with the explosive growth of globalized internet and especially wireless connectivity, the number of attacks targeted internet devices and things (iot) has escalated 'scary. 'throughout 2018.
  • Instructions for use and security of Wifi networkInstructions for use and security of Wifi network
    wireless networks are one of the great inventions of the 21st century. instead of using cables to connect computers and devices together, you can now use radio waves to connect. this technology has been widely known as 'wifi'. once set up correctly, wifi will not encounter any problems.
  • White-hat hackers, from their passion to the job to earn money, and little-known thingsWhite-hat hackers, from their passion to the job to earn money, and little-known things
    white hat hackers - heroes who don't cloak!