How to set up wireless network security from Hackers
TipsMake.com - The reason for setting up wireless security is to prevent unauthorized users from exploiting our wireless network. Security settings are even more difficult when faced with hackers who have wireless access anywhere in the network coverage area.
If you don't set up wireless network protection from hackers, you may have to stop using the network. This consequence also affects some other network problems. To set up wireless networks from hackers, you should follow some simple steps:
1. Select the antenna location
The first thing you have to do is locate the coverage area of the antenna where you can limit the coverage to the area that allows it. Placing the antenna near the window is not recommended because the glass cannot stop the signal. You should place it at the center of the building.
2. Use WEP encryption
WEP means encryption protocol to secure information transmitted in WiFi. You should not ignore it because hackers can take advantage of this to access network links.
3. Change SSID, turn off the broadcast range of SSID
SSID means Service Set Identifier (self-declare network name). This is a concept in the 802.11 wireless network standard, you can understand simply the name of the Wifi network service area you are using. At any wireless access point, you should choose a unique, unique SSID. If possible, you should limit the broadcast range of SSID by antenna. This keeps the network from being displayed in the list but we can still access the network normally.
4. Disconnect DHCP
In this way, the hacker will have to decode the TCP / IP protocol suite, subnet mask, and IP address to be able to access your wireless network.
5. Disconnect or change SNMP settings
SNMP is used to monitor and manage network devices. Change personal and public SNMP settings. You can also disable the operation of this collection. Otherwise, hackers can use SNMP to receive signals from your wireless network.
6. Use the access list
To ensure more security for your wireless network and if your access point supports this feature, use an access list. An access list lets us know exactly which machines are allowed to access. Access points (including access lists) can use file transfer protocol (TFTP) to download the latest list to prevent hackers.
You should read it
- Secure WiFi in enterprise environment from basic steps
- Upgrade Wi-Fi security from WEP to WPA2
- How to be safe on a wireless network
- Free Wi-Fi security tools
- Instructions for use and security of Wifi network
- Upgrade wireless network security
- Wireless network traffic security - Part 1
- 8 tips to secure wifi wireless networks for businesses and families
- Awareness and experience - the most important factor in every network security process
- Vietnamnet network crashes: What is anticipated
- WEP - Security for wireless networks
- Will 5G make us more vulnerable to cyber attacks?
Maybe you are interested
Fix computer error not finding Wifi network successfully
How to set up a router with separate network names (SSIDs) for each band
Why is Instagram still a popular social network?
7 things you should not share on social network Facebook
How to prioritize specific network traffic on a Wi-Fi router
Fiber optic internet prices are too high, an American opens his own network