CONFIGURING A WIRELESS BROADBAND ROUTER AT HOME

How Do I Select My Wireless Network Mode?

   In general, a wireless network can be operated using three different topologies; infrastructure mode, ad-hoc mode and bridging mode. When a wireless network operates in ad-hoc mode, client stations are connected directly and no access point is required. Using this mode, a potential attacker can gain access to a client station easily if the client station is improperly configured. Unless there is a specific business need, the ad-hoc mode should be disabled on wireless devices.


How Do I Locate My Wireless Broadband Router Securely?


1. Avoid placing the router against an outside wall or window, or against a common wall with an adjacent home to ensure that the signal does not extend beyond the required area.
2. To ensure that unauthorised people cannot tamper with your router, try to place it in a physically secure location.
3. Some routers allow you to reduce the output power of the device. To minimise leakage outside the coverage area the wireless network is meant to service,
    turn down the broadcast power, if possible. This is one way to prevent too strong a signal from extending beyond the desired wireless broadcast area and being accessible to the “outside” world.

How to Configure My Wireless Broadband Router Securely?

User name and Password

Change the default user name and password because they are often easily guessed. Some manufacturers might not allow you to change the username, but at least the password should be changed.

Encryption (WEP/WPA/WPA2)

Whenever possible, WEP should be avoided. Instead, use WPA2/AES or WPA/AES if it is supported on the device.


Authentication Type (Open Authentication or Shared Key Authentication)

The shared key mechanism should never be used. Instead, a stronger mutual authentication as defined in the 802.11i standard should be considered.

Wireless Network Name / SSID

The default SSID should be changed. The new SSID should not be named to refer the network products being used, reflect your name or other personal information, otherwise the information could aid an attacker in collecting reconnaissance information about you and your wireless network.



Broadcast Network Name / SSID
Users may consider disabling SSID broadcasting or increasing the “Beacon Interval” to the maximum. Suppress SSID broadcasting could not prevent sophisticated attackers to steal SSID by sniffing the management frames between the communication of access points and clients, however it could able to stop casual wireless clients from discovering the wireless network or attempting to access.

MAC Address Filtering

Enabling MAC address filtering is recommended as another layer of protection.

Dynamic Host Configuration Protocol (DHCP)

Disabling the DHCP feature, if possible, is recommended, as DHCP makes it easier for malicious attackers to access a wireless network

7 comments:

  1. THANKS FOR SHARING SUCH A AMAZING CONTENT
    GREAT PIECE OF WORK!!!
    REALLY APPRECIATE YOUR WORK!!!
    wireless network solutions in dubai

    ReplyDelete
  2. Great Article
    Cyber Security Projects

    projects for cse

    Networking Security Projects

    JavaScript Training in Chennai

    JavaScript Training in Chennai

    The Angular Training covers a wide range of topics including Components, Angular Directives, Angular Services, Pipes, security fundamentals, Routing, and Angular programmability. The new Angular TRaining will lay the foundation you need to specialise in Single Page Application developer. Angular Training

    ReplyDelete
  3. Mrhomereview is a high quality and trustworthy website that offers the most popular items in "Home and Kitchen" such as wireless router, coffee maker, oven, treadmill, vacuum clean and so on. For more details, please click here: mrhomereview.com

    ReplyDelete