In this practical introduction to the basics of securing your home wireless network, you will learn how to secure a network of game consoles, phones, and PCs. Following are totally useless security measurements specified in arstechnica’s guide:
=> MAC filtering
=> Disable DHCP
=> Disable SSID
You need to enable WPA / WPA2 to protect network (don’t use wep). I also recommend disabling Universal Plug and Play (UPnP) support. The UPnP protocol does not implement any authentication, so UPnP device implementations must implement their own authentication mechanisms, or implement the Device Security Service. Unfortunately, many UPnP device implementations lack authentication mechanisms, and by default assume local systems and their users are completely trustworthy. Most notably, Routers and firewalls running the UPnP IGD protocol are vulnerable to attack since the framers of the protocol omitted to add any standard authentication method.
- Always use WPA / WPA2 with TKIP or AES encrypting with a strong paraphrase
- Change paraphrase every month
- Disable UPnP
- Disable wireless router remote (public IP based) management and ssh / telnet port features. Only use your local PC for telnet / ssh or router management.
- Turn on firewall, port scan and DoS protection (which is a default for many routers)
- Turn on email notification when DoS or port scan attack detected
- You may find our WPA / WPA2 Linux configuration guide useful
- Additional tips for Windows user – Use an anti virus, firewall / internet secruity suite. Most important don’t use bloated Norton product. My personal recommendation is NOD32 or kaspersky anti-Virus. Both are extremely light on system resources and detecting viruses. Either is an excellent anti-virus solution. Keep your operating system and virus databases always up to date.
If you have more security tips, please add them in the comments.Share this on: