Increase the security of your WiFi network with these simple tricks — 2022
Today we will analyze how secure our WiFi network is and how we can improve it .Something that will come in handy if you wantcreate a local network from your Mac, as if you want to increase the security of the existing one. And why is this so important? Not only so that our neighbor does not steal our WiFi, but for our own security and confidentiality . In other words, having a secure network without intruders It is important to prevent them from accessing information that they should not or intercepting our communications.
So, without further delay, let's proceed to analyze each of the parts that influence our security.
Choose a good authentication system
Something very important when analyzing and improving the security of your network is the how do you access it .
In the wired network (Ethernet) it is something very simple. In that case it is very easy to find intruders because the intrusion would be physical. But in the case of wireless network (Wi-Fi) it is already more difficult to control the intrusions to our network.
To prevent intruders from sneaking into our network through the WiFi It is essential that you have a password . In this way, the WiFi would no longer be open, but will require a password to access (authenticate).
Authentication method
But it doesn't work with any authentication method (password)! There are plenty of them, and not all of them are equally safe. For this reason, we will make a brief review of all of them here:
What option to choose for a home router?
It's the time for the truth. What type of authentication method do I choose for my home?
The possibilities that we have to choose from will depend on the router, although there are some that are more common to find:
How to change these security settings on a router
And how can we configure all this? This can be done from the router configuration interface , which we can access through your IP. If our router acts as the main router, the IP will possibly be 192.168.1.1. However, if the router whose configuration we want to change is a secondary router, we must find out your IP first (either by the manual, Internet or because we have configured it in the initial startup of it). In the same way, ifyou use your Mac as a router to extend the WiFi signal in your room, these settings can also be selected in the network settings of your Mac.
Once inside the router interface we must go to the wireless access section . There we will find a menu similar to this.
WiFi network configuration panel (in the Xiaomi Mi WiFi Router 3 router).
And to which router does said configuration panel belong? Belongs to Xiaomi Mi Wi-Fi Router 3 , a model that we have been using in recent weeks for multiple articles. And how is it accessed with this router? The default management interface for this router is at 192.168.31.1 . Although this can be changed (for example, in ours we have 192.168.2.1 because it is easier to remember). Once inside we will have to put the administrator password that we have configured at the beginning (during the first start-up). Then we will go to Basic Configuration and that panel will come out.
hidden networks
Finally, to end this section, there is something else worth commenting on. This is the possibility of hide our wifi network . In this way, the network it will not appear in the list of available WiFi networks , but we can access it by typing its name.
This is one additional measure , which although a bit annoying, makes our WiFi network more difficult for possible intruders to find.
Option to hide the WiFi network so that it does not appear in the list of available networks (specifically, it is from the Xiaomi Mi WiFi Router 3).
Disable WPS
WPS is a system that allows a device to connect to the WiFi network without having to enter the password . So, to connect a new device in this way we will have to press a button on the router.
The problem is that a couple of years ago a vulnerability that allowed get the password WiFi network (without having to press any buttons). Therefore, the use of WPS became a huge security breach.
Access control
Another very important point for safety is the access control . This is usually only available as wireless access control, although more professional models also allow generic access control (both wireless and wired).
Types of access control and operation
And what is access control for? This is a key security measure. Its purpose is to control who has access to our local network and who does not . And how do you decide who is welcome and who is not? This is done through lists, which can be:
And how are users identified? How is one device distinguished from another? To identify the user, the MAC address (physical address). This is an identifier, theoretically unique, to denote an interface of a device.
Configure an access list on a router
And how to configure an access list? Very easy. the first thing will be access the router interface , which we explained earlier in this and other articles. Once inside we will go to the security section (in the case of the Xiaomi router it is in the Basic Configuration menu).
There we will have the option to activate the access control . We will also find the selection of the list type that we want to use, black or white, although having both options will depend on the router to use. In addition, we will also find a table which represents the list itself. In the most basic routers we can add a new device entering your address MAC . In the most advanced, such as the router Xiaomi Mi Wi-Fi Router 3 , we can select it from a list of devices online . Also, in some routers (like the one we discussed), you can also give the device a name or a description.
Access control settings panel explained (of the Xiaomi Mi WiFi Router 3).
conclusion
But that is not all! There are still many more security measures, and part of them we will cover in a second part of this article that we will launch tomorrow. All this in order to avoidfailures on the iPad with WiFiand on other devices.
And you do you think? Do you consider your network to be secure? Do you have any additional security measures that we haven't mentioned?