How to set up the wireless router in Longquan Campus of Chengdu University of Information Science and Technology?

I'm from Longquan, too, and I have a good faith. I found a wireless routing setting on the Internet. How to set up a wireless router: There are three ways to set it up.

Method 1: PC and wireless routing connection.

First of all, of course, you must connect the wireless router correctly. Before configuring the wireless router, the PC and the wireless router must be connected by a network cable, the other end of the network cable is connected to the LAN port of the wireless router, and then the cable coming out of the modem is connected to the WAN port of the wireless router, so it is ok. The following figure

Log in to the management interface of the wireless router. Enter192.168.1.1on IE of the PC connected to the wireless router. The default management IP of most wireless routers is 192. 168. 1, and the user name and password are admin. Which wireless one is it?

If the address cannot be opened after entering 192. 168. 1, it is a PC network setup problem. Open the connection properties and set the IP address to192.168.1.x, (x is a number between 2 and 255. Or choose to assign IP automatically.

After entering the configuration interface of the wireless router, a "Setup Wizard" will automatically pop up. For beginners, follow the "Setup Wizard" for the next step. In fact, the Setup Wizard is the same as setting up your own project manually.

In the network parameter setting of wireless router, the parameters of LAN port and WAN port must be set. In practical application, many users only set the WAN port, and the setting of the LAN port keeps the default state of the wireless router.

WAN port settings of router:

If devices connected to WAN ports dynamically assign IP, you should choose dynamic IP users, but this is rare. Ordinary families only use PPPoE mode or static IP mode. Users who want to dial by wireless router should choose PPPoE mode and fill in the corresponding ADSL user name and password. If a fixed IP is connected to the WAN port, static IP users will be used for exploration, as shown in the following figure.

LAN port settings of the router:

After configuring LAN port and WAN port, we need to configure wireless parameters. When configuring a wireless router, strictly speaking, there are no steps. I suggest that users configure wireless routers in the order of configuration pages.

Wireless configuration:

In the basic setting, users can choose to turn off the wireless network when it is not needed, which is not available in many brands at present. There are 14 channels to choose from, and most common brands are 1 1~ 13 channels. Here, we recommend that you use automatic switching to the best channel.

Wireless encryption must be set. If you forget to set your password, you may be robbed of your broadband and hacked into your computer. If you meet a hacker and plant some Trojan horses or viruses, it will be painful enough. So when you turn on the wireless network, you must remember to modify the wireless encryption. The method of setting the password is very simple, just set a password in the wireless router and then enter it on the wireless network card.

Access control is managed by MAC address, with permission and prohibition, just like MAC address binding management.

It is recommended to select Automatic in advanced settings such as rate and preamble type.

You can see the number of wireless connections in the connection list, including MAC address, status, frequency band, speed, etc.

The functional interface of the equipment is in Chinese, and there are also quick guides and help. As long as you read the introduction in the help carefully, I believe it is not difficult to set it up. After these settings are completed, you can surf the Internet by enabling the corresponding wireless network on the PC side.

Method 2:

With more and more friends entering the big family of "wireless faction", the security of wireless network has attracted much attention. Relatively speaking, wireless network is more difficult to protect than wired network, because the number of fixed physical access points in wired network is limited, and any point that signals can reach in wireless network may be used.

Therefore, major brand manufacturers have added keys to the configuration and design of wireless routers, prohibiting SSID broadcasting, but are these security settings really effective? Let's take the wireless equipment supporting IEEE 802. 1 1g standard as an example to lead everyone to answer them one by one through actual measurement.

Set the network key

Wireless Encryption Protocol (WEP) is a standard method to encrypt data transmitted in wireless networks. At present, most wireless devices only have WEP encryption, and the more secure WPA encryption has not been widely used.

At present, there are generally two kinds of keys for wireless routers or AP. For example, the wireless router used has 64-bit and 128-bit encryption types, and 10 or 26 strings are respectively input as encryption passwords.

I would like to remind you that many wireless routers or APS turn off the data transmission encryption function when they leave the factory. If you use it without further settings, your wireless network will become an "unattended" device. Therefore, it is very important to set up encryption for your wireless network.

Test result: 64-bit encryption method is selected. In the actual measurement, the existence of wireless network was discovered by software such as Network Stumbler, but the wireless network could not be used because the password could not be obtained.

Disable SSID broadcasting

In layman's terms, SSID is the name you give to your wireless network. It should be noted that wireless routers or APS produced by the same manufacturer all use the same SSID. Once those attackers who attempt to connect illegally use the commonly used initialization string to connect to the wireless network, it is very easy to establish illegal connections, thus threatening our wireless network. So I suggest you give SSID some personalized names.

Wireless routers generally provide the function of "Allow SSID broadcast". If you don't want your wireless network to be searched by others through the SSID name, then it's best to "ban SSID broadcasting". Your wireless network can still be used, but it will not appear in the list of available networks searched by others.

Tip: The setting of prohibiting SSID broadcasting will affect the efficiency of wireless network to a certain extent, but it is worthwhile to improve the security in exchange.

Test results: Because there is no broadcast of SSID, the wireless network is ignored by the wireless network card, especially when using Windows XP to manage the wireless network, which achieves the purpose of "hiding people's eyes and ears".

Disable DHCP

DHCP function can automatically assign an IP address to each computer in the wireless LAN without the need for users to set IP address, subnet mask and other required TCP/IP parameters. If DHCP is enabled, others can easily use your wireless network. Therefore, it is necessary to disable the DHCP function of the wireless network.

Just set the DHCP server to "Not Enabled" under the "DHCP Server" setting of the wireless router.

Test results: Because the IP address and DNB server information cannot be obtained, even if the wireless network signal can be found, the network cannot be used.

Enable MAC address and IP address filtering.

In the setting of wireless router, when turning on the MAC address filtering function, it should be noted that the option "Only allow valid MAC addresses in the set MAC address list to access the wireless network" must be selected in "Filtering Rules".

In addition, if the DHCP function is disabled in the wireless LAN, it is recommended that you set a fixed IP address for each computer using wireless services, and then enter these IP addresses into the IP address permission list. After the IP address filtering function of the wireless router is enabled, only users with IP addresses in the list can access the network normally, and others can only stare blankly.

Test results: After setting MAC address filtering and IP address filtering, even if someone unwillingly invades the wireless network, the wireless network still cannot be used because the MAC address and IP address are prohibited by the filtering function of the wireless router.

summary

In fact, in the actual measurement process, it is found that any of the above methods can protect their own wireless networks, and ordinary users do not need to worry and can use them with confidence.

In addition, if you use some public wireless networks in public places such as airports and conference rooms, you must remember to close your own documents and print them, because such documents are easily accessed by another client in the same LAN.

Method 3:

First, the initial setting of wireless parameters

As can be seen from the setting bar of the management interface, except for one wireless setting, the other settings of this wireless broadband router are the same as those of the wired routing products of the same grade, and the setting method is also the same, so this paper only explains the wireless setting part. With TP-LINK

Like the R4x0 series wired broadband router, the initial Internet access setup can use the Setup Wizard, in which the setup parameters are exactly the same as R4 10 except for the last item "wireless setup" (Figure 2).

The "wireless function" can determine whether the function of its AP is turned on. "SSID number", also abbreviated as ESID, is the identification character of AP, sometimes translated as "service set identifier or service area identifier" as the authentication identifier for accessing this wireless network (it can be imagined as the workgroup name in the windows file sharing environment). When wireless clients want to join this wireless network, they must have the same SSID number, otherwise they will be "rejected". This item defaults to TP-LINK, and it is suggested to change it to an uncommon name, which can be used as the simplest security measure. Of course, it is necessary to prohibit the use of SSID broadcasting, which will be discussed below.

"Frequency band" or "channel" is also called channel, which uses wireless signal as transmission medium to transmit data signals. Institute of electrical and electronic engineers

802. 1 1b/g works in the 2.4~2.4835GHz band (China standard), and these bands are divided into 1 1 or 13 channels. Wireless router WR245, you can choose 1 1 frequency band. When there are more than two apS in the use environment or the coverage areas of adjacent APS overlap, it is necessary to set different frequency bands for each AP to avoid conflicts. After this step is completed, the most basic network parameters are set. If the user does not have any security requirements, then the client wireless network card can be connected by default at this time.

Second, advanced wireless parameter settings

Generally, wireless routers and AP will have the following three settings:

Chinese name

English name

Brief introduction of function

Wireless basic settings

Wireless settings

Wireless network parameters, including SSID, channel, security authentication, key, etc. (as shown in figure 3)

MAC address filtering

MAC filter

A measure to access the security mechanism, which can restrict unauthorized hosts from joining the wireless network (only for the wireless network part), is based on the MAC address screening of network cards. (as shown in figure 5)

Host status

client state

Displays basic information of all hosts connected to this wireless network, including MAC addresses, etc. (as shown in figure 4)

1. Wireless Basic Settings

In this page, there are more security mechanism settings besides the wireless functions on, SSID and frequency band set in the wizard. If "Allow broadcast of SSID" is selected, this router will broadcast its SSID number to all wireless hosts, which means that wireless network cards without specified SSID can obtain the SSID broadcast by AP and connect. If users don't want other nearby wireless clients to "uninvited", it is suggested to cancel this option and manually specify the same SSID in the wireless settings of the client network card to connect.

In the security authentication type, you can choose the open system mode that allows any access, the * * * key sharing mode based on WEP encryption mechanism and the automatic selection mode. For security reasons, it is recommended to select "* * * key sharing" mode.

In Key Format Selection, you can select ASCII code or 16 hexadecimal number for the following keys. Generally we choose 16 hexadecimal number (hex). In the following key information, fill in the content item freely according to the instructions-"To select a 64-bit key, you need to enter 16 hexadecimal numeric characters or 5 ASCII code characters. To select the 128-bit key, you need to enter a 26-character decimal number of 16 or a 3-character ASCII code. Then select the number of encryption bits in "Key Type", which can be 64 bits or 128 bits, and select "Disable" not to use the key. It should be noted that only one valid key can be selected at a time, and only four keys can be saved at most. Moreover, the higher the number of encryption bits, the lower the communication efficiency, which means that the connection rate will be affected. Therefore, it is suggested that the home WLAN should not choose too high number of encryption bits, which is not sensitive to security.

2. Host status

On this page, you can find the information of hosts that have joined this wireless network, and the most important thing is to get their MAC addresses for MAC address filtering.

3.MAC address filtering

In this page, the MAC address filtering function is turned off by default. Click the Enable Filtering button to enable it first. Usually, we only want our client host to join this wireless network, so select "Only Allow …" in "Filtering Rules", click the "Add New Item" button under it, fill in the MAC address just recorded in the window shown in Figure 6, add a custom description, and the selection will take effect. After saving, the interface shown in Figure 5 will pop up, and the setting is complete. In this way, only wireless network cards with MAC addresses in the table can access this WLAN, which is much safer than the default configuration.

Note: Another way to get the MAC address is to run "ipconfig /all" in the command prompt window of the client system to find the name of the wireless network card. The next line is "physical"

Address "information, you can get the MAC address.

If you are using pure AP equipment, you only need to set up your AP as described in this section.

Third, the wireless network card client settings

After setting up the wireless router, especially after modifying its wireless security mechanism, the parameters of the wireless network card should be modified accordingly, so that the client can join the WLAN. Take win2000 as an example. In the device manager of windows system, select the installed wireless network card device, open its "Properties" window, and click the "Advanced" tab to see the corresponding items of wireless parameters just set in the wireless router.

"ESSID" corresponds to "SSID" in the wireless router settings and must be consistent before connecting to the network. When the wireless network card does not specify the SSID manually, it will automatically search for the AP with the strongest signal and connect. Of course, this AP needs to turn on the broadcast function of SSID.

"encryption

The encryption level of "level" corresponds to "key type", that is, the number of encryption bits in WEP*** shared key. Select 64-bit or 128-bit according to the option just set.

The following "WEP key # 1 ~ # 4" are four WEP*** shared keys, which are filled in according to the settings in the wireless router and marked in "WEP Key to".

Use to select the key to use. (Figure 8) If the keys do not match, the wireless network card client will connect to this network, but cannot send and receive data.

"Operation mode" working mode, for wireless adapters, two types of network working modes are allowed: infrastructure mode and Ad.

Temporary mode. If the former is selected, the wireless network card will be connected to an AP (equivalent to "client" mode and connected to the "server" of the AP); If the latter is selected, the wireless network card will be directly connected to another wireless workstation (such as another wireless network card). In fact, it is a peer-to-peer model). In this example, you should choose infrastructure mode to connect the wireless router. Moreover, in the infrastructure mode, there is no need to set the "channel", and the "frequency band" or "channel" at this time is automatically detected. Only in advertisements

The "Channel" value needs to be set in point-to-point mode, and all wireless workstations in the workgroup must have the same channel number and SSID value.

Many wireless network cards have configuration programs developed by manufacturers for their products, which have more comprehensive and advanced settings, security authentication and management functions, and the configuration methods are more user-friendly, so it is recommended that you give priority to the configuration programs that come with the network cards. However, different manufacturers have different configuration procedures. Please read the product manual by yourself.

Note: In XP, for network and dial-up connection-wireless network connection and property-wireless network configuration, when "Configure my wireless network configuration with windows" is selected, the parameter configuration items attached to the Windows system will be used. Click the "Configure" button next to it to set the parameters. If you want to use the configuration program that came with your network card, you need to cancel this check.