Home > News > By setting up a route like this, 99.9% of hackers cannot break through it

By setting up a route like this, 99.9% of hackers cannot break through it

2023-06-12
Routing security is a big topic.

The background settings of routers are too professional, and cheating on network cards has become popular for a while. The legendary hackers seem to be so powerful that they have no effect It seems that the router at home is completely hopeless. As long as there is a hacker who understands a bit, they will be attacked every minute.


5441cf48ce94e

MAC whitelist mechanism
Among numerous protection mechanisms, MAC address whitelist is definitely a first-class standard feature. Up to the top of the thousand yuan configuration, and down to the tens of yuan mini, this feature is definitely in place. But don't underestimate it because of this, it's a killer related to routing and anti phishing networks.


Everyone should have heard of two things: "rubbing network cards" and "Wi Fi master keys". The first type of specialized Wi Fi password, the strongest WPA2 encryption, may break in a few minutes (special scenarios of weak passwords and strong dictionaries); Even if a strong password cannot be broken, one day one of your visitors may have an app similar to "master key" on their phone, and with a swipe of their hand, this wireless password will still be made public.

The above indicates that everyone's wireless password is not reliable. However, the MAC whitelist standalone system can ensure that you are not compromised. Every device that wants to access the internet must have been whitelisted by you before, and new unfamiliar devices can only roam the intranet.

The MAC whitelist function is located in the "Advanced Settings" menu on the left. If you have many devices at home, setting the whitelist will require a lot of effort. In fact, there are more convenient methods. You should remember that this year's two smart router 360 and Magic Bean, which have done well in security, can let you confirm whether to allow internet access when new users connect. This is actually using the MAC whitelist mechanism. In addition, the whitelist function of Xiaomi Routing is also convenient, but it is not as effective as the first two models.


AP isolation

As mentioned earlier, even with MAC whitelist, new unfamiliar devices still roam the intranet, which is not feasible and dangerous. If this strange device is highly skilled and a "Promiscuous mode" monitor is started, all intranet information will be received by it.

AP isolation is a good thing. With it, devices connected to the local area network are isolated and data is not interconnected. At this time, even the advanced skills of unfamiliar devices cannot monitor your online data.Industrial DTU

However, it also has drawbacks, such as making LAN software almost unusable. A large number of functions, including QQ's LAN fast transmission and pigeon messaging, will be scrapped. It is currently uncertain whether LAN gaming, file sharing (SMB), and other functions can be used, but it is unlikely that they will be available by visual inspection.4G Industrial Router

AP isolation is a slightly advanced feature, and traditional routing over a hundred yuan is basically supported. But it should be noted that due to the short history of intelligent routing, some manufacturers may not have achieved this feature yet. The resident will check a batch of routes later and publish the results here.5G Industrial Router

Previous: The difference between wireless routers and various APs

Next: The annual growth rate of mobile hotspot routing market is 21%, with huge potential

Related Products List

Home

Product

About Us

Inquiry

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Send