SlideShare a Scribd company logo
1 of 16
• Access Restriction using Password
Login to the ADSL Router on http://192.168.1.1
The username and password by default are ‘admin’ and ‘admin’.
Click on ‘advanced’
Click on ‘wireless security’
Select the WEP security.
Enable WEP security.
Key in the desired security password.
Click on Apply.
• Access List (MAC based)
• To add the clients to the access list, find
out the MAC id of the clients (wireless
interface card) where the connectivity is
required, using the command ipconfig –all.
• To find out the MAC id from already active
clients, follow the following method.
•Click on ‘lan clients’ under the ‘advanced’ menu
Copy the MAC ids for the clients whom access has to be permitted.
• To add the clients to the access list find
the following method.
•Click on ‘wireless management’ under ‘advanced’ menu.
Select the check box ‘enable access list’
Select ‘allow’
Enter the MAC id in the space provided.
Click on add.
Click on ‘apply’
• Save the entire configuration by following
the method given below.
Secure wireless modem
Secure wireless modem
Secure wireless modem

More Related Content

What's hot

Quick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishQuick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishEnGenius Europe
 
Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Sant2009
 
Op Manager
Op ManagerOp Manager
Op Managerahawkins
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphoneJabez Winston
 
How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)trunghieu151185
 
3 g and wifi operation manual
3 g and wifi operation manual3 g and wifi operation manual
3 g and wifi operation manualDishHD Asia
 
How to change Login User Name and Password?
How to change Login User Name and Password?How to change Login User Name and Password?
How to change Login User Name and Password?taiwan_totolink
 

What's hot (7)

Quick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishQuick installation Guide EAP1200H English
Quick installation Guide EAP1200H English
 
Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010
 
Op Manager
Op ManagerOp Manager
Op Manager
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphone
 
How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)
 
3 g and wifi operation manual
3 g and wifi operation manual3 g and wifi operation manual
3 g and wifi operation manual
 
How to change Login User Name and Password?
How to change Login User Name and Password?How to change Login User Name and Password?
How to change Login User Name and Password?
 

Viewers also liked

Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modemcreativelakshu
 
Exposición a radiacion uv
Exposición a radiacion uvExposición a radiacion uv
Exposición a radiacion uvEric Ibacache
 
Danfoss Campus Update
Danfoss Campus UpdateDanfoss Campus Update
Danfoss Campus Updatecreativelakshu
 
Erosion of Pondicherry beaches
Erosion of Pondicherry beachesErosion of Pondicherry beaches
Erosion of Pondicherry beachesequitywatch
 
CRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsCRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsGAURAV. H .TANDON
 
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTOVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTReymarie Oohlala
 

Viewers also liked (8)

Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
 
Chatelier proj2
Chatelier   proj2Chatelier   proj2
Chatelier proj2
 
Exposición a radiacion uv
Exposición a radiacion uvExposición a radiacion uv
Exposición a radiacion uv
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Danfoss Campus Update
Danfoss Campus UpdateDanfoss Campus Update
Danfoss Campus Update
 
Erosion of Pondicherry beaches
Erosion of Pondicherry beachesErosion of Pondicherry beaches
Erosion of Pondicherry beaches
 
CRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsCRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas Notifications
 
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTOVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
 

Similar to Secure wireless modem

Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Mohamed Loey
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overviewali raza
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxlez31palka
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Netgear Italia
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data planeNetProtocol Xpert
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCreekside Marketing Group, LLC
 
Quick installation guide
Quick installation guideQuick installation guide
Quick installation guidegeorg_boemmelburg
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modefankrid
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ systemRobert Parker
 

Similar to Secure wireless modem (20)

Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docx
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial Networks
 
Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_mode
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guide
 
W I F Iconfig
W I F IconfigW I F Iconfig
W I F Iconfig
 
presantion
presantionpresantion
presantion
 

More from creativelakshu

Dcp introduction1
Dcp introduction1Dcp introduction1
Dcp introduction1creativelakshu
 
Kittens and vaccinations_and_deworming
Kittens and vaccinations_and_dewormingKittens and vaccinations_and_deworming
Kittens and vaccinations_and_dewormingcreativelakshu
 
Share&care meet 2012
Share&care meet 2012Share&care meet 2012
Share&care meet 2012creativelakshu
 

More from creativelakshu (6)

Configure wifi
Configure wifiConfigure wifi
Configure wifi
 
Dcp introduction1
Dcp introduction1Dcp introduction1
Dcp introduction1
 
Lakshu profile
Lakshu profileLakshu profile
Lakshu profile
 
Chatelier proj1
Chatelier   proj1Chatelier   proj1
Chatelier proj1
 
Kittens and vaccinations_and_deworming
Kittens and vaccinations_and_dewormingKittens and vaccinations_and_deworming
Kittens and vaccinations_and_deworming
 
Share&care meet 2012
Share&care meet 2012Share&care meet 2012
Share&care meet 2012
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Secure wireless modem

Editor's Notes

  1. Proceed to Wireless Security