SlideShare a Scribd company logo
1 of 16
• Access Restriction using Password
Login to the ADSL Router on http://192.168.1.1
The username and password by default are ‘admin’ and ‘admin’.
Click on ‘advanced’
Click on ‘wireless security’
Select the WEP security.
Enable WEP security.
Key in the desired security password.
Click on Apply.
• Access List (MAC based)
• To add the clients to the access list, find
out the MAC id of the clients (wireless
interface card) where the connectivity is
required, using the command ipconfig –all.
• To find out the MAC id from already active
clients, follow the following method.
•Click on ‘lan clients’ under the ‘advanced’ menu
Copy the MAC ids for the clients whom access has to be permitted.
• To add the clients to the access list find
the following method.
•Click on ‘wireless management’ under ‘advanced’ menu.
Select the check box ‘enable access list’
Select ‘allow’
Enter the MAC id in the space provided.
Click on add.
Click on ‘apply’
• Save the entire configuration by following
the method given below.
Secure wireless modem
Secure wireless modem
Secure wireless modem

More Related Content

What's hot

Quick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishQuick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishEnGenius Europe
 
Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Sant2009
 
Op Manager
Op ManagerOp Manager
Op Managerahawkins
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphoneJabez Winston
 
How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)trunghieu151185
 
3 g and wifi operation manual
3 g and wifi operation manual3 g and wifi operation manual
3 g and wifi operation manualDishHD Asia
 
How to change Login User Name and Password?
How to change Login User Name and Password?How to change Login User Name and Password?
How to change Login User Name and Password?taiwan_totolink
 

What's hot (7)

Quick installation Guide EAP1200H English
Quick installation Guide EAP1200H EnglishQuick installation Guide EAP1200H English
Quick installation Guide EAP1200H English
 
Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010Wndr4000 igpm 08_nov2010
Wndr4000 igpm 08_nov2010
 
Op Manager
Op ManagerOp Manager
Op Manager
 
How to control laptop using smartphone
How to control laptop using smartphoneHow to control laptop using smartphone
How to control laptop using smartphone
 
How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)How to upgrade tp link adsl modem router (trend chip solution)
How to upgrade tp link adsl modem router (trend chip solution)
 
3 g and wifi operation manual
3 g and wifi operation manual3 g and wifi operation manual
3 g and wifi operation manual
 
How to change Login User Name and Password?
How to change Login User Name and Password?How to change Login User Name and Password?
How to change Login User Name and Password?
 

Viewers also liked

Exposición a radiacion uv
Exposición a radiacion uvExposición a radiacion uv
Exposición a radiacion uvEric Ibacache
 
Erosion of Pondicherry beaches
Erosion of Pondicherry beachesErosion of Pondicherry beaches
Erosion of Pondicherry beachesequitywatch
 
CRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsCRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsGAURAV. H .TANDON
 
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTOVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTReymarie Oohlala
 

Viewers also liked (8)

Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
 
Chatelier proj2
Chatelier   proj2Chatelier   proj2
Chatelier proj2
 
Exposición a radiacion uv
Exposición a radiacion uvExposición a radiacion uv
Exposición a radiacion uv
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Danfoss Campus Update
Danfoss Campus UpdateDanfoss Campus Update
Danfoss Campus Update
 
Erosion of Pondicherry beaches
Erosion of Pondicherry beachesErosion of Pondicherry beaches
Erosion of Pondicherry beaches
 
CRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas NotificationsCRZ Coastal and Marine Areas Notifications
CRZ Coastal and Marine Areas Notifications
 
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENTOVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
OVERVIEW OF TOURISM PLANNING AND DEVELOPMENT
 

Similar to Secure wireless modem

Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Mohamed Loey
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overviewali raza
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxlez31palka
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Netgear Italia
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data planeNetProtocol Xpert
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCreekside Marketing Group, LLC
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modefankrid
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ systemRobert Parker
 

Similar to Secure wireless modem (20)

Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docx
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial Networks
 
Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_mode
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
Aruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guideAruba cppm 6_1_user_guide
Aruba cppm 6_1_user_guide
 
presantion
presantionpresantion
presantion
 
W I F Iconfig
W I F IconfigW I F Iconfig
W I F Iconfig
 

More from creativelakshu

More from creativelakshu (6)

Configure wifi
Configure wifiConfigure wifi
Configure wifi
 
Dcp introduction1
Dcp introduction1Dcp introduction1
Dcp introduction1
 
Lakshu profile
Lakshu profileLakshu profile
Lakshu profile
 
Chatelier proj1
Chatelier   proj1Chatelier   proj1
Chatelier proj1
 
Kittens and vaccinations_and_deworming
Kittens and vaccinations_and_dewormingKittens and vaccinations_and_deworming
Kittens and vaccinations_and_deworming
 
Share&care meet 2012
Share&care meet 2012Share&care meet 2012
Share&care meet 2012
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Secure wireless modem

  • 1. • Access Restriction using Password
  • 2. Login to the ADSL Router on http://192.168.1.1 The username and password by default are ‘admin’ and ‘admin’. Click on ‘advanced’
  • 3. Click on ‘wireless security’
  • 4. Select the WEP security. Enable WEP security. Key in the desired security password. Click on Apply.
  • 5. • Access List (MAC based)
  • 6. • To add the clients to the access list, find out the MAC id of the clients (wireless interface card) where the connectivity is required, using the command ipconfig –all. • To find out the MAC id from already active clients, follow the following method.
  • 7. •Click on ‘lan clients’ under the ‘advanced’ menu
  • 8. Copy the MAC ids for the clients whom access has to be permitted.
  • 9. • To add the clients to the access list find the following method.
  • 10. •Click on ‘wireless management’ under ‘advanced’ menu.
  • 11. Select the check box ‘enable access list’ Select ‘allow’ Enter the MAC id in the space provided. Click on add.
  • 13. • Save the entire configuration by following the method given below.

Editor's Notes

  1. Proceed to Wireless Security