Five ways to check if your router is configured securely | WeLiveSecurity (2024)

In a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.

Cybersecurity nowadays requires more (and better) protective measures than ever before. These measures range from adopting what are acknowledged as best practices, through helping end-users to stay well-informed about upcoming threats and how to avoid them, to implementing internet security technology and keeping it up to date.

In a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.

Whether we are speaking about the work, school or home environment, security must consider and protect all elements that could become gateways for possible attacks. In this article we will review some security aspects users should look at in a home network ―particularly those related to the configuration of its internet-connected router.

1. Conduct router connectivity and authentication tests

Recently, we published information at WeLiveSecurity.com about how to secure your home router to prevent IoT threats. Now we will review other important points for the administration and configuration of routers ―in particular, steps pertaining to ports and services.

Routers allow administration and configuration using some ports in the local network; this could be done via Ethernet cable or wireless connection. Usually you can configure your router via the web, but routers also allow connections for other services and ports, such as FTP (port 21), SSH (22), Telnet (23), HTTP (80), HTTPS (443), or SMB (139, 445).

In addition to these, there are various other well-known and well-used services whose default ports are established as internet standards ―defined by the Internet Assigned Numbers Authority (IANA). Although the blocked port configuration might be set in your router by default, you can review it to ascertain the status and configuration settings. In other words, you can enable only the services you need, disable all others, and block unused ports. Even for remote connections, except where they are necessary.

The same logic applies to the use of passwords for management of services. If possible, you should change both (admin) password and username, so neither is the out-of-the-box default. If the router default password has not been changed, it could be known to, or easily guessed by, attackers; if that is the case, they can log into your router and reconfigure it, or compromise your network.

Also, we advise the use of long and complex passwords, or a passphrase for these purposes; you can use a password manager to create and store passwords in a safe place. Therefore, it is important to review the configuration of services and ports, the user accounts and the strength of passwords.

2. Perform vulnerability tests on the router

There is another aspect to consider when looking for weak points in your router settings – tests for routers that can be carried out using tools that automate tasks such as looking for known vulnerabilities. This type of tool includes information, options and suggestions on how to solve these possible problems. Attackers use similar tools to identify vulnerabilities in your router, so it’s a good idea to use them too, so that your router is no longer low-hanging fruit.

Some router tests include scanning for port vulnerabilities, malicious DNS server reputation, default or easy-to-crack passwords, vulnerable firmware, or malware attacks. Some also include vulnerability analysis of the router’s web server component, looking for issues such as cross-site scripting (XSS), code injection or remote code execution.

If you don’t know about these attacks and breaches, be sure to find a router test (or a group of tests) that does as much as possible of the hard work for you. While it’s not a complete test, a good way to start could be with the Connected Home Monitor tool.

3. Verify connected devices in the network

A third aspect of maintaining the proper functioning and performance of the router and the network is the identification of connected devices. Sometimes, due to bad practices and the use of vulnerable protocols, it’s possible for trusted devices to connect without proper authorization, and also for untrusted devices to connect.

It is therefore a good idea to be aware of and able to identify all the devices that connect to your router: firstly, to avoid the consumption of resources by third parties that do so illegitimately and degrade the network’s performance, and secondly, as a security measure, to prevent your information from being compromised.

Whether this verification is done through an automated tool or by manually using the router’s administration options, the appropriate next step consists of permitting allowed devices only, by using filters to restrict access to specific IP addresses or MAC addresses only.

To start this activity, the Connected Home Monitor tool provides an easy-to-access list of connected devices, categorized by device type (e.g. printer, router, mobile device, and so on), to show what is connected to your home network. Then, you must make the changes yourself using your router interface.

4. Update all devices on the home network

The recent news of the vulnerability known as KRACK (Key Reinstallation AttaCK), which allows the interception of traffic between devices that connect to an access point in a Wi-Fi network, emphasizes again the importance of updates.

For an attack to take advantage of this vulnerability, its perpetrator would normally have to be near the intended victim’s Wi-Fi network. Success would allow the attacker to spy on communications or install malware. We always recommend updating all devices connected to your network (like computers, smartphones or tablets), once the manufacturers publish the security patches that address the vulnerability; also install the updates to the firmware of the routers, as soon as patches are available.

Other practices, such as configuring computers for “Public Network” mode, increase the security level of the device compared to the “Private/Home” network mode, because it lessens the risk of attack across trusted devices. We would like to stress that the most essential thing to do is to keep computers and devices updated.

5. Enable security options

A fifth desirable practice is to enable the security options that are available in the configuration of the router, which vary depending on the model and type of device. Regardless of the router model used in your home network, we advise that you enable security options that are designed to offer more protection of your devices and the network.

For example, some recent routers include configuration options that allow increased protection against known Denial of Service (DoS) attacks, such as SYN Flooding, ICMP Echo, ICMP Redirection, Local Area Network Denial (LAND), Smurf and WinNuke. If enabling these options prevents your router and network performing properly, selectively disable them to improve performance.

The protection of information – a never-ending task

We have just touched lightly on five practices that help to improve security levels. It’s important to review the settings of your router and to change them, as needed, to contribute to the overall protection of the network, router, devices and, of course, your data; doing so will help block many of the entry points used by currently prevalent cybersecurity threats.

Miguel Ángel Mendoza

Sign up to receive an email update whenever a new article is published in our Ukraine Crisis – Digital Security Resource Center

Newsletter

Similar Articles

router

Remote access flaws found in popular routers, NAS devices

router

Most routers full of firmware flaws that leave users at risk

router

VPNFilter update: More bad news for routers

router

Router reboot: How to, why to, and what not to do

Discussion

Five ways to check if your router is configured securely | WeLiveSecurity (2024)

FAQs

What are the 5 main steps in configuring a router? ›

At any rate, setting up a tightly managed, secure home network is possible by following these five steps.
  • Connect your router. ...
  • Access the router's interface and build it. ...
  • Configure security and IP addressing. ...
  • Set up sharing and control. ...
  • Set up user accounts.
Jul 29, 2020

How do I check my router configuration? ›

In Windows 10, go to Settings > Network & Internet > Status > View hardware and connection properties. In Windows 11, go to Settings > Network & internet > Advanced network settings > Hardware and connection properties. The next screen displays details for your different network connections.

How can I configure my router securely? ›

How to set up Wi-Fi router securely: The specifics
  1. Update your router with new firmware and keep it up to date.
  2. Change your login credentials and router password.
  3. Always use WPA2 to secure your wireless network.
  4. Disable WPS.
  5. Schedule your wireless network's online schedule.
  6. Get rid of any risky or unverified services.
Feb 7, 2019

How will you know that the router had been configured successfully? ›

Run a speed test -- from a computer connected to your router -- to be sure that your router is connecting to the web and is able to transfer data.

What are the 10 options to configure a router? ›

10 Useful Options You Can Configure In Your Router's Web...
  • Accessing Your Router's Web Interface. ...
  • See Who's Connected. ...
  • Wireless Channel. ...
  • Extend an Existing Network. ...
  • Quality of Service. ...
  • Dynamic DNS. ...
  • Port Forwarding, Port Triggering, DMZ & UPnP. ...
  • Parental Controls, Website Blocking, and Access Scheduling.
Aug 7, 2017

How do I configure my router for networking? ›

Configure your router
  1. Using your web browser, enter the router's default IP address into the address bar, then press Enter. ...
  2. The router's sign-in page will appear. ...
  3. Your router's settings page will appear. ...
  4. Locate and select the Network Password setting, and choose an Encryption option. ...
  5. Enter your desired password.

What are basic router configuration commands? ›

10.1. 1 — Basic Router Configuration Steps
  • Router(config)# hostname hostname. ...
  • Router(config)# enable secret password. ...
  • Router(config)# line console 0. ...
  • Router(config-line)# line vty 0 4. ...
  • Router(config-line)# exit. ...
  • Router(config)# banner motd delimiter message delimiter. ...
  • Router(config)# end. ...
  • Router> enable.

What does it mean to configure a router? ›

Router configuration: Specifies the correct IP addresses and route settings, etc. Host configuration: Sets up a network connection on a host computer/laptop by logging the default network settings, such as IP addressing, proxy, network name and ID/password, to enable network connection and communication.

How do I check my routers function? ›

To test if your router is working, try to ping one computer using another computer in the same network. You should be able to do this if the router is working properly. Your computer's firewall must be disabled as well. To learn more on how to check the computer's connectivity with the router, click here.

Which security method is best for router? ›

WPA3 Personal is the newest, most secure protocol currently available for Wi-Fi devices.

How you would configure and secure wireless devices? ›

Keep your home Wi-Fi safe in 7 simple steps
  1. Change the default name of your home Wi-Fi. ...
  2. Make your wireless network password unique and strong. ...
  3. Enable network encryption. ...
  4. Turn off network name broadcasting. ...
  5. Keep your router's software up to date. ...
  6. Make sure you have a good firewall. ...
  7. Use VPNs to access your network.
Mar 15, 2022

How do you check if the network configuration is working? ›

Select the Start button, then type settings. Select Settings > Network & internet. The status of your network connection will appear at the top. Windows 10 lets you quickly check your network connection status.

Which of the following should be the first step in configuring a router *? ›

  • Step 1: Place your wireless router. ...
  • Step 2: Configure your wireless router gateway. ...
  • Step 3: Connect your gateway to your new router. ...
  • Step 4: Change your wireless router's admin password. ...
  • Step 5: Update the router's firmware. ...
  • Step 6: Establish a password for your Wi-Fi network. ...
  • Step 7: Enjoy your Wi-Fi network!
Jun 15, 2017

How do I make sure my router is updated? ›

How to Update Your Router. To update your router's firmware, type your router's IP address into your web browser and enter your login information. Then locate the Firmware or Update section and download the latest firmware update on your router manufacturer's website. Finally, upload the update and reboot the router.

How many types of router configurations are there? ›

Types of Routing

Routing can be classified into three categories: Static Routing. Default Routing. Dynamic Routing.

What are the three modes of router configuration? ›

The router has three command-line modes. There's a User EXEC mode, the Privileged EXEC mode, and the Global Configuration mode.

What are configuration commands? ›

Use the CONFIG command to change or check the configuration of the system. You can use the CONFIG command to change the online or offline status of available processors, storage amounts, storage ranges, central storage elements, PCIE function identifiers (PFIDs), storage-class memory (SCM), and channel paths: Directly.

Which command is used for router configuration mode? ›

There are five command modes: global configuration mode, interface configuration mode, subinterface configuration mode, router configuration mode, and line configuration mode.
...
Router>- User EXEC mode
Router(config-router)#- Routing engine level within configuration mode
4 more rows

What are the types of configuration in network? ›

Some network configuration basics include switch/router configuration, host configuration, software and firewall configuration, and network topology which can be controlled through rest APIs.

What are the 2 types of network configuration? ›

What are the types of network configuration?
  • Bus: Every node or device in the network is connected in a linear order with a unidirectional data flow. ...
  • Ring: Nodes are connected circularly, while data can flow in one or both directions as per needs.

Why router configuration is important? ›

Router settings are an extremely valuable and versatile resource. You can use it to boost security, eradicate vulnerabilities, and even speed up your connection. But managing all your configurations manually can be difficult, especially for larger networks.

What are the three areas of router security? ›

Which three areas of router security must be maintained to secure an edge router at the network perimeter? Router hardening. Operating system security. And physical security.

What is a basic security for a wireless router? ›

Many routers today offer two or three different security schemes: WEP, WPA, and WPA2. We recommend WPA or WPA2 security since it is more secure than WEP. However, for compatibility with some older devices, such as gaming consoles, TiVo, and other network devices, WEP may be the only security option possible to use.

Which routing is more secure? ›

Static Routing is also known as non-adaptive routing which doesn't change the routing table unless the network administrator changes or modifies them manually. Static routing does not use complex routing algorithms and It provides high or more security than dynamic routing.

When operating a router What are 5 safety measures when working with this tool? ›

12 Tips for Router-Table Safety
  • Use push blocks to position your hands a safe distance from the bit.
  • Large-diameter bits are for use only in a router table. ...
  • Always wear eye and hearing protection.
  • Take light cuts. ...
  • Use a featherboard to support the workpiece against the router table or fence.
  • Never climb-cut.
Aug 10, 2006

What are five safety rules to follow when using a router? ›

What should you do to work with a router safely?
  • Hold both hands on router handles always, until a motor has stopped. ...
  • Do not overreach. ...
  • When inside routing, start the motor with the bit above the stock. ...
  • When routing outside edges, guide the router counter clockwise around the work.

What are the five techniques used for wireless security? ›

5 Solutions to Wireless Security Threats
  • Firewalls. ...
  • Intrusion Detection. ...
  • Content Filtering. ...
  • Authentication. ...
  • Data Encryption.
May 29, 2020

What are the 4 steps in installing the router to the computer? ›

But if you want a general walk-through of setting up your home network, these steps should get you fully connected.
  1. Check your internet connection. ...
  2. Place the router. ...
  3. Connect to power. ...
  4. Connect to your internet source. ...
  5. Access the router's web interface. ...
  6. Connect wired devices. ...
  7. Connect your PC or device to Wi-Fi.
May 24, 2022

What are the steps to configure a network? ›

  1. Step 1: Inspect your hardware. Check the model number of your shiny new switch. ...
  2. Step 2: Set up management IP. ...
  3. Step 3: Check VTP revision number. ...
  4. Step 4: Configure access ports. ...
  5. Step 5: Configure trunk ports. ...
  6. Step 6: Configure access ports. ...
  7. Step 7: Set up VTY line config.

What is the first step before configuring your router? ›

The first step is to setup Wi-Fi access on your Laptop/PC using the Wi-Fi details (SSID and password). Now you should be able to connect to the router, and the router should assign you an IP address. You can check your IP address and find the IP address of the router by using the ipconfig command.

How do I configure my router IP address? ›

The process should be very similar for routers from other manufacturers.
  1. Enter your router's IP address into your favorite web browser.
  2. Enter the router user name and password.
  3. Select Guest Network.
  4. Ensure that the Enable SSID Broadcast check box selected.
  5. Give the guest network name.
  6. Select a security option.

What are 3 functions of routers? ›

A router is a switching device for networks, which is able to route network packets, based on their addresses, to other networks or devices. Among other things, they are used for Internet access, for coupling networks or for connecting branch offices to a central office via VPN (Virtual Private Network).

What are the three 3 most common addresses of the wireless router? ›

Your router's instructions should include this information, but some of the most common addresses include 192.168. 0.1, 192.168. 1.1, and 192.168. 2.1.

What are the three main functions of a router explain each function? ›

Functions of Router

It joins networks with different network addresses. It finds the shortest path to send packets to the destination. It defines logical address schemes.

What are the 7 practical steps for networking? ›

Here's 7 Steps to Networking Effectively:
  • Networking is about contact. It's eye contact, face-to-face contact, phone contact, e-mail contact. ...
  • Be the one to initiate. Keep your eyes and ears open to prospects. ...
  • Be bold. ...
  • Anticipate discomfort. ...
  • Expect acceptance. ...
  • Pass it on. ...
  • Always respond.
Sep 12, 2017

How do you configure a network service? ›

Configure network services settings
  1. Click the Device Management tab.
  2. From the device list, double-click the device to display the device properties menu.
  3. Click Network Services.
  4. Complete the fields and click Save to save your changes.
Feb 21, 2023

What are the three commands used to set up secure access of a router? ›

Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
...
  • service password-encryption.
  • enable.
  • copy running-config startup-config.
  • login.
  • ip address 192.168.4.4 255.255.255.0.

Top Articles
Latest Posts
Article information

Author: Neely Ledner

Last Updated:

Views: 5980

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Neely Ledner

Birthday: 1998-06-09

Address: 443 Barrows Terrace, New Jodyberg, CO 57462-5329

Phone: +2433516856029

Job: Central Legal Facilitator

Hobby: Backpacking, Jogging, Magic, Driving, Macrame, Embroidery, Foraging

Introduction: My name is Neely Ledner, I am a bright, determined, beautiful, adventurous, adventurous, spotless, calm person who loves writing and wants to share my knowledge and understanding with you.