{"id":1259,"date":"2022-12-15T20:26:27","date_gmt":"2022-12-15T20:26:27","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1259"},"modified":"2022-12-15T20:26:27","modified_gmt":"2022-12-15T20:26:27","slug":"%d9%85%d8%a7-%d9%8a%d8%ac%d8%a8-%d8%a3%d9%86-%d8%aa%d8%b9%d8%b1%d9%81%d9%87-%d8%b9%d9%86%d8%af-%d8%aa%d8%b1%d9%83%d9%8a%d8%a8-%d8%a7%d9%84%d8%b1%d8%a7%d9%88%d8%aa%d8%b1-%d8%a7%d9%84%d9%84%d8%a7%d8%b3","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ar\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9\/%d9%85%d8%a7-%d9%8a%d8%ac%d8%a8-%d8%a3%d9%86-%d8%aa%d8%b9%d8%b1%d9%81%d9%87-%d8%b9%d9%86%d8%af-%d8%aa%d8%b1%d9%83%d9%8a%d8%a8-%d8%a7%d9%84%d8%b1%d8%a7%d9%88%d8%aa%d8%b1-%d8%a7%d9%84%d9%84%d8%a7%d8%b3\/","title":{"rendered":"\u0645\u0627 \u064a\u062c\u0628 \u0623\u0646 \u062a\u0639\u0631\u0641\u0647 \u0639\u0646\u062f \u062a\u062b\u0628\u064a\u062a \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064a\u0629 \u0627\u0644\u0645\u0646\u0632\u0644\u064a\u0629 (Wi-Fi)"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One commonality that stands out when discussing Cisco network routers and switches: is the renowned Internetwork Operating System (IOS). This powerful \u201cengine\u201d is what powers all of these devices, ensuring their successful operation. This article will primarily center on iOS and analyze how to manipulate it. Before that occurs, though, I\u2019d like you to be aware of the two distinct approaches used when operating with iOS: either through a Command Line Interface (CLI) or Graphical User Interface (GUI).<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0648\u0627\u062c\u0647\u0629 \u0633\u0637\u0631 \u0627\u0644\u0623\u0648\u0627\u0645\u0631 (CLI) \u0647\u064a \u0637\u0631\u064a\u0642\u0629 \u0645\u062a\u0642\u062f\u0645\u0629 \u0644\u062a\u0643\u0648\u064a\u0646 \u0623\u062c\u0647\u0632\u0629 IOS. \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 CLI\u060c \u064a\u0645\u0643\u0646\u0646\u0627 \u0625\u062f\u062e\u0627\u0644 \u0623\u0648\u0627\u0645\u0631 \u062f\u0642\u064a\u0642\u0629 \u0633\u062a\u0624\u062f\u064a \u0625\u0644\u0649 \u062d\u062f\u0648\u062b \u0627\u0644\u0633\u0644\u0648\u0643 \u0627\u0644\u0645\u0637\u0644\u0648\u0628. \u0644\u0630\u0644\u0643\u060c \u0633\u064a\u0643\u0648\u0646 \u0644\u062f\u064a\u0646\u0627 \u0633\u064a\u0637\u0631\u0629 \u0643\u0627\u0645\u0644\u0629 \u0648\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0623\u0648 \u0627\u0644\u0645\u062d\u0648\u0644\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0646\u0627.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u062a\u0648\u0641\u0631 \u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0631\u0633\u0648\u0645\u064a\u0629 (GUI) \u0646\u0647\u062c\u064b\u0627 \u0623\u0643\u062b\u0631 \u0633\u0647\u0648\u0644\u0629 \u0641\u064a \u0627\u0644\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0644\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0645\u062b\u0644 \u0647\u0630\u0647. \u063a\u0627\u0644\u0628\u064b\u0627 \u0645\u0627 \u0646\u0639\u062a\u0645\u062f \u0639\u0644\u064a\u0647\u0627 \u0639\u0646\u062f \u0625\u0639\u062f\u0627\u062f \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0634\u0628\u0643\u0629 \u0627\u0644\u0635\u063a\u064a\u0631\u0629 \u0645\u062b\u0644 \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064a\u0629 \u0627\u0644\u0645\u0646\u0632\u0644\u064a\u0629 (Wi-Fi). \u0633\u064a\u062a\u0646\u0627\u0648\u0644 \u0647\u0630\u0627 \u0627\u0644\u0642\u0633\u0645 \u0643\u064a\u0641\u064a\u0629 \u0648\u0635\u0648\u0644 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0625\u0644\u0649 Cisco IOS (\u0627\u0644\u0625\u0635\u062f\u0627\u0631\u0627\u062a 15.2 \u0623\u0648 12.4) \u0645\u0646 \u062e\u0644\u0627\u0644 \u0648\u0627\u062c\u0647\u0629 \u0633\u0637\u0631 \u0627\u0644\u0623\u0648\u0627\u0645\u0631 \u0644\u062a\u062d\u0642\u064a\u0642 \u062a\u0634\u063a\u064a\u0644 \u0641\u0639\u0627\u0644.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"introduction-to-the-cli\"><b>\u0645\u0642\u062f\u0645\u0629 \u0625\u0644\u0649 CLI<\/b><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"basic-router-configurations\"><b>\u062a\u0643\u0648\u064a\u0646\u0627\u062a \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">Now it\u2019s time to dive into the exciting bits of this article and begin with a Cisco Router setup. Moreover, we will util<\/span>\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0645\u062d\u0627\u0643\u064a \u0627\u0644\u0634\u0628\u0643\u0629 \u0644\u0625\u0646\u0634\u0627\u0621 \u0628\u064a\u0626\u0629 \u0634\u0628\u0643\u062a\u0646\u0627<span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To ensure that our Cisco Router is up and running, here are some critical settings we\u2019ll configure:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>\u0627\u0633\u0645 \u0627\u0644\u0645\u0636\u064a\u0641:<\/b><span style=\"font-weight: 400;\"> \u0627\u0633\u0645 \u0627\u0644\u062c\u0647\u0627\u0632.<\/span><\/li>\n\n\n\n<li><b>\u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0645\u0631\u0648\u0631:<\/b><span style=\"font-weight: 400;\"> \u0645\u0634\u0641\u0631\u0629 \u0628\u0634\u0643\u0644 \u0622\u0645\u0646 \u0623\u0648 \u064a\u062a\u0645 \u0646\u0642\u0644\u0647\u0627 \u0641\u064a \u0635\u064a\u063a\u0629 \u0645\u0641\u062a\u0648\u062d\u0629 \u0648\u063a\u064a\u0631 \u0645\u0634\u0641\u0631\u0629.<\/span><\/li>\n\n\n\n<li><b>\u0639\u0646\u0627\u0648\u064a\u0646 IP:<\/b><span style=\"font-weight: 400;\"> \u062f\u0627\u062e\u0644 \u0627\u0644\u0648\u0627\u062c\u0647\u0627\u062a.<\/span><\/li>\n<\/ul>\n\n\n\n<p><b>\u0627\u0644\u0648\u0635\u0648\u0644 \u0639\u0646 \u0628\u0639\u062f:<\/b><span style=\"font-weight: 400;\"> \u0625\u062f\u0627\u0631\u0629 \u0623\u062c\u0647\u0632\u062a\u0643 \u0627\u0644\u0634\u0628\u0643\u064a\u0629 \u0628\u0633\u0647\u0648\u0644\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u062a\u0635\u0627\u0644\u0627\u062a Telnet \u0623\u0648 SSH \u0627\u0644\u0622\u0645\u0646\u0629.<\/span><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"a-user-access-levels-in-cisco-ios\"><b>\u0623) \u0645\u0633\u062a\u0648\u064a\u0627\u062a \u0648\u0635\u0648\u0644 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0641\u064a Cisco IOS<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u0644\u0642\u062f \u0637\u0648\u0631\u0648\u0627 \u062b\u0644\u0627\u062b\u0629 \u0645\u0633\u062a\u0648\u064a\u0627\u062a \u0648\u0635\u0648\u0644 \u0645\u0639 \u0623\u0646\u0634\u0637\u0629 \u0645\u0645\u064a\u0632\u0629 \u0645\u062a\u0627\u062d\u0629 \u0644\u0643\u0644 \u0645\u0633\u062a\u062e\u062f\u0645 \u0644\u0623\u0633\u0628\u0627\u0628 \u0623\u0645\u0646\u064a\u0629.<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u062a\u0635\u0627\u0644\u0643 \u0628\u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0639\u0646 \u0637\u0631\u064a\u0642 \u062a\u0634\u063a\u064a\u0644 \u0623\u0648\u0627\u0645\u0631 \u0645\u062b\u0644 ping \u0623\u0648 traceroute. (&gt;)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Get an inside look into what\u2019s actually happening with the device. (#)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0644\u0625\u062c\u0631\u0627\u0621 \u0623\u064a \u062a\u063a\u064a\u064a\u0631\u0627\u062a. (config)#<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0639\u0646\u062f \u0627\u0644\u0627\u062a\u0635\u0627\u0644 \u0628\u062c\u0647\u0627\u0632 Cisco \u0645\u062b\u0644 \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0623\u0648 \u0627\u0644\u0645\u062d\u0648\u0644 \u0623\u0648 \u0627\u0644\u062c\u062f\u0627\u0631 \u0627\u0644\u0646\u0627\u0631\u064a\u060c \u0633\u064a\u062a\u0645 \u0645\u0646\u062d\u0643 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 <\/span><b>\u0648\u0636\u0639 \u0627\u0644\u062a\u0646\u0641\u064a\u0630<\/b><span style=\"font-weight: 400;\"> (&gt;) \u2013 the primary access level. With this user exec access level, you can only perform basic commands such as ping and traceroute.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To access a greater set of commands and privileges, it\u2019s essential to enter the following command: Router&gt;enable. This will allow you to ascend the ladder and upgrade your level of control.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0644\u0642\u062f \u0648\u0635\u0644\u0646\u0627 \u0625\u0644\u0649 \u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u062b\u0627\u0646\u064a: <\/span><b>\u0648\u0636\u0639 \u0627\u0644\u0627\u0645\u062a\u064a\u0627\u0632<\/b><span style=\"font-weight: 400;\"> \u2013 R1#. Here you can observe every action taken with the equipment (through various show commands), yet you cannot make any changes.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0631\u0627\u0648\u062a\u0631&gt;\u062a\u0645\u0643\u064a\u0646<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0631\u0627\u0648\u062a\u0631#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">To create alterations to the device, we would have to advance our access level up an additional notch \u2013 reaching a commanding level known as <\/span><b>\u0648\u0636\u0639 \u0627\u0644\u062a\u0643\u0648\u064a\u0646 \u0627\u0644\u0639\u0627\u0644\u0645\u064a<\/b><span style=\"font-weight: 400;\">. \u064a\u0648\u0641\u0631 \u0644\u0646\u0627 \u0647\u0630\u0627 \u0627\u0644\u0648\u0636\u0639 \u0627\u0644\u0645\u0631\u0645\u0648\u0642 \u0642\u062f\u0631\u0627\u062a \u0648\u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u0623\u0643\u0628\u0631 \u0645\u0646 \u0630\u064a \u0642\u0628\u0644.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0631\u0627\u0648\u062a\u0631#\u062a\u0643\u0648\u064a\u0646 \u0637\u0631\u0641\u064a\u0629<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0631\u0627\u0648\u062a\u0631(\u062a\u0643\u0648\u064a\u0646)#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">By accessing the Cisco device\u2019s global configuration mode, you can make any desired alterations with complete control \u2013 akin to having Windows Administrator or root user access on Linux.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To ensure you\u2019re prepared for any challenge, here are a few commands that I highly suggest familiarizing yourself with: If you want to save time and typing effort while still ensuring accuracy, we\u2019ve got the perfect solution for composing longer commands.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">When you type \u201cR1#show run\u201d and hit the TAB key, it will autocomplete your command. Furthermore, if you enter a question mark (?), any subsequent commands will be displayed on-screen.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/R1-image-1.jpg\" alt=\"\u0635\u0648\u0631\u0629 R1\" class=\"wp-image-1260\" width=\"841\" height=\"434\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"b-selecting-a-device-name-hostname\"><b>\u0628) \u0627\u062e\u062a\u064a\u0627\u0631 \u0627\u0633\u0645 \u0627\u0644\u062c\u0647\u0627\u0632 (\u0627\u0633\u0645 \u0627\u0644\u0645\u0636\u064a\u0641)<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u0644\u062a\u063a\u064a\u064a\u0631 \u0627\u0633\u0645 \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0623\u0648 \u0627\u0644\u0645\u062d\u0648\u0644\u060c \u0643\u0644 \u0645\u0627 \u0639\u0644\u064a\u0643 \u0641\u0639\u0644\u0647 \u0647\u0648 \u0625\u062f\u062e\u0627\u0644 \u0647\u0630\u0627 \u0627\u0644\u0623\u0645\u0631: (\u0633\u062a\u0631\u0627\u0647 \u0641\u064a \u0627\u0644\u0635\u0648\u0631\u0629 \u0627\u0644\u062a\u0627\u0644\u064a\u0629)<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0631\u0627\u0648\u062a\u0631(\u062a\u0643\u0648\u064a\u0646)#\u0627\u0633\u0645 \u0627\u0644\u0645\u0636\u064a\u0641 ROUTER_NAME<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>ROUTER_NAME(\u062a\u0643\u0648\u064a\u0646)#<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"c-securing-access-to-the-router\"><b>\u062c) \u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">To protect your Router against unauthorized access, let\u2019s look into how we can set up a password in privilege mode (#). Follow this straightforward process to complete the task:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Securing-access-to-the-router-2-1.jpg\" alt=\"\u062a\u0623\u0645\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0635\u0648\u0631\u0629 \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647\" class=\"wp-image-1261\" width=\"838\" height=\"254\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0631\u0627\u0648\u062a\u0631(\u062a\u0643\u0648\u064a\u0646)#\u0627\u0633\u0645 \u0627\u0644\u0645\u0636\u064a\u0641 R1<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#enable password cisco \u0623\u0648<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u062a\u0645\u0643\u064a\u0646 \u0627\u0644\u0633\u0631 cisco123<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0647\u0630\u0627 \u0627\u0644\u0623\u0645\u0631 \u0633\u064a\u0636\u0639 \u0644\u0627\u0641\u062a\u0629 \u062a\u062d\u0630\u064a\u0631 \u0644\u0623\u064a \u0634\u062e\u0635 \u064a\u062d\u0627\u0648\u0644 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0627\u0644\u062c\u0647\u0627\u0632\u060c \u062a\u0646\u0628\u0647\u0647\u0645 \u0628\u0627\u0644\u0639\u0648\u0627\u0642\u0628 \u0627\u0644\u0645\u062d\u062a\u0645\u0644\u0629.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u0634\u0639\u0627\u0631 motd \"\u0627\u0644\u0648\u0635\u0648\u0644 \u063a\u064a\u0631 \u0627\u0644\u0645\u0635\u0631\u062d \u0628\u0647 \u0645\u0631\u0641\u0648\u0636\"<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">If your query is regarding the distinctions between an \u201cenable password\u201d, and a \u201csecret enable,\u201d you\u2019ve come to the right place. Here\u2019s what sets them apart:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Unauthorized-access-3-1.jpg\" alt=\"\u0635\u0648\u0631\u0629 \u0627\u0644\u0648\u0635\u0648\u0644 \u063a\u064a\u0631 \u0627\u0644\u0645\u0635\u0631\u062d \u0628\u0647\" class=\"wp-image-1262\" width=\"841\" height=\"453\"\/><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">\u064a\u062a\u0645 \u062a\u0631\u0645\u064a\u0632 \u062a\u0643\u0648\u064a\u0646 \u0648\u0627\u062d\u062f (#enable secret) \u0628\u064a\u0646\u0645\u0627 \u064a\u0628\u0642\u0649 \u0627\u0644\u0622\u062e\u0631 (#enable password) \u063a\u064a\u0631 \u0645\u0634\u0641\u0631.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Let\u2019s begin by configuring the Router for network access (reachability) using the following topology:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Router-for-network-access-1.jpg\" alt=\"\u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0644\u0635\u0648\u0631\u0629 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0627\u0644\u0634\u0628\u0643\u0629\" class=\"wp-image-1263\" width=\"841\" height=\"421\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"d-configuring-an-ip-address-on-the-router\"><b>\u062f) \u062a\u0643\u0648\u064a\u0646 \u0639\u0646\u0648\u0627\u0646 IP \u0639\u0644\u0649 \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u064a\u0639\u062f \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0623\u062f\u0627\u0629 \u0644\u0627 \u062a\u0642\u062f\u0631 \u0628\u062b\u0645\u0646 \u062a\u062a\u064a\u062d \u0644\u0646\u0627 \u0631\u0628\u0637 \u0634\u0628\u0643\u0627\u062a \u0645\u062a\u0639\u062f\u062f\u0629 \u0628\u0633\u0644\u0627\u0633\u0629 \u0639\u0628\u0631 \u0645\u0646\u0627\u0641\u0630 \u0645\u062e\u062a\u0644\u0641\u0629\u060c \u0639\u0627\u062f\u0629\u064b \u0627\u062b\u0646\u064a\u0646 \u0623\u0648 \u062b\u0644\u0627\u062b\u0629. \u0646\u0634\u064a\u0631 \u0625\u0644\u0649 \u0627\u0644\u0645\u0646\u0641\u0630 \u0643\u0627\u0644\u0645\u0633\u0627\u062d\u0629 \u0627\u0644\u0645\u0627\u062f\u064a\u0629 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u062a\u0648\u0635\u064a\u0644 \u0643\u0627\u0628\u0644 \u0628\u0647\u0627. \u0623\u0645\u0627 \u0628\u0627\u0644\u0646\u0633\u0628\u0629 \u0644\u062c\u0627\u0646\u0628\u0647\u0627 \u0627\u0644\u0645\u0646\u0637\u0642\u064a \u0627\u0644\u0645\u0642\u0627\u0628\u0644\u060c \u0641\u0646\u062d\u0646 \u0646\u062d\u062f\u062f\u0647\u0627 \u0643\u0648\u0627\u062c\u0647\u0629.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0644\u062a\u0644\u062e\u064a\u0635:&nbsp;<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\u0627\u0644\u0645\u0646\u0641\u0630 = \u0645\u0627\u062f\u064a<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0627\u0644\u0648\u0627\u062c\u0647\u0629 = \u0645\u0646\u0637\u0642\u064a\u0629 <\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0639\u0644\u0649 \u0633\u0628\u064a\u0644 \u0627\u0644\u0645\u062b\u0627\u0644\u060c \u0633\u0646\u0642\u0648\u0645 \u0628\u062a\u0643\u0648\u064a\u0646 \u0639\u0646\u0648\u0627\u0646 IP (\u0645\u0646\u0637\u0642\u064a) \u0639\u0644\u0649 \u0627\u0644\u0648\u0627\u062c\u0647\u0629 \u0648\u062a\u0648\u0635\u064a\u0644\u0647 \u0641\u0639\u0644\u064a\u064b\u0627 \u0628\u0645\u0646\u0641\u0630 \u0639\u0628\u0631 \u0643\u0627\u0628\u0644.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0644\u0643\u064a \u064a\u062a\u0645 \u0623\u064a \u0627\u062a\u0635\u0627\u0644 \u062f\u0627\u062e\u0644 \u0627\u0644\u0634\u0628\u0643\u0629\u060c \u062a\u062d\u062a\u0627\u062c \u0647\u0630\u0647 \u0627\u0644\u0648\u0627\u062c\u0647\u0627\u062a \u0625\u0644\u0649 \u0639\u0646\u0648\u0627\u0646 IP \u0648\u064a\u062c\u0628 \u062a\u0645\u0643\u064a\u0646\u0647\u0627\u060c \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u062a\u0634\u063a\u064a\u0644\u0647\u0627. \u0643\u0645\u0627 \u0647\u0648 \u0645\u0648\u0636\u062d \u0641\u064a \u0627\u0644\u0634\u0643\u0644\u060c \u064a\u0645\u0643\u0646\u0643 \u0628\u0633\u0647\u0648\u0644\u0629 \u062a\u0643\u0648\u064a\u0646 \u0639\u0646\u0648\u0627\u0646 IP \u0639\u0644\u0649 \u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u0634\u0628\u0643\u0629:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/IP-address-of-the-router-4-1.jpg\" alt=\"\u0639\u0646\u0648\u0627\u0646 IP \u0644\u0635\u0648\u0631\u0629 \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647\" class=\"wp-image-1264\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u0648\u0627\u062c\u0647\u0629 FastEthernet0\/0<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(config-if)#ip \u0627\u0644\u0639\u0646\u0648\u0627\u0646 192.168.1.1 255.255.255.0<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646-\u0648\u0627\u062c\u0647\u0629)#\u0644\u0627 \u0625\u063a\u0644\u0627\u0642<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"f-configuring-remote-access-on-a-router-telnet-ssh\"><b>\u0648) \u062a\u0643\u0648\u064a\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0639\u0646 \u0628\u0639\u062f \u0639\u0644\u0649 \u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 (Telnet\u060c SSH)<\/b><\/h3>\n\n<h2 class=\"wp-block-heading\" id=\"telnet\"><b>\u062a\u0644\u0646\u062a<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">\u062a\u0648\u0641\u0631 \u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0634\u0628\u0643\u0629 \u0627\u062a\u0635\u0627\u0644\u0627\u062a \u0639\u0646 \u0628\u0639\u062f \u0622\u0645\u0646\u0629 \u0628\u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0623\u0648 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 (\u0645\u062b\u0644 \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0648\u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d) \u0623\u0648 \u0627\u0644\u062e\u0648\u0627\u062f\u0645. \u064a\u0636\u0645\u0646 \u0630\u0644\u0643 \u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u0645\u0648\u062b\u0648\u0642 \u0628\u0647 \u0645\u0646 \u0623\u064a \u0645\u0648\u0642\u0639.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/TELNET-5-1.jpg\" alt=\"TELNET 5 1\" class=\"wp-image-1265\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u062e\u0637 vty 0 14<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(\u062a\u0647\u064a\u0626\u0629-\u0627\u0644\u062e\u0637)#\u0643\u0644\u0645\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 \u0633\u064a\u0633\u0643\u0648<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(config-line)#\u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u062f\u062e\u0648\u0644<\/b><\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">To get started, we\u2019ll need to enter our virtual lines (a total of 15), set the password (\u201cCisco\u201d), and then initiate the Telnet process #login.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ssh\"><b>\u0625\u0633 \u0625\u0633 \u0625\u062a\u0634<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">To safely connect to a local area network or Internet device remotely, SSH is the ideal protocol. To configure this on Cisco machines, it\u2019s necessary to take certain steps:<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\u0625\u0646\u0634\u0627\u0621 \u062a\u0633\u062c\u064a\u0644 \u062f\u062e\u0648\u0644 \u0634\u062e\u0635\u064a \u0648\u0643\u0644\u0645\u0629 \u0645\u0631\u0648\u0631.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0625\u0646\u0634\u0627\u0621 \u0627\u0633\u0645 \u0646\u0637\u0627\u0642&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0644\u0636\u0645\u0627\u0646 \u0623\u0642\u0635\u0649 \u062f\u0631\u062c\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646\u060c \u0645\u0646 \u0627\u0644\u0636\u0631\u0648\u0631\u064a \u062a\u0648\u0644\u064a\u062f \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0627\u0644\u0639\u0627\u0645\u0629 \u0648\u0627\u0644\u062e\u0627\u0635\u0629.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0644\u062a\u0645\u0643\u064a\u0646 \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u062e\u0637\u0648\u0637 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a\u0629 (vty)\u060c \u0627\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0623\u0645\u0631 #login local.<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0641\u064a \u0627\u0644\u0634\u0643\u0644 \u0623\u062f\u0646\u0627\u0647\u060c \u064a\u0645\u0643\u0646\u0643 \u0631\u0624\u064a\u0629 \u0645\u062b\u0627\u0644 \u0639\u0644\u0649 \u062a\u0643\u0648\u064a\u0646 SSH \u0639\u0644\u0649 \u062c\u0647\u0627\u0632 \u062a\u0648\u062c\u064a\u0647 Cisco:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/SSH-image-6-1.jpg\" alt=\"\u0635\u0648\u0631\u0629 SSH \" class=\"wp-image-1267\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u0627\u0633\u0645 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 admin \u0627\u0645\u062a\u064a\u0627\u0632 15 \u0643\u0644\u0645\u0629 \u0627\u0644\u0645\u0631\u0648\u0631 admincisco321<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u0639\u0646\u0648\u0627\u0646 IP \u0627\u0633\u0645 \u0627\u0644\u0646\u0637\u0627\u0642 my.home.lab<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u062a\u0648\u0644\u064a\u062f \u0645\u0641\u062a\u0627\u062d \u062a\u0634\u0641\u064a\u0631 rsa \u0628\u0645\u0642\u062f\u0627\u0631 1024<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)#\u0639\u0646\u0648\u0627\u0646 IP \u0625\u0635\u062f\u0627\u0631 ssh 2<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646)\u062e\u0637 vty 0 15<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646-\u062e\u0637)#\u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u062f\u062e\u0648\u0644 \u0627\u0644\u0645\u062d\u0644\u064a<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u062a\u0643\u0648\u064a\u0646-\u062e\u0637)#\u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u0646\u0642\u0644 ssh \u062a\u0644\u0646\u062a<\/code><\/pre>\n\n\n<h2 class=\"wp-block-heading\" id=\"to-sum-up\"><b>\u0644\u062a\u0644\u062e\u064a\u0635<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">\u062c\u0647\u0627\u0632 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0636\u0631\u0648\u0631\u064a<\/span> device in any computer network because it interconnects multiple networks together. It has different networking protocols enabled (like RIP and OSPF) that assist him with the interconnection process. It also offers many different configurations for security purposes (like passwords on Virtual lines). In this article, we\u2019ve learned how to set up an IP address on the Router, as well as for remote access (Telnet &amp; SSH). We\u2019ve also learned about some of the most important configurations <span style=\"font-weight: 400;\">\u064a\u062c\u0628 \u0623\u0646 \u064a\u0639\u0631\u0641\u0647 \u0645\u062f\u064a\u0631 \u0627\u0644\u0634\u0628\u0643\u0629.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>One commonality that stands out when discussing Cisco network routers and switches: is the renowned Internetwork Operating System (IOS). This powerful \u201cengine\u201d is what powers all of these devices, ensuring\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ar\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9\/%d9%85%d8%a7-%d9%8a%d8%ac%d8%a8-%d8%a3%d9%86-%d8%aa%d8%b9%d8%b1%d9%81%d9%87-%d8%b9%d9%86%d8%af-%d8%aa%d8%b1%d9%83%d9%8a%d8%a8-%d8%a7%d9%84%d8%b1%d8%a7%d9%88%d8%aa%d8%b1-%d8%a7%d9%84%d9%84%d8%a7%d8%b3\/\">\u0645\u062a\u0627\u0628\u0639\u0629 \u0627\u0644\u0642\u0631\u0627\u0621\u0629 <span class=\"screen-reader-text\">\u0645\u0627 \u064a\u062c\u0628 \u0623\u0646 \u062a\u0639\u0631\u0641\u0647 \u0639\u0646\u062f \u062a\u062b\u0628\u064a\u062a \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064a\u0629 \u0627\u0644\u0645\u0646\u0632\u0644\u064a\u0629 (Wi-Fi)<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ar\/\u062a\u0642\u0646\u064a\u0629\/\u0645\u0627-\u064a\u062c\u0628-\u0623\u0646-\u062a\u0639\u0631\u0641\u0647-\u0639\u0646\u062f-\u062a\u0631\u0643\u064a\u0628-\u0627\u0644\u0631\u0627\u0648\u062a\u0631-\u0627\u0644\u0644\u0627\u0633\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ar\/\u062a\u0642\u0646\u064a\u0629\/\u0645\u0627-\u064a\u062c\u0628-\u0623\u0646-\u062a\u0639\u0631\u0641\u0647-\u0639\u0646\u062f-\u062a\u0631\u0643\u064a\u0628-\u0627\u0644\u0631\u0627\u0648\u062a\u0631-\u0627\u0644\u0644\u0627\u0633\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T20:26:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"name\":\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"description\":\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Wifi router\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ar\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u062a\u062b\u0628\u064a\u062a \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064a\u0629 \u0627\u0644\u0645\u0646\u0632\u0644\u064a\u0629 (\u0648\u0627\u064a \u0641\u0627\u064a) \u0628\u0634\u0643\u0644 \u0635\u062d\u064a\u062d | securitybriefing.net","description":"\u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u0645\u064a\u0632\u0627\u062a \u0648\u0627\u0644\u0648\u0638\u0627\u0626\u0641 \u0627\u0644\u0645\u062e\u062a\u0644\u0641\u0629 \u0644\u062c\u0647\u0627\u0632 \u062a\u0648\u062c\u064a\u0647 \u0644\u0627\u0633\u0644\u0643\u064a \u0645\u0646\u0632\u0644\u064a \u0648\u0643\u064a\u0641\u064a\u0629 \u062d\u0645\u0627\u064a\u0629 \u0623\u062c\u0647\u0632\u062a\u0643 \u0648\u0628\u064a\u0627\u0646\u0627\u062a\u0643 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0646\u0642\u0627\u0637 \u0627\u0644\u0646\u0647\u0627\u0626\u064a\u0629","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ar\/\u062a\u0642\u0646\u064a\u0629\/\u0645\u0627-\u064a\u062c\u0628-\u0623\u0646-\u062a\u0639\u0631\u0641\u0647-\u0639\u0646\u062f-\u062a\u0631\u0643\u064a\u0628-\u0627\u0644\u0631\u0627\u0648\u062a\u0631-\u0627\u0644\u0644\u0627\u0633\/","og_locale":"ar_AR","og_type":"article","og_title":"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net","og_description":"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection","og_url":"https:\/\/securitybriefing.net\/ar\/\u062a\u0642\u0646\u064a\u0629\/\u0645\u0627-\u064a\u062c\u0628-\u0623\u0646-\u062a\u0639\u0631\u0641\u0647-\u0639\u0646\u062f-\u062a\u0631\u0643\u064a\u0628-\u0627\u0644\u0631\u0627\u0648\u062a\u0631-\u0627\u0644\u0644\u0627\u0633\/","og_site_name":"Security Briefing","article_published_time":"2022-12-15T20:26:27+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"C\u00e9sar Daniel Barreto","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"6 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"What you should know when installing Home Wireless Routers (Wi-Fi)","datePublished":"2022-12-15T20:26:27+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","articleSection":["Tech"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","url":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","name":"\u062a\u062b\u0628\u064a\u062a \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0644\u0627\u0633\u0644\u0643\u064a\u0629 \u0627\u0644\u0645\u0646\u0632\u0644\u064a\u0629 (\u0648\u0627\u064a \u0641\u0627\u064a) \u0628\u0634\u0643\u0644 \u0635\u062d\u064a\u062d | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","datePublished":"2022-12-15T20:26:27+00:00","description":"\u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u0645\u064a\u0632\u0627\u062a \u0648\u0627\u0644\u0648\u0638\u0627\u0626\u0641 \u0627\u0644\u0645\u062e\u062a\u0644\u0641\u0629 \u0644\u062c\u0647\u0627\u0632 \u062a\u0648\u062c\u064a\u0647 \u0644\u0627\u0633\u0644\u0643\u064a \u0645\u0646\u0632\u0644\u064a \u0648\u0643\u064a\u0641\u064a\u0629 \u062d\u0645\u0627\u064a\u0629 \u0623\u062c\u0647\u0632\u062a\u0643 \u0648\u0628\u064a\u0627\u0646\u0627\u062a\u0643 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0646\u0642\u0627\u0637 \u0627\u0644\u0646\u0647\u0627\u0626\u064a\u0629","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","width":2560,"height":1707,"caption":"Wifi router"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What you should know when installing Home Wireless Routers (Wi-Fi)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\u0633\u064a\u0632\u0627\u0631 \u062f\u0627\u0646\u064a\u064a\u0644 \u0628\u0627\u0631\u064a\u062a\u0648","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\u0633\u064a\u0632\u0627\u0631 \u062f\u0627\u0646\u064a\u064a\u0644 \u0628\u0627\u0631\u064a\u062a\u0648 \u0643\u0627\u062a\u0628 \u0648\u062e\u0628\u064a\u0631 \u0645\u0631\u0645\u0648\u0642 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0639\u0631\u0648\u0641 \u0628\u0645\u0639\u0631\u0641\u062a\u0647 \u0627\u0644\u0639\u0645\u064a\u0642\u0629 \u0648\u0642\u062f\u0631\u062a\u0647 \u0639\u0644\u0649 \u062a\u0628\u0633\u064a\u0637 \u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u0645\u0639\u0642\u062f\u0629. \u0648\u0628\u0641\u0636\u0644 \u062e\u0628\u0631\u062a\u0647 \u0627\u0644\u0648\u0627\u0633\u0639\u0629 \u0641\u064a \u0645\u062c\u0627\u0644 \u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a\u060c \u064a\u0633\u0627\u0647\u0645 \u0628\u0627\u0646\u062a\u0638\u0627\u0645 \u0628\u0645\u0642\u0627\u0644\u0627\u062a \u0648\u062a\u062d\u0644\u064a\u0644\u0627\u062a \u062b\u0627\u0642\u0628\u0629 \u062d\u0648\u0644 \u0623\u062d\u062f\u062b \u0627\u062a\u062c\u0627\u0647\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0645\u0627 \u064a\u062b\u0642\u0641 \u0627\u0644\u0645\u062d\u062a\u0631\u0641\u064a\u0646 \u0648\u0627\u0644\u062c\u0645\u0647\u0648\u0631.","url":"https:\/\/securitybriefing.net\/ar\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"\u0648\u0648\u0631\u062f\u0628\u0631\u064a\u0633","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}