{"id":1259,"date":"2022-12-15T20:26:27","date_gmt":"2022-12-15T20:26:27","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1259"},"modified":"2022-12-15T20:26:27","modified_gmt":"2022-12-15T20:26:27","slug":"hvad-du-skal-vide-nar-du-installerer-tradlose-routere-hjemme","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/teknologi\/hvad-du-skal-vide-nar-du-installerer-tradlose-routere-hjemme\/","title":{"rendered":"Hvad du b\u00f8r vide, n\u00e5r du installerer tr\u00e5dl\u00f8se hjemme-routere (Wi-Fi)"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Et f\u00e6llestr\u00e6k, der springer i \u00f8jnene, n\u00e5r man taler om Cisco-netv\u00e6rksroutere og -switche, er det ber\u00f8mte Internetwork Operating System (IOS). Denne kraftfulde \"motor\" er det, der driver alle disse enheder og sikrer deres vellykkede drift. Denne artikel vil prim\u00e6rt handle om iOS og analysere, hvordan man manipulerer det. F\u00f8r det sker, vil jeg dog gerne have, at du er opm\u00e6rksom p\u00e5 de to forskellige tilgange, der bruges, n\u00e5r man arbejder med iOS: enten via en kommandolinje-gr\u00e6nseflade (CLI) eller en grafisk brugergr\u00e6nseflade (GUI).<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Command Line Interface (CLI) er en sofistikeret metode til at konfigurere IOS-enheder. Ved hj\u00e6lp af CLI kan vi indtaste pr\u00e6cise kommandoer, der f\u00e5r den \u00f8nskede adf\u00e6rd til at opst\u00e5. Derfor har vi fuld kontrol over og adgang til vores routere eller switche.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">GUI (Graphical User Interface) tilbyder en meget mere brugervenlig tilgang til styring af enheder som disse. Vi er ofte afh\u00e6ngige af den, n\u00e5r vi etablerer sm\u00e5 netv\u00e6rksgadgets som f.eks. tr\u00e5dl\u00f8se hjemmeroutere (Wi-Fi). Dette afsnit vil se n\u00e6rmere p\u00e5, hvordan brugere kan f\u00e5 adgang til Cisco IOS (version 15.2 eller 12.4) via kommandolinjeinterfacet for at opn\u00e5 effektiv drift.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"introduction-to-the-cli\"><b>Introduktion til CLI<\/b><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"basic-router-configurations\"><b>Grundl\u00e6ggende routerkonfigurationer<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">Nu er det tid til at dykke ned i de sp\u00e6ndende dele af denne artikel og begynde med en Cisco Router-ops\u00e6tning. Desuden vil vi bruge<\/span>bruge en netv\u00e6rkssimulator til at etablere vores netv\u00e6rksmilj\u00f8<span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For at sikre, at vores Cisco-router er oppe at k\u00f8re, er der nogle kritiske indstillinger, vi skal konfigurere:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>V\u00e6rtsnavn:<\/b><span style=\"font-weight: 400;\"> navnet p\u00e5 enheden.<\/span><\/li>\n\n\n\n<li><b>Adgangskoder:<\/b><span style=\"font-weight: 400;\"> sikkert krypteret eller kommunikeret i et \u00e5bent, ukrypteret format.<\/span><\/li>\n\n\n\n<li><b>IP-adresser:<\/b><span style=\"font-weight: 400;\"> inden for gr\u00e6nsefladerne.<\/span><\/li>\n<\/ul>\n\n\n\n<p><b>Fjernadgang:<\/b><span style=\"font-weight: 400;\"> Administrer nemt dine netv\u00e6rksenheder via sikre Telnet- eller SSH-forbindelser.<\/span><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"a-user-access-levels-in-cisco-ios\"><b>a) Brugeradgangsniveauer i Cisco IOS<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">De har udviklet tre adgangsniveauer med forskellige aktiviteter til r\u00e5dighed for hver bruger af sikkerhedsm\u00e6ssige \u00e5rsager.<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Bekr\u00e6ft din forbindelse til internettet ved at k\u00f8re kommandoer som ping eller traceroute. (&gt;)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">F\u00e5 et indblik i, hvad der rent faktisk sker med enheden. (#)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">For at foretage \u00e6ndringer. (config)#<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">N\u00e5r du opretter forbindelse til en Cisco-enhed som en router, switch eller firewall, f\u00e5r du tildelt brugeren <\/span><b>Eksekveringstilstand<\/b><span style=\"font-weight: 400;\"> (&gt;) - det prim\u00e6re adgangsniveau. Med dette user exec-adgangsniveau kan du kun udf\u00f8re grundl\u00e6ggende kommandoer som ping og traceroute.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For at f\u00e5 adgang til et st\u00f8rre s\u00e6t kommandoer og rettigheder er det vigtigt at indtaste f\u00f8lgende kommando: Router&gt;enable. Det giver dig mulighed for at stige op ad stigen og opgradere dit kontrolniveau.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Vi er n\u00e5et til det andet adgangsniveau: <\/span><b>privilegeret tilstand<\/b><span style=\"font-weight: 400;\"> - R1#. Her kan man se alt, hvad der sker med udstyret (via forskellige show-kommandoer), men man kan ikke foretage nogen \u00e6ndringer.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Router&gt;aktiver<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>Router#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">For at foretage \u00e6ndringer i enheden skal vi h\u00e6ve vores adgangsniveau et ekstra hak - og n\u00e5 et kommandoniveau, der er kendt som <\/span><b>global konfigurationstilstand<\/b><span style=\"font-weight: 400;\">. Denne oph\u00f8jede status giver os st\u00f8rre muligheder og privilegier end tidligere.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Router#konfigurer terminal<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>Router(config)#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">Ved at f\u00e5 adgang til Cisco-enhedens globale konfigurationstilstand kan du foretage alle \u00f8nskede \u00e6ndringer med fuld kontrol - svarende til at have Windows-administrator- eller root-brugeradgang p\u00e5 Linux.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For at sikre, at du er forberedt p\u00e5 enhver udfordring, er her et par kommandoer, som jeg varmt anbefaler, at du g\u00f8r dig fortrolig med: Hvis du vil spare tid og skrivearbejde, samtidig med at du sikrer n\u00f8jagtighed, har vi den perfekte l\u00f8sning til at skrive l\u00e6ngere kommandoer.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">N\u00e5r du skriver \"R1#show run\" og trykker p\u00e5 TAB-tasten, bliver din kommando automatisk fuldf\u00f8rt. Hvis du desuden indtaster et sp\u00f8rgsm\u00e5lstegn (?), vil alle efterf\u00f8lgende kommandoer blive vist p\u00e5 sk\u00e6rmen.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/R1-image-1.jpg\" alt=\"R1-billede\" class=\"wp-image-1260\" width=\"841\" height=\"434\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"b-selecting-a-device-name-hostname\"><b>b) Valg af enhedsnavn (v\u00e6rtsnavn)<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">Hvis du vil \u00e6ndre navnet p\u00e5 en router eller switch, skal du blot indtaste denne kommando: (du kan se det p\u00e5 det n\u00e6ste billede)<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Router(config)#hostnavn ROUTER_NAVN<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>ROUTER_NAVN(config)#<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"c-securing-access-to-the-router\"><b>c) Sikring af adgang til routeren<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">For at beskytte din router mod uautoriseret adgang, lad os se p\u00e5, hvordan vi kan ops\u00e6tte en adgangskode i privilegeret tilstand (#). F\u00f8lg denne enkle proces for at fuldf\u00f8re opgaven:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Securing-access-to-the-router-2-1.jpg\" alt=\"Sikring af adgang til routerens image\" class=\"wp-image-1261\" width=\"838\" height=\"254\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>Router(config)#hostnavn R1<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#enable password cisco eller<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#aktiver hemmelighed cisco123<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">Hvis du bruger denne kommando, f\u00e5r alle, der fors\u00f8ger at f\u00e5 adgang til enheden, et advarselsbanner, der advarer dem om potentielle konsekvenser.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#banner motd \"UAUTORISERET ADGANG N\u00c6GTET\"<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">Hvis du vil vide, hvad forskellen er p\u00e5 en \"enable password\" og en \"secret enable\", er du kommet til det rette sted. Her er, hvad der adskiller dem:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Unauthorized-access-3-1.jpg\" alt=\"Billede med uautoriseret adgang\" class=\"wp-image-1262\" width=\"841\" height=\"453\"\/><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">Den ene konfiguration (#enable secret) er kodet, mens den anden (#enable password) forbliver ukrypteret.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Lad os begynde med at konfigurere routeren til netv\u00e6rksadgang (reachability) ved hj\u00e6lp af f\u00f8lgende topologi:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Router-for-network-access-1.jpg\" alt=\"Router til netv\u00e6rksadgangsbillede\" class=\"wp-image-1263\" width=\"841\" height=\"421\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"d-configuring-an-ip-address-on-the-router\"><b>d) Konfiguration af en IP-adresse p\u00e5 routeren<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">En router er et uvurderligt v\u00e6rkt\u00f8j, der giver os mulighed for at forbinde flere netv\u00e6rk problemfrit gennem forskellige porte, typisk to eller tre. Vi omtaler en port som det fysiske rum, hvor et kabel kan tilsluttes. Hvad ang\u00e5r den tilsvarende logiske side, identificerer vi den som en gr\u00e6nseflade.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For at opsummere:&nbsp;<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Port = fysisk<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Interface = Logisk <\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">For eksempel vil vi konfigurere en (logisk) IP-adresse p\u00e5 gr\u00e6nsefladen og fysisk forbinde den til en port via et kabel.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For at der kan foreg\u00e5 kommunikation i netv\u00e6rket, skal disse gr\u00e6nseflader have en IP-adresse og v\u00e6re aktiveret, dvs. sl\u00e5et til. Som illustreret i figuren kan du nemt konfigurere en IP-adresse p\u00e5 et netv\u00e6rksinterface:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/IP-address-of-the-router-4-1.jpg\" alt=\"IP-adresse p\u00e5 routerbilledet\" class=\"wp-image-1264\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#interface FastEthernet0\/0<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(config-if)#ip-adresse 192.168.1.1 255.255.255.0<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config-if)#ingen nedlukning<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"f-configuring-remote-access-on-a-router-telnet-ssh\"><b>f) Konfiguration af fjernadgang p\u00e5 en router (Telnet, SSH)<\/b><\/h3>\n\n<h2 class=\"wp-block-heading\" id=\"telnet\"><b>Telnet<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">Netv\u00e6rksapplikationer giver sikre fjernforbindelser til netv\u00e6rk, enheder (s\u00e5som routere og switches) eller servere. Dette sikrer p\u00e5lidelig adgang fra enhver placering.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/TELNET-5-1.jpg\" alt=\"TELNET 5 1\" class=\"wp-image-1265\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#line vty 0 14<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(konfigurer-linje)#adgangskode cisco<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(konfigurations-linje)#logind<\/b><\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">For at komme i gang skal vi indtaste vores virtuelle linjer (i alt 15), indstille adgangskoden (\"Cisco\") og derefter starte Telnet-processen #login.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ssh\"><b>SSH<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">SSH er den ideelle protokol til at oprette sikker fjernforbindelse til et lokalnetv\u00e6rk eller en internetenhed. For at konfigurere dette p\u00e5 Cisco-maskiner er det n\u00f8dvendigt at tage visse skridt:<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Oprettelse af et personligt login og password.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Etablering af et dom\u00e6nenavn&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">For at sikre maksimal sikkerhed er det vigtigt at generere offentlige og private n\u00f8glekombinationer.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Brug kommandoen #login local for at aktivere processen for virtuelle linjer (vty).<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">I figuren nedenfor kan du se et eksempel p\u00e5 SSH-konfigurationen p\u00e5 en Cisco-router:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/SSH-image-6-1.jpg\" alt=\"SSH-billede \" class=\"wp-image-1267\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#brugernavn admin privilegium 15 adgangskode admincisco321<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#ip dom\u00e6nenavn my.home.lab<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#krypto n\u00f8gle generere rsa modulus 1024<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#ip ssh version 2<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)line vty 0 15<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config-line)#login lokal<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config-line)#transport input ssh telnet<\/code><\/pre>\n\n\n<h2 class=\"wp-block-heading\" id=\"to-sum-up\"><b>For at opsummere<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">Routeren er en vigtig<\/span> device in any computer network because it interconnects multiple networks together. It has different networking protocols enabled (like RIP and OSPF) that assist him with the interconnection process. It also offers many different configurations for security purposes (like passwords on Virtual lines). In this article, we\u2019ve learned how to set up an IP address on the Router, as well as for remote access (Telnet &amp; SSH). We\u2019ve also learned about some of the most important configurations <span style=\"font-weight: 400;\">en netv\u00e6rksadministrator b\u00f8r vide.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Et f\u00e6llestr\u00e6k, der skiller sig ud, n\u00e5r man taler om Cisco-netv\u00e6rksroutere og -switche, er det ber\u00f8mte Internetwork Operating System (IOS). Denne kraftfulde \"motor\" er det, der driver alle disse enheder og sikrer... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/teknologi\/hvad-du-skal-vide-nar-du-installerer-tradlose-routere-hjemme\/\">Read more <span class=\"screen-reader-text\">Hvad du b\u00f8r vide, n\u00e5r du installerer tr\u00e5dl\u00f8se hjemme-routere (Wi-Fi)<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/teknologi\/hvad-du-skal-vide-nar-du-installerer-tradlose-routere-hjemme\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/teknologi\/hvad-du-skal-vide-nar-du-installerer-tradlose-routere-hjemme\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T20:26:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"name\":\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"description\":\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Wifi router\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Your Gateway to Cyber Safety\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Installer tr\u00e5dl\u00f8se hjemmeroutere (Wi-Fi) korrekt | securitybriefing.net","description":"L\u00e6r om de forskellige egenskaber og funktioner i en tr\u00e5dl\u00f8s router til hjemmet, og hvordan du beskytter dine enheder og data med endpoint-beskyttelse.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/teknologi\/hvad-du-skal-vide-nar-du-installerer-tradlose-routere-hjemme\/","og_locale":"da_DK","og_type":"article","og_title":"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net","og_description":"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection","og_url":"https:\/\/securitybriefing.net\/da\/teknologi\/hvad-du-skal-vide-nar-du-installerer-tradlose-routere-hjemme\/","og_site_name":"Security Briefing","article_published_time":"2022-12-15T20:26:27+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"C\u00e9sar Daniel Barreto","Estimeret l\u00e6setid":"6 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"What you should know when installing Home Wireless Routers (Wi-Fi)","datePublished":"2022-12-15T20:26:27+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","articleSection":["Tech"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","url":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","name":"Installer tr\u00e5dl\u00f8se hjemmeroutere (Wi-Fi) korrekt | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","datePublished":"2022-12-15T20:26:27+00:00","description":"L\u00e6r om de forskellige egenskaber og funktioner i en tr\u00e5dl\u00f8s router til hjemmet, og hvordan du beskytter dine enheder og data med endpoint-beskyttelse.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","width":2560,"height":1707,"caption":"Wifi router"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What you should know when installing Home Wireless Routers (Wi-Fi)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Din adgang til cybersikkerhed","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto er en anerkendt cybersikkerhedsskribent og -ekspert, der er kendt for sin dybdeg\u00e5ende viden og evne til at forenkle komplekse cybersikkerhedsemner. Med omfattende erfaring inden for netv\u00e6rkssikkerhed og databeskyttelse bidrager han regelm\u00e6ssigt med indsigtsfulde artikler og analyser om de seneste cybersikkerhedstendenser, der uddanner b\u00e5de fagfolk og offentligheden.","url":"https:\/\/securitybriefing.net\/da\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}