{"id":1259,"date":"2022-12-15T20:26:27","date_gmt":"2022-12-15T20:26:27","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1259"},"modified":"2022-12-15T20:26:27","modified_gmt":"2022-12-15T20:26:27","slug":"%e0%b8%aa%e0%b8%b4%e0%b9%88%e0%b8%87%e0%b8%97%e0%b8%b5%e0%b9%88%e0%b8%84%e0%b8%b8%e0%b8%93%e0%b8%84%e0%b8%a7%e0%b8%a3%e0%b8%a3%e0%b8%b9%e0%b9%89%e0%b9%80%e0%b8%a1%e0%b8%b7%e0%b9%88%e0%b8%ad%e0%b8%97","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/th\/%e0%b9%80%e0%b8%97%e0%b8%84%e0%b9%82%e0%b8%99%e0%b9%82%e0%b8%a5%e0%b8%a2%e0%b8%b5\/%e0%b8%aa%e0%b8%b4%e0%b9%88%e0%b8%87%e0%b8%97%e0%b8%b5%e0%b9%88%e0%b8%84%e0%b8%b8%e0%b8%93%e0%b8%84%e0%b8%a7%e0%b8%a3%e0%b8%a3%e0%b8%b9%e0%b9%89%e0%b9%80%e0%b8%a1%e0%b8%b7%e0%b9%88%e0%b8%ad%e0%b8%97\/","title":{"rendered":"\u0e2a\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e04\u0e38\u0e13\u0e04\u0e27\u0e23\u0e17\u0e23\u0e32\u0e1a\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e15\u0e34\u0e14\u0e15\u0e31\u0e49\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e44\u0e23\u0e49\u0e2a\u0e32\u0e22\u0e20\u0e32\u0e22\u0e43\u0e19\u0e1a\u0e49\u0e32\u0e19 (Wi-Fi)"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One commonality that stands out when discussing Cisco network routers and switches: is the renowned Internetwork Operating System (IOS). This powerful \u201cengine\u201d is what powers all of these devices, ensuring their successful operation. This article will primarily center on iOS and analyze how to manipulate it. Before that occurs, though, I\u2019d like you to be aware of the two distinct approaches used when operating with iOS: either through a Command Line Interface (CLI) or Graphical User Interface (GUI).<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b\u0e1a\u0e23\u0e23\u0e17\u0e31\u0e14\u0e04\u0e33\u0e2a\u0e31\u0e48\u0e07 (CLI) \u0e40\u0e1b\u0e47\u0e19\u0e27\u0e34\u0e18\u0e35\u0e01\u0e32\u0e23\u0e17\u0e35\u0e48\u0e0b\u0e31\u0e1a\u0e0b\u0e49\u0e2d\u0e19\u0e43\u0e19\u0e01\u0e32\u0e23\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c IOS \u0e42\u0e14\u0e22\u0e43\u0e0a\u0e49 CLI \u0e40\u0e23\u0e32\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e1b\u0e49\u0e2d\u0e19\u0e04\u0e33\u0e2a\u0e31\u0e48\u0e07\u0e17\u0e35\u0e48\u0e41\u0e21\u0e48\u0e19\u0e22\u0e33\u0e0b\u0e36\u0e48\u0e07\u0e08\u0e30\u0e17\u0e33\u0e43\u0e2b\u0e49\u0e40\u0e01\u0e34\u0e14\u0e1e\u0e24\u0e15\u0e34\u0e01\u0e23\u0e23\u0e21\u0e17\u0e35\u0e48\u0e15\u0e49\u0e2d\u0e07\u0e01\u0e32\u0e23 \u0e14\u0e31\u0e07\u0e19\u0e31\u0e49\u0e19\u0e40\u0e23\u0e32\u0e08\u0e30\u0e21\u0e35\u0e01\u0e32\u0e23\u0e04\u0e27\u0e1a\u0e04\u0e38\u0e21\u0e41\u0e25\u0e30\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e27\u0e34\u0e15\u0e0a\u0e4c\u0e02\u0e2d\u0e07\u0e40\u0e23\u0e32\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e2a\u0e21\u0e1a\u0e39\u0e23\u0e13\u0e4c.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">GUI (\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e41\u0e1a\u0e1a\u0e01\u0e23\u0e32\u0e1f\u0e34\u0e01) \u0e40\u0e2a\u0e19\u0e2d\u0e27\u0e34\u0e18\u0e35\u0e01\u0e32\u0e23\u0e17\u0e35\u0e48\u0e40\u0e1b\u0e47\u0e19\u0e21\u0e34\u0e15\u0e23\u0e01\u0e31\u0e1a\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e21\u0e32\u0e01\u0e02\u0e36\u0e49\u0e19\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e0a\u0e48\u0e19\u0e19\u0e35\u0e49 \u0e1a\u0e48\u0e2d\u0e22\u0e04\u0e23\u0e31\u0e49\u0e07\u0e17\u0e35\u0e48\u0e40\u0e23\u0e32\u0e1e\u0e36\u0e48\u0e07\u0e1e\u0e32\u0e21\u0e31\u0e19\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e02\u0e19\u0e32\u0e14\u0e40\u0e25\u0e47\u0e01\u0e40\u0e0a\u0e48\u0e19\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e44\u0e23\u0e49\u0e2a\u0e32\u0e22\u0e20\u0e32\u0e22\u0e43\u0e19\u0e1a\u0e49\u0e32\u0e19 (Wi-Fi) \u0e2a\u0e48\u0e27\u0e19\u0e19\u0e35\u0e49\u0e08\u0e30\u0e40\u0e08\u0e32\u0e30\u0e25\u0e36\u0e01\u0e16\u0e36\u0e07\u0e27\u0e34\u0e18\u0e35\u0e17\u0e35\u0e48\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07 Cisco IOS (\u0e40\u0e27\u0e2d\u0e23\u0e4c\u0e0a\u0e31\u0e19 15.2 \u0e2b\u0e23\u0e37\u0e2d 12.4) \u0e1c\u0e48\u0e32\u0e19\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b\u0e1a\u0e23\u0e23\u0e17\u0e31\u0e14\u0e04\u0e33\u0e2a\u0e31\u0e48\u0e07\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e01\u0e32\u0e23\u0e17\u0e33\u0e07\u0e32\u0e19\u0e17\u0e35\u0e48\u0e21\u0e35\u0e1b\u0e23\u0e30\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e20\u0e32\u0e1e.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"introduction-to-the-cli\"><b>\u0e1a\u0e17\u0e19\u0e33\u0e2a\u0e39\u0e48 CLI<\/b><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"basic-router-configurations\"><b>\u0e01\u0e32\u0e23\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">Now it\u2019s time to dive into the exciting bits of this article and begin with a Cisco Router setup. Moreover, we will util<\/span>\u0e43\u0e0a\u0e49\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e08\u0e33\u0e25\u0e2d\u0e07\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e2a\u0e20\u0e32\u0e1e\u0e41\u0e27\u0e14\u0e25\u0e49\u0e2d\u0e21\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e02\u0e2d\u0e07\u0e40\u0e23\u0e32<span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To ensure that our Cisco Router is up and running, here are some critical settings we\u2019ll configure:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>\u0e0a\u0e37\u0e48\u0e2d\u0e42\u0e2e\u0e2a\u0e15\u0e4c:<\/b><span style=\"font-weight: 400;\"> \u0e0a\u0e37\u0e48\u0e2d\u0e02\u0e2d\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c.<\/span><\/li>\n\n\n\n<li><b>\u0e23\u0e2b\u0e31\u0e2a\u0e1c\u0e48\u0e32\u0e19:<\/b><span style=\"font-weight: 400;\"> \u0e40\u0e02\u0e49\u0e32\u0e23\u0e2b\u0e31\u0e2a\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e37\u0e48\u0e2d\u0e2a\u0e32\u0e23\u0e43\u0e19\u0e23\u0e39\u0e1b\u0e41\u0e1a\u0e1a\u0e17\u0e35\u0e48\u0e40\u0e1b\u0e34\u0e14\u0e41\u0e25\u0e30\u0e44\u0e21\u0e48\u0e44\u0e14\u0e49\u0e40\u0e02\u0e49\u0e32\u0e23\u0e2b\u0e31\u0e2a.<\/span><\/li>\n\n\n\n<li><b>\u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48 IP:<\/b><span style=\"font-weight: 400;\"> \u0e20\u0e32\u0e22\u0e43\u0e19\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b.<\/span><\/li>\n<\/ul>\n\n\n\n<p><b>\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e23\u0e30\u0e22\u0e30\u0e44\u0e01\u0e25:<\/b><span style=\"font-weight: 400;\"> \u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e02\u0e2d\u0e07\u0e04\u0e38\u0e13\u0e44\u0e14\u0e49\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e07\u0e48\u0e32\u0e22\u0e14\u0e32\u0e22\u0e1c\u0e48\u0e32\u0e19\u0e01\u0e32\u0e23\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e15\u0e48\u0e2d Telnet \u0e2b\u0e23\u0e37\u0e2d SSH \u0e17\u0e35\u0e48\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22.<\/span><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"a-user-access-levels-in-cisco-ios\"><b>a) \u0e23\u0e30\u0e14\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e43\u0e19 Cisco IOS<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u0e1e\u0e27\u0e01\u0e40\u0e02\u0e32\u0e44\u0e14\u0e49\u0e1e\u0e31\u0e12\u0e19\u0e32\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e2a\u0e32\u0e21\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e42\u0e14\u0e22\u0e21\u0e35\u0e01\u0e34\u0e08\u0e01\u0e23\u0e23\u0e21\u0e17\u0e35\u0e48\u0e41\u0e15\u0e01\u0e15\u0e48\u0e32\u0e07\u0e01\u0e31\u0e19\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e41\u0e15\u0e48\u0e25\u0e30\u0e04\u0e19\u0e14\u0e49\u0e27\u0e22\u0e40\u0e2b\u0e15\u0e38\u0e1c\u0e25\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22.<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\u0e15\u0e23\u0e27\u0e08\u0e2a\u0e2d\u0e1a\u0e01\u0e32\u0e23\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e15\u0e48\u0e2d\u0e02\u0e2d\u0e07\u0e04\u0e38\u0e13\u0e01\u0e31\u0e1a\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e47\u0e15\u0e42\u0e14\u0e22\u0e23\u0e31\u0e19\u0e04\u0e33\u0e2a\u0e31\u0e48\u0e07\u0e40\u0e0a\u0e48\u0e19 ping \u0e2b\u0e23\u0e37\u0e2d traceroute. (&gt;)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Get an inside look into what\u2019s actually happening with the device. (#)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e17\u0e33\u0e01\u0e32\u0e23\u0e40\u0e1b\u0e25\u0e35\u0e48\u0e22\u0e19\u0e41\u0e1b\u0e25\u0e07\u0e43\u0e14 \u0e46 (config)#<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e15\u0e48\u0e2d\u0e01\u0e31\u0e1a\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c Cisco \u0e40\u0e0a\u0e48\u0e19 \u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c \u0e2a\u0e27\u0e34\u0e15\u0e0a\u0e4c \u0e2b\u0e23\u0e37\u0e2d\u0e44\u0e1f\u0e23\u0e4c\u0e27\u0e2d\u0e25\u0e25\u0e4c \u0e04\u0e38\u0e13\u0e08\u0e30\u0e44\u0e14\u0e49\u0e23\u0e31\u0e1a\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e4c\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49 <\/span><b>\u0e42\u0e2b\u0e21\u0e14 exec<\/b><span style=\"font-weight: 400;\"> (&gt;) \u2013 the primary access level. With this user exec access level, you can only perform basic commands such as ping and traceroute.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To access a greater set of commands and privileges, it\u2019s essential to enter the following command: Router&gt;enable. This will allow you to ascend the ladder and upgrade your level of control.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e40\u0e23\u0e32\u0e44\u0e14\u0e49\u0e21\u0e32\u0e16\u0e36\u0e07\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e17\u0e35\u0e48\u0e2a\u0e2d\u0e07: <\/span><b>\u0e42\u0e2b\u0e21\u0e14\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e1e\u0e34\u0e40\u0e28\u0e29<\/b><span style=\"font-weight: 400;\"> \u2013 R1#. Here you can observe every action taken with the equipment (through various show commands), yet you cannot make any changes.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c&gt;\u0e40\u0e1b\u0e34\u0e14\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">To create alterations to the device, we would have to advance our access level up an additional notch \u2013 reaching a commanding level known as <\/span><b>\u0e42\u0e2b\u0e21\u0e14\u0e01\u0e32\u0e23\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e17\u0e31\u0e48\u0e27\u0e42\u0e25\u0e01<\/b><span style=\"font-weight: 400;\">. \u0e2a\u0e16\u0e32\u0e19\u0e30\u0e17\u0e35\u0e48\u0e22\u0e01\u0e22\u0e48\u0e2d\u0e07\u0e19\u0e35\u0e49\u0e43\u0e2b\u0e49\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e41\u0e25\u0e30\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e1e\u0e34\u0e40\u0e28\u0e29\u0e17\u0e35\u0e48\u0e21\u0e32\u0e01\u0e01\u0e27\u0e48\u0e32\u0e01\u0e48\u0e2d\u0e19\u0e2b\u0e19\u0e49\u0e32\u0e19\u0e35\u0e49.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c#\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e21\u0e34\u0e19\u0e31\u0e25<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">By accessing the Cisco device\u2019s global configuration mode, you can make any desired alterations with complete control \u2013 akin to having Windows Administrator or root user access on Linux.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To ensure you\u2019re prepared for any challenge, here are a few commands that I highly suggest familiarizing yourself with: If you want to save time and typing effort while still ensuring accuracy, we\u2019ve got the perfect solution for composing longer commands.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">When you type \u201cR1#show run\u201d and hit the TAB key, it will autocomplete your command. Furthermore, if you enter a question mark (?), any subsequent commands will be displayed on-screen.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/R1-image-1.jpg\" alt=\"R1 \u0e23\u0e39\u0e1b\u0e20\u0e32\u0e1e\" class=\"wp-image-1260\" width=\"841\" height=\"434\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"b-selecting-a-device-name-hostname\"><b>b) \u0e01\u0e32\u0e23\u0e40\u0e25\u0e37\u0e2d\u0e01\u0e0a\u0e37\u0e48\u0e2d\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c (\u0e0a\u0e37\u0e48\u0e2d\u0e42\u0e2e\u0e2a\u0e15\u0e4c)<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e40\u0e1b\u0e25\u0e35\u0e48\u0e22\u0e19\u0e0a\u0e37\u0e48\u0e2d\u0e02\u0e2d\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e27\u0e34\u0e15\u0e0a\u0e4c \u0e2a\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e04\u0e38\u0e13\u0e15\u0e49\u0e2d\u0e07\u0e17\u0e33\u0e04\u0e37\u0e2d\u0e1b\u0e49\u0e2d\u0e19\u0e04\u0e33\u0e2a\u0e31\u0e48\u0e07\u0e19\u0e35\u0e49: (\u0e04\u0e38\u0e13\u0e08\u0e30\u0e40\u0e2b\u0e47\u0e19\u0e43\u0e19\u0e20\u0e32\u0e1e\u0e16\u0e31\u0e14\u0e44\u0e1b)<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e0a\u0e37\u0e48\u0e2d\u0e42\u0e2e\u0e2a\u0e15\u0e4c ROUTER_NAME<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>ROUTER_NAME(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"c-securing-access-to-the-router\"><b>c) \u0e01\u0e32\u0e23\u0e23\u0e31\u0e01\u0e29\u0e32\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">To protect your Router against unauthorized access, let\u2019s look into how we can set up a password in privilege mode (#). Follow this straightforward process to complete the task:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Securing-access-to-the-router-2-1.jpg\" alt=\"\u0e01\u0e32\u0e23\u0e23\u0e31\u0e01\u0e29\u0e32\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e23\u0e39\u0e1b\u0e20\u0e32\u0e1e\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\" class=\"wp-image-1261\" width=\"838\" height=\"254\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e0a\u0e37\u0e48\u0e2d\u0e42\u0e2e\u0e2a\u0e15\u0e4c R1<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#enable password cisco \u0e2b\u0e23\u0e37\u0e2d<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e40\u0e1b\u0e34\u0e14\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e25\u0e31\u0e1a cisco123<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e01\u0e32\u0e23\u0e43\u0e0a\u0e49\u0e04\u0e33\u0e2a\u0e31\u0e48\u0e07\u0e19\u0e35\u0e49\u0e08\u0e30\u0e15\u0e31\u0e49\u0e07\u0e41\u0e1a\u0e19\u0e40\u0e19\u0e2d\u0e23\u0e4c\u0e40\u0e15\u0e37\u0e2d\u0e19\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e43\u0e04\u0e23\u0e01\u0e47\u0e15\u0e32\u0e21\u0e17\u0e35\u0e48\u0e1e\u0e22\u0e32\u0e22\u0e32\u0e21\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c \u0e40\u0e15\u0e37\u0e2d\u0e19\u0e1e\u0e27\u0e01\u0e40\u0e02\u0e32\u0e16\u0e36\u0e07\u0e1c\u0e25\u0e17\u0e35\u0e48\u0e2d\u0e32\u0e08\u0e40\u0e01\u0e34\u0e14\u0e02\u0e36\u0e49\u0e19.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e41\u0e1a\u0e19\u0e40\u0e19\u0e2d\u0e23\u0e4c motd \"\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e17\u0e35\u0e48\u0e44\u0e21\u0e48\u0e44\u0e14\u0e49\u0e23\u0e31\u0e1a\u0e2d\u0e19\u0e38\u0e0d\u0e32\u0e15\u0e16\u0e39\u0e01\u0e1b\u0e0f\u0e34\u0e40\u0e2a\u0e18\"<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">If your query is regarding the distinctions between an \u201cenable password\u201d, and a \u201csecret enable,\u201d you\u2019ve come to the right place. Here\u2019s what sets them apart:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Unauthorized-access-3-1.jpg\" alt=\"\u0e23\u0e39\u0e1b\u0e20\u0e32\u0e1e\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e42\u0e14\u0e22\u0e44\u0e21\u0e48\u0e44\u0e14\u0e49\u0e23\u0e31\u0e1a\u0e2d\u0e19\u0e38\u0e0d\u0e32\u0e15\" class=\"wp-image-1262\" width=\"841\" height=\"453\"\/><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e01\u0e32\u0e23\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32 (#enable secret) \u0e2b\u0e19\u0e36\u0e48\u0e07\u0e23\u0e32\u0e22\u0e01\u0e32\u0e23\u0e16\u0e39\u0e01\u0e40\u0e02\u0e49\u0e32\u0e23\u0e2b\u0e31\u0e2a\u0e43\u0e19\u0e02\u0e13\u0e30\u0e17\u0e35\u0e48\u0e2d\u0e35\u0e01\u0e2d\u0e31\u0e19 (#enable password) \u0e22\u0e31\u0e07\u0e04\u0e07\u0e44\u0e21\u0e48\u0e44\u0e14\u0e49\u0e40\u0e02\u0e49\u0e32\u0e23\u0e2b\u0e31\u0e2a.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Let\u2019s begin by configuring the Router for network access (reachability) using the following topology:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Router-for-network-access-1.jpg\" alt=\"\u0e23\u0e39\u0e1b\u0e20\u0e32\u0e1e\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\" class=\"wp-image-1263\" width=\"841\" height=\"421\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"d-configuring-an-ip-address-on-the-router\"><b>d) \u0e01\u0e32\u0e23\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48 IP \u0e1a\u0e19\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e1b\u0e47\u0e19\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e21\u0e37\u0e2d\u0e17\u0e35\u0e48\u0e21\u0e35\u0e04\u0e38\u0e13\u0e04\u0e48\u0e32\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e22\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e0a\u0e48\u0e27\u0e22\u0e43\u0e2b\u0e49\u0e40\u0e23\u0e32\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e15\u0e48\u0e2d\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e2b\u0e25\u0e32\u0e22\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e44\u0e14\u0e49\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e23\u0e32\u0e1a\u0e23\u0e37\u0e48\u0e19\u0e1c\u0e48\u0e32\u0e19\u0e1e\u0e2d\u0e23\u0e4c\u0e15\u0e15\u0e48\u0e32\u0e07\u0e46 \u0e42\u0e14\u0e22\u0e17\u0e31\u0e48\u0e27\u0e44\u0e1b\u0e2a\u0e2d\u0e07\u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e32\u0e21\u0e1e\u0e2d\u0e23\u0e4c\u0e15 \u0e40\u0e23\u0e32\u0e40\u0e23\u0e35\u0e22\u0e01\u0e1e\u0e2d\u0e23\u0e4c\u0e15\u0e27\u0e48\u0e32\u0e40\u0e1b\u0e47\u0e19\u0e1e\u0e37\u0e49\u0e19\u0e17\u0e35\u0e48\u0e17\u0e32\u0e07\u0e01\u0e32\u0e22\u0e20\u0e32\u0e1e\u0e17\u0e35\u0e48\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e15\u0e48\u0e2d\u0e2a\u0e32\u0e22\u0e40\u0e04\u0e40\u0e1a\u0e34\u0e25\u0e44\u0e14\u0e49 \u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e14\u0e49\u0e32\u0e19\u0e15\u0e23\u0e23\u0e01\u0e30\u0e17\u0e35\u0e48\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e02\u0e49\u0e2d\u0e07 \u0e40\u0e23\u0e32\u0e23\u0e30\u0e1a\u0e38\u0e27\u0e48\u0e32\u0e40\u0e1b\u0e47\u0e19\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e2a\u0e23\u0e38\u0e1b:&nbsp;<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\u0e1e\u0e2d\u0e23\u0e4c\u0e15 = \u0e17\u0e32\u0e07\u0e01\u0e32\u0e22\u0e20\u0e32\u0e1e<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b = \u0e15\u0e23\u0e23\u0e01\u0e30 <\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e15\u0e31\u0e27\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e40\u0e0a\u0e48\u0e19 \u0e40\u0e23\u0e32\u0e08\u0e30\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48 IP (\u0e15\u0e23\u0e23\u0e01\u0e30) \u0e1a\u0e19\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b\u0e41\u0e25\u0e30\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e15\u0e48\u0e2d\u0e17\u0e32\u0e07\u0e01\u0e32\u0e22\u0e20\u0e32\u0e1e\u0e01\u0e31\u0e1a\u0e1e\u0e2d\u0e23\u0e4c\u0e15\u0e1c\u0e48\u0e32\u0e19\u0e2a\u0e32\u0e22\u0e40\u0e04\u0e40\u0e1a\u0e34\u0e25.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e2a\u0e37\u0e48\u0e2d\u0e2a\u0e32\u0e23\u0e43\u0e14 \u0e46 \u0e17\u0e35\u0e48\u0e08\u0e30\u0e40\u0e01\u0e34\u0e14\u0e02\u0e36\u0e49\u0e19\u0e20\u0e32\u0e22\u0e43\u0e19\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22 \u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b\u0e40\u0e2b\u0e25\u0e48\u0e32\u0e19\u0e35\u0e49\u0e15\u0e49\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48 IP \u0e41\u0e25\u0e30\u0e15\u0e49\u0e2d\u0e07\u0e40\u0e1b\u0e34\u0e14\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19 \u0e2b\u0e21\u0e32\u0e22\u0e16\u0e36\u0e07 \u0e40\u0e1b\u0e34\u0e14 \u0e15\u0e32\u0e21\u0e17\u0e35\u0e48\u0e41\u0e2a\u0e14\u0e07\u0e43\u0e19\u0e23\u0e39\u0e1b \u0e04\u0e38\u0e13\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48 IP \u0e1a\u0e19\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e44\u0e14\u0e49\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e07\u0e48\u0e32\u0e22\u0e14\u0e32\u0e22:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/IP-address-of-the-router-4-1.jpg\" alt=\"\u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48 IP \u0e02\u0e2d\u0e07\u0e23\u0e39\u0e1b\u0e20\u0e32\u0e1e\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\" class=\"wp-image-1264\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e2d\u0e34\u0e19\u0e40\u0e17\u0e2d\u0e23\u0e4c\u0e40\u0e1f\u0e0b FastEthernet0\/0<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(config-if)#ip \u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48 192.168.1.1 255.255.255.0<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32-if)#\u0e44\u0e21\u0e48\u0e1b\u0e34\u0e14\u0e23\u0e30\u0e1a\u0e1a<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"f-configuring-remote-access-on-a-router-telnet-ssh\"><b>f) \u0e01\u0e32\u0e23\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e23\u0e30\u0e22\u0e30\u0e44\u0e01\u0e25\u0e1a\u0e19\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c (Telnet, SSH)<\/b><\/h3>\n\n<h2 class=\"wp-block-heading\" id=\"telnet\"><b>\u0e40\u0e17\u0e25\u0e40\u0e19\u0e47\u0e15<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">\u0e41\u0e2d\u0e1b\u0e1e\u0e25\u0e34\u0e40\u0e04\u0e0a\u0e31\u0e19\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e43\u0e2b\u0e49\u0e01\u0e32\u0e23\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e15\u0e48\u0e2d\u0e23\u0e30\u0e22\u0e30\u0e44\u0e01\u0e25\u0e17\u0e35\u0e48\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e01\u0e31\u0e1a\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22 \u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c (\u0e40\u0e0a\u0e48\u0e19 \u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e41\u0e25\u0e30\u0e2a\u0e27\u0e34\u0e15\u0e0a\u0e4c) \u0e2b\u0e23\u0e37\u0e2d\u0e40\u0e0b\u0e34\u0e23\u0e4c\u0e1f\u0e40\u0e27\u0e2d\u0e23\u0e4c \u0e2a\u0e34\u0e48\u0e07\u0e19\u0e35\u0e49\u0e17\u0e33\u0e43\u0e2b\u0e49\u0e21\u0e31\u0e48\u0e19\u0e43\u0e08\u0e44\u0e14\u0e49\u0e16\u0e36\u0e07\u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e16\u0e36\u0e07\u0e17\u0e35\u0e48\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e16\u0e37\u0e2d\u0e44\u0e14\u0e49\u0e08\u0e32\u0e01\u0e17\u0e38\u0e01\u0e17\u0e35\u0e48.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/TELNET-5-1.jpg\" alt=\"TELNET 5 1\" class=\"wp-image-1265\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e1a\u0e23\u0e23\u0e17\u0e31\u0e14 vty 0 14<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32-\u0e1a\u0e23\u0e23\u0e17\u0e31\u0e14)#\u0e23\u0e2b\u0e31\u0e2a\u0e1c\u0e48\u0e32\u0e19 \u0e0b\u0e34\u0e2a\u0e42\u0e01\u0e49<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(config-line)#\u0e40\u0e02\u0e49\u0e32\u0e2a\u0e39\u0e48\u0e23\u0e30\u0e1a\u0e1a<\/b><\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">To get started, we\u2019ll need to enter our virtual lines (a total of 15), set the password (\u201cCisco\u201d), and then initiate the Telnet process #login.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ssh\"><b>\u0e40\u0e2d\u0e2a\u0e40\u0e2d\u0e0a\u0e40\u0e2d\u0e2a<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">To safely connect to a local area network or Internet device remotely, SSH is the ideal protocol. To configure this on Cisco machines, it\u2019s necessary to take certain steps:<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\u0e01\u0e32\u0e23\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e0a\u0e37\u0e48\u0e2d\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e41\u0e25\u0e30\u0e23\u0e2b\u0e31\u0e2a\u0e1c\u0e48\u0e32\u0e19\u0e2a\u0e48\u0e27\u0e19\u0e15\u0e31\u0e27.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0e01\u0e32\u0e23\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e0a\u0e37\u0e48\u0e2d\u0e42\u0e14\u0e40\u0e21\u0e19&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e43\u0e2b\u0e49\u0e21\u0e31\u0e48\u0e19\u0e43\u0e08\u0e43\u0e19\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e2a\u0e39\u0e07\u0e2a\u0e38\u0e14 \u0e01\u0e32\u0e23\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e0a\u0e38\u0e14\u0e04\u0e35\u0e22\u0e4c\u0e2a\u0e32\u0e18\u0e32\u0e23\u0e13\u0e30\u0e41\u0e25\u0e30\u0e2a\u0e48\u0e27\u0e19\u0e15\u0e31\u0e27\u0e40\u0e1b\u0e47\u0e19\u0e2a\u0e34\u0e48\u0e07\u0e2a\u0e33\u0e04\u0e31\u0e0d.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e40\u0e1b\u0e34\u0e14\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19\u0e01\u0e23\u0e30\u0e1a\u0e27\u0e19\u0e01\u0e32\u0e23\u0e2a\u0e32\u0e22\u0e40\u0e2a\u0e21\u0e37\u0e2d\u0e19 (vty) \u0e43\u0e2b\u0e49\u0e43\u0e0a\u0e49\u0e04\u0e33\u0e2a\u0e31\u0e48\u0e07 #login local.<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0e43\u0e19\u0e23\u0e39\u0e1b\u0e14\u0e49\u0e32\u0e19\u0e25\u0e48\u0e32\u0e07 \u0e04\u0e38\u0e13\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e14\u0e39\u0e15\u0e31\u0e27\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e01\u0e32\u0e23\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32 SSH \u0e1a\u0e19\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c Cisco:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/SSH-image-6-1.jpg\" alt=\"\u0e23\u0e39\u0e1b\u0e20\u0e32\u0e1e SSH \" class=\"wp-image-1267\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e0a\u0e37\u0e48\u0e2d\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49 admin \u0e2a\u0e34\u0e17\u0e18\u0e34\u0e1e\u0e34\u0e40\u0e28\u0e29 15 \u0e23\u0e2b\u0e31\u0e2a\u0e1c\u0e48\u0e32\u0e19 admincisco321<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#ip \u0e0a\u0e37\u0e48\u0e2d\u0e42\u0e14\u0e40\u0e21\u0e19 my.home.lab<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#\u0e40\u0e02\u0e49\u0e32\u0e23\u0e2b\u0e31\u0e2a\u0e04\u0e35\u0e22\u0e4c\u0e2a\u0e23\u0e49\u0e32\u0e07 rsa \u0e42\u0e21\u0e14\u0e39\u0e25\u0e31\u0e2a 1024<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)#ip ssh \u0e40\u0e27\u0e2d\u0e23\u0e4c\u0e0a\u0e31\u0e19 2<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32)\u0e1a\u0e23\u0e23\u0e17\u0e31\u0e14 vty 0 15<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e1a\u0e23\u0e23\u0e17\u0e31\u0e14)#\u0e40\u0e02\u0e49\u0e32\u0e2a\u0e39\u0e48\u0e23\u0e30\u0e1a\u0e1a\u0e17\u0e49\u0e2d\u0e07\u0e16\u0e34\u0e48\u0e19<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e04\u0e48\u0e32\u0e1a\u0e23\u0e23\u0e17\u0e31\u0e14)#\u0e01\u0e32\u0e23\u0e02\u0e19\u0e2a\u0e48\u0e07\u0e2d\u0e34\u0e19\u0e1e\u0e38\u0e15 ssh \u0e40\u0e17\u0e25\u0e40\u0e19\u0e47\u0e15<\/code><\/pre>\n\n\n<h2 class=\"wp-block-heading\" id=\"to-sum-up\"><b>\u0e2a\u0e23\u0e38\u0e1b\u0e41\u0e25\u0e49\u0e27<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e1b\u0e47\u0e19\u0e2a\u0e34\u0e48\u0e07\u0e08\u0e33\u0e40\u0e1b\u0e47\u0e19<\/span> device in any computer network because it interconnects multiple networks together. It has different networking protocols enabled (like RIP and OSPF) that assist him with the interconnection process. It also offers many different configurations for security purposes (like passwords on Virtual lines). In this article, we\u2019ve learned how to set up an IP address on the Router, as well as for remote access (Telnet &amp; SSH). We\u2019ve also learned about some of the most important configurations <span style=\"font-weight: 400;\">\u0e1c\u0e39\u0e49\u0e14\u0e39\u0e41\u0e25\u0e23\u0e30\u0e1a\u0e1a\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e04\u0e27\u0e23\u0e23\u0e39\u0e49.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>\u0e2a\u0e34\u0e48\u0e07\u0e2b\u0e19\u0e36\u0e48\u0e07\u0e17\u0e35\u0e48\u0e40\u0e2b\u0e21\u0e37\u0e2d\u0e19\u0e01\u0e31\u0e19\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e01\u0e25\u0e48\u0e32\u0e27\u0e16\u0e36\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e41\u0e25\u0e30\u0e2a\u0e27\u0e34\u0e15\u0e0a\u0e4c\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e02\u0e2d\u0e07 Cisco \u0e04\u0e37\u0e2d\u0e23\u0e30\u0e1a\u0e1a\u0e1b\u0e0f\u0e34\u0e1a\u0e31\u0e15\u0e34\u0e01\u0e32\u0e23 Internetwork (IOS) \u0e2d\u0e31\u0e19\u0e42\u0e14\u0e48\u0e07\u0e14\u0e31\u0e07 \u201c\u0e01\u0e25\u0e44\u0e01\u201d \u0e2d\u0e31\u0e19\u0e17\u0e23\u0e07\u0e1e\u0e25\u0e31\u0e07\u0e19\u0e35\u0e49\u0e40\u0e1b\u0e47\u0e19\u0e15\u0e31\u0e27\u0e02\u0e31\u0e1a\u0e40\u0e04\u0e25\u0e37\u0e48\u0e2d\u0e19\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e17\u0e31\u0e49\u0e07\u0e2b\u0e21\u0e14\u0e40\u0e2b\u0e25\u0e48\u0e32\u0e19\u0e35\u0e49 \u0e17\u0e33\u0e43\u0e2b\u0e49\u0e21\u0e31\u0e48\u0e19\u0e43\u0e08\u0e44\u0e14\u0e49\u0e27\u0e48\u0e32\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/th\/%e0%b9%80%e0%b8%97%e0%b8%84%e0%b9%82%e0%b8%99%e0%b9%82%e0%b8%a5%e0%b8%a2%e0%b8%b5\/%e0%b8%aa%e0%b8%b4%e0%b9%88%e0%b8%87%e0%b8%97%e0%b8%b5%e0%b9%88%e0%b8%84%e0%b8%b8%e0%b8%93%e0%b8%84%e0%b8%a7%e0%b8%a3%e0%b8%a3%e0%b8%b9%e0%b9%89%e0%b9%80%e0%b8%a1%e0%b8%b7%e0%b9%88%e0%b8%ad%e0%b8%97\/\">\u0e2d\u0e48\u0e32\u0e19\u0e15\u0e48\u0e2d <span class=\"screen-reader-text\">\u0e2a\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e04\u0e38\u0e13\u0e04\u0e27\u0e23\u0e17\u0e23\u0e32\u0e1a\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e15\u0e34\u0e14\u0e15\u0e31\u0e49\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e44\u0e23\u0e49\u0e2a\u0e32\u0e22\u0e20\u0e32\u0e22\u0e43\u0e19\u0e1a\u0e49\u0e32\u0e19 (Wi-Fi)<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/th\/\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\/\u0e2a\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e04\u0e38\u0e13\u0e04\u0e27\u0e23\u0e23\u0e39\u0e49\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e17\/\" \/>\n<meta property=\"og:locale\" content=\"th_TH\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/th\/\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\/\u0e2a\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e04\u0e38\u0e13\u0e04\u0e27\u0e23\u0e23\u0e39\u0e49\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e17\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T20:26:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u0e19\u0e32\u0e17\u0e35\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"th\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"name\":\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"description\":\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\"},\"inLanguage\":\"th\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"th\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Wifi router\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"th\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"th\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"th\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/th\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0e15\u0e34\u0e14\u0e15\u0e31\u0e49\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e44\u0e23\u0e49\u0e2a\u0e32\u0e22\u0e17\u0e35\u0e48\u0e1a\u0e49\u0e32\u0e19 (Wi-Fi) \u0e2d\u0e22\u0e48\u0e32\u0e07\u0e16\u0e39\u0e01\u0e15\u0e49\u0e2d\u0e07 | securitybriefing.net","description":"\u0e40\u0e23\u0e35\u0e22\u0e19\u0e23\u0e39\u0e49\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e04\u0e38\u0e13\u0e2a\u0e21\u0e1a\u0e31\u0e15\u0e34\u0e41\u0e25\u0e30\u0e1f\u0e31\u0e07\u0e01\u0e4c\u0e0a\u0e31\u0e19\u0e15\u0e48\u0e32\u0e07 \u0e46 \u0e02\u0e2d\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e44\u0e23\u0e49\u0e2a\u0e32\u0e22\u0e17\u0e35\u0e48\u0e1a\u0e49\u0e32\u0e19\u0e41\u0e25\u0e30\u0e27\u0e34\u0e18\u0e35\u0e1b\u0e01\u0e1b\u0e49\u0e2d\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e41\u0e25\u0e30\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e02\u0e2d\u0e07\u0e04\u0e38\u0e13\u0e14\u0e49\u0e27\u0e22\u0e01\u0e32\u0e23\u0e1b\u0e49\u0e2d\u0e07\u0e01\u0e31\u0e19\u0e1b\u0e25\u0e32\u0e22\u0e17\u0e32\u0e07","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/th\/\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\/\u0e2a\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e04\u0e38\u0e13\u0e04\u0e27\u0e23\u0e23\u0e39\u0e49\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e17\/","og_locale":"th_TH","og_type":"article","og_title":"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net","og_description":"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection","og_url":"https:\/\/securitybriefing.net\/th\/\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35\/\u0e2a\u0e34\u0e48\u0e07\u0e17\u0e35\u0e48\u0e04\u0e38\u0e13\u0e04\u0e27\u0e23\u0e23\u0e39\u0e49\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e17\/","og_site_name":"Security Briefing","article_published_time":"2022-12-15T20:26:27+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Written by":"C\u00e9sar Daniel Barreto","Est. reading time":"6 \u0e19\u0e32\u0e17\u0e35"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"What you should know when installing Home Wireless Routers (Wi-Fi)","datePublished":"2022-12-15T20:26:27+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","articleSection":["Tech"],"inLanguage":"th"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","url":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","name":"\u0e15\u0e34\u0e14\u0e15\u0e31\u0e49\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e44\u0e23\u0e49\u0e2a\u0e32\u0e22\u0e17\u0e35\u0e48\u0e1a\u0e49\u0e32\u0e19 (Wi-Fi) \u0e2d\u0e22\u0e48\u0e32\u0e07\u0e16\u0e39\u0e01\u0e15\u0e49\u0e2d\u0e07 | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","datePublished":"2022-12-15T20:26:27+00:00","description":"\u0e40\u0e23\u0e35\u0e22\u0e19\u0e23\u0e39\u0e49\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e04\u0e38\u0e13\u0e2a\u0e21\u0e1a\u0e31\u0e15\u0e34\u0e41\u0e25\u0e30\u0e1f\u0e31\u0e07\u0e01\u0e4c\u0e0a\u0e31\u0e19\u0e15\u0e48\u0e32\u0e07 \u0e46 \u0e02\u0e2d\u0e07\u0e40\u0e23\u0e32\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e44\u0e23\u0e49\u0e2a\u0e32\u0e22\u0e17\u0e35\u0e48\u0e1a\u0e49\u0e32\u0e19\u0e41\u0e25\u0e30\u0e27\u0e34\u0e18\u0e35\u0e1b\u0e01\u0e1b\u0e49\u0e2d\u0e07\u0e2d\u0e38\u0e1b\u0e01\u0e23\u0e13\u0e4c\u0e41\u0e25\u0e30\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e02\u0e2d\u0e07\u0e04\u0e38\u0e13\u0e14\u0e49\u0e27\u0e22\u0e01\u0e32\u0e23\u0e1b\u0e49\u0e2d\u0e07\u0e01\u0e31\u0e19\u0e1b\u0e25\u0e32\u0e22\u0e17\u0e32\u0e07","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb"},"inLanguage":"th","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"]}]},{"@type":"ImageObject","inLanguage":"th","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","width":2560,"height":1707,"caption":"Wifi router"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What you should know when installing Home Wireless Routers (Wi-Fi)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e23\u0e22\u0e32\u0e22\u0e2a\u0e23\u0e38\u0e1b\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"th"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e23\u0e22\u0e32\u0e22\u0e2a\u0e23\u0e38\u0e1b\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"th","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\u0e40\u0e0b\u0e0b\u0e32\u0e23\u0e4c \u0e14\u0e32\u0e40\u0e19\u0e35\u0e22\u0e25 \u0e1a\u0e32\u0e23\u0e4c\u0e40\u0e23\u0e42\u0e15","image":{"@type":"ImageObject","inLanguage":"th","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u0e40\u0e1b\u0e47\u0e19\u0e19\u0e31\u0e01\u0e40\u0e02\u0e35\u0e22\u0e19\u0e41\u0e25\u0e30\u0e1c\u0e39\u0e49\u0e40\u0e0a\u0e35\u0e48\u0e22\u0e27\u0e0a\u0e32\u0e0d\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e17\u0e35\u0e48\u0e21\u0e35\u0e0a\u0e37\u0e48\u0e2d\u0e40\u0e2a\u0e35\u0e22\u0e07 \u0e0b\u0e36\u0e48\u0e07\u0e40\u0e1b\u0e47\u0e19\u0e17\u0e35\u0e48\u0e23\u0e39\u0e49\u0e08\u0e31\u0e01\u0e08\u0e32\u0e01\u0e04\u0e27\u0e32\u0e21\u0e23\u0e39\u0e49\u0e40\u0e0a\u0e34\u0e07\u0e25\u0e36\u0e01\u0e41\u0e25\u0e30\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e43\u0e19\u0e01\u0e32\u0e23\u0e17\u0e33\u0e43\u0e2b\u0e49\u0e2b\u0e31\u0e27\u0e02\u0e49\u0e2d\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e17\u0e35\u0e48\u0e0b\u0e31\u0e1a\u0e0b\u0e49\u0e2d\u0e19\u0e19\u0e31\u0e49\u0e19\u0e07\u0e48\u0e32\u0e22\u0e02\u0e36\u0e49\u0e19 \u0e14\u0e49\u0e27\u0e22\u0e1b\u0e23\u0e30\u0e2a\u0e1a\u0e01\u0e32\u0e23\u0e13\u0e4c\u0e2d\u0e31\u0e19\u0e22\u0e32\u0e27\u0e19\u0e32\u0e19\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e40\u0e04\u0e23\u0e37\u0e2d\u0e02\u0e48\u0e32\u0e22\u0e41\u0e25\u0e30\u0e01\u0e32\u0e23\u0e1b\u0e01\u0e1b\u0e49\u0e2d\u0e07\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25 \u0e40\u0e02\u0e32\u0e21\u0e31\u0e01\u0e08\u0e30\u0e40\u0e02\u0e35\u0e22\u0e19\u0e1a\u0e17\u0e04\u0e27\u0e32\u0e21\u0e40\u0e0a\u0e34\u0e07\u0e25\u0e36\u0e01\u0e41\u0e25\u0e30\u0e01\u0e32\u0e23\u0e27\u0e34\u0e40\u0e04\u0e23\u0e32\u0e30\u0e2b\u0e4c\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e41\u0e19\u0e27\u0e42\u0e19\u0e49\u0e21\u0e14\u0e49\u0e32\u0e19\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e17\u0e32\u0e07\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e25\u0e48\u0e32\u0e2a\u0e38\u0e14\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e43\u0e2b\u0e49\u0e04\u0e27\u0e32\u0e21\u0e23\u0e39\u0e49\u0e41\u0e01\u0e48\u0e17\u0e31\u0e49\u0e07\u0e1c\u0e39\u0e49\u0e40\u0e0a\u0e35\u0e48\u0e22\u0e27\u0e0a\u0e32\u0e0d\u0e41\u0e25\u0e30\u0e2a\u0e32\u0e18\u0e32\u0e23\u0e13\u0e0a\u0e19","url":"https:\/\/securitybriefing.net\/th\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/th\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"\u0e14\u0e31\u0e1a\u0e1a\u0e25\u0e34\u0e27\u0e1e\u0e35","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}