{"id":1259,"date":"2022-12-15T20:26:27","date_gmt":"2022-12-15T20:26:27","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1259"},"modified":"2022-12-15T20:26:27","modified_gmt":"2022-12-15T20:26:27","slug":"nhung-dieu-can-biet-khi-cai-dat-router-wi-fi-tai-nha","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/cong-nghe\/nhung-dieu-can-biet-khi-cai-dat-router-wi-fi-tai-nha\/","title":{"rendered":"Nh\u1eefng \u0111i\u1ec1u b\u1ea1n n\u00ean bi\u1ebft khi l\u1eafp \u0111\u1eb7t B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn kh\u00f4ng d\u00e2y gia \u0111\u00ecnh (Wi-Fi)"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">M\u1ed9t \u0111i\u1ec3m chung n\u1ed5i b\u1eadt khi th\u1ea3o lu\u1eadn v\u1ec1 c\u00e1c b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn v\u00e0 chuy\u1ec3n m\u1ea1ch m\u1ea1ng Cisco: \u0111\u00f3 l\u00e0 H\u1ec7 \u0111i\u1ec1u h\u00e0nh m\u1ea1ng n\u1ed5i ti\u1ebfng (IOS). \u201c\u0110\u1ed9ng c\u01a1\u201d m\u1ea1nh m\u1ebd n\u00e0y l\u00e0 th\u1ee9 cung c\u1ea5p n\u0103ng l\u01b0\u1ee3ng cho t\u1ea5t c\u1ea3 c\u00e1c thi\u1ebft b\u1ecb n\u00e0y, \u0111\u1ea3m b\u1ea3o ho\u1ea1t \u0111\u1ed9ng th\u00e0nh c\u00f4ng c\u1ee7a ch\u00fang. B\u00e0i vi\u1ebft n\u00e0y s\u1ebd ch\u1ee7 y\u1ebfu t\u1eadp trung v\u00e0o iOS v\u00e0 ph\u00e2n t\u00edch c\u00e1ch thao t\u00e1c v\u1edbi n\u00f3. Tr\u01b0\u1edbc khi \u0111i\u1ec1u \u0111\u00f3 x\u1ea3y ra, t\u00f4i mu\u1ed1n b\u1ea1n bi\u1ebft v\u1ec1 hai ph\u01b0\u01a1ng ph\u00e1p kh\u00e1c nhau \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng khi l\u00e0m vi\u1ec7c v\u1edbi iOS: th\u00f4ng qua Giao di\u1ec7n D\u00f2ng l\u1ec7nh (CLI) ho\u1eb7c Giao di\u1ec7n Ng\u01b0\u1eddi d\u00f9ng \u0110\u1ed3 h\u1ecda (GUI).<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Giao di\u1ec7n D\u00f2ng l\u1ec7nh (CLI) l\u00e0 m\u1ed9t ph\u01b0\u01a1ng ph\u00e1p tinh vi \u0111\u1ec3 c\u1ea5u h\u00ecnh c\u00e1c thi\u1ebft b\u1ecb IOS. S\u1eed d\u1ee5ng CLI, ch\u00fang ta c\u00f3 th\u1ec3 nh\u1eadp c\u00e1c l\u1ec7nh ch\u00ednh x\u00e1c \u0111\u1ec3 g\u00e2y ra h\u00e0nh vi mong mu\u1ed1n. Do \u0111\u00f3, ch\u00fang ta s\u1ebd c\u00f3 to\u00e0n quy\u1ec1n ki\u1ec3m so\u00e1t v\u00e0 truy c\u1eadp v\u00e0o c\u00e1c B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn ho\u1eb7c Chuy\u1ec3n m\u1ea1ch c\u1ee7a m\u00ecnh.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">GUI (Giao di\u1ec7n Ng\u01b0\u1eddi d\u00f9ng \u0110\u1ed3 h\u1ecda) cung c\u1ea5p m\u1ed9t c\u00e1ch ti\u1ebfp c\u1eadn th\u00e2n thi\u1ec7n h\u01a1n nhi\u1ec1u cho vi\u1ec7c qu\u1ea3n l\u00fd c\u00e1c thi\u1ebft b\u1ecb nh\u01b0 th\u1ebf n\u00e0y. Th\u01b0\u1eddng th\u00ec ch\u00fang ta d\u1ef1a v\u00e0o n\u00f3 khi thi\u1ebft l\u1eadp c\u00e1c thi\u1ebft b\u1ecb m\u1ea1ng nh\u1ecf nh\u01b0 B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn Kh\u00f4ng d\u00e2y Gia \u0111\u00ecnh (Wi-Fi). Ph\u1ea7n n\u00e0y s\u1ebd \u0111i s\u00e2u v\u00e0o c\u00e1ch ng\u01b0\u1eddi d\u00f9ng c\u00f3 th\u1ec3 truy c\u1eadp Cisco IOS (phi\u00ean b\u1ea3n 15.2 ho\u1eb7c 12.4) th\u00f4ng qua Giao di\u1ec7n D\u00f2ng l\u1ec7nh \u0111\u1ec3 ho\u1ea1t \u0111\u1ed9ng hi\u1ec7u qu\u1ea3.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"introduction-to-the-cli\"><b>Gi\u1edbi thi\u1ec7u v\u1ec1 CLI<\/b><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"basic-router-configurations\"><b>C\u1ea5u h\u00ecnh B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn C\u01a1 b\u1ea3n<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">B\u00e2y gi\u1edd l\u00e0 l\u00fac \u0111\u1ec3 \u0111i s\u00e2u v\u00e0o nh\u1eefng ph\u1ea7n th\u00fa v\u1ecb c\u1ee7a b\u00e0i vi\u1ebft n\u00e0y v\u00e0 b\u1eaft \u0111\u1ea7u v\u1edbi vi\u1ec7c thi\u1ebft l\u1eadp B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn Cisco. H\u01a1n n\u1eefa, ch\u00fang ta s\u1ebd s\u1eed d\u1ee5ng<\/span>m\u1ed9t tr\u00ecnh m\u00f4 ph\u1ecfng m\u1ea1ng \u0111\u1ec3 thi\u1ebft l\u1eadp m\u00f4i tr\u01b0\u1eddng m\u1ea1ng c\u1ee7a m\u00ecnh<span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 \u0111\u1ea3m b\u1ea3o r\u1eb1ng B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn Cisco c\u1ee7a ch\u00fang ta ho\u1ea1t \u0111\u1ed9ng, \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 c\u00e0i \u0111\u1eb7t quan tr\u1ecdng m\u00e0 ch\u00fang ta s\u1ebd c\u1ea5u h\u00ecnh:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>T\u00ean m\u00e1y ch\u1ee7:<\/b><span style=\"font-weight: 400;\"> t\u00ean c\u1ee7a thi\u1ebft b\u1ecb.<\/span><\/li>\n\n\n\n<li><b>M\u1eadt kh\u1ea9u:<\/b><span style=\"font-weight: 400;\"> \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a an to\u00e0n ho\u1eb7c \u0111\u01b0\u1ee3c truy\u1ec1n t\u1ea3i \u1edf \u0111\u1ecbnh d\u1ea1ng m\u1edf, kh\u00f4ng m\u00e3 h\u00f3a.<\/span><\/li>\n\n\n\n<li><b>\u0110\u1ecba ch\u1ec9 IP:<\/b><span style=\"font-weight: 400;\"> trong c\u00e1c giao di\u1ec7n.<\/span><\/li>\n<\/ul>\n\n\n\n<p><b>Truy c\u1eadp t\u1eeb xa:<\/b><span style=\"font-weight: 400;\"> d\u1ec5 d\u00e0ng qu\u1ea3n l\u00fd c\u00e1c thi\u1ebft b\u1ecb m\u1ea1ng c\u1ee7a b\u1ea1n th\u00f4ng qua k\u1ebft n\u1ed1i Telnet ho\u1eb7c SSH an to\u00e0n.<\/span><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"a-user-access-levels-in-cisco-ios\"><b>a) C\u00e1c c\u1ea5p \u0111\u1ed9 truy c\u1eadp ng\u01b0\u1eddi d\u00f9ng trong Cisco IOS<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">H\u1ecd \u0111\u00e3 ph\u00e1t tri\u1ec3n ba c\u1ea5p \u0111\u1ed9 truy c\u1eadp v\u1edbi c\u00e1c ho\u1ea1t \u0111\u1ed9ng kh\u00e1c nhau c\u00f3 s\u1eb5n cho m\u1ed7i ng\u01b0\u1eddi d\u00f9ng v\u00ec l\u00fd do b\u1ea3o m\u1eadt.<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">X\u00e1c minh k\u1ebft n\u1ed1i c\u1ee7a b\u1ea1n v\u1edbi internet b\u1eb1ng c\u00e1ch ch\u1ea1y c\u00e1c l\u1ec7nh nh\u01b0 ping ho\u1eb7c traceroute. (&gt;)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">C\u00f3 c\u00e1i nh\u00ecn s\u00e2u s\u1eafc v\u1ec1 nh\u1eefng g\u00ec th\u1ef1c s\u1ef1 \u0111ang x\u1ea3y ra v\u1edbi thi\u1ebft b\u1ecb. (#)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0110\u1ec3 th\u1ef1c hi\u1ec7n b\u1ea5t k\u1ef3 thay \u0111\u1ed5i n\u00e0o. (config)#<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">Khi k\u1ebft n\u1ed1i v\u1edbi m\u1ed9t thi\u1ebft b\u1ecb Cisco nh\u01b0 B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn, Chuy\u1ec3n m\u1ea1ch ho\u1eb7c T\u01b0\u1eddng l\u1eeda, b\u1ea1n s\u1ebd \u0111\u01b0\u1ee3c c\u1ea5p quy\u1ec1n truy c\u1eadp ng\u01b0\u1eddi d\u00f9ng <\/span><b>ch\u1ebf \u0111\u1ed9 exec<\/b><span style=\"font-weight: 400;\"> (&gt;) \u2013 c\u1ea5p \u0111\u1ed9 truy c\u1eadp c\u01a1 b\u1ea3n. V\u1edbi c\u1ea5p \u0111\u1ed9 truy c\u1eadp exec ng\u01b0\u1eddi d\u00f9ng n\u00e0y, b\u1ea1n ch\u1ec9 c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c l\u1ec7nh c\u01a1 b\u1ea3n nh\u01b0 ping v\u00e0 traceroute.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 truy c\u1eadp m\u1ed9t t\u1eadp h\u1ee3p l\u1ec7nh v\u00e0 quy\u1ec1n h\u1ea1n l\u1edbn h\u01a1n, \u0111i\u1ec1u c\u1ea7n thi\u1ebft l\u00e0 nh\u1eadp l\u1ec7nh sau: Router&gt;enable. \u0110i\u1ec1u n\u00e0y s\u1ebd cho ph\u00e9p b\u1ea1n th\u0103ng ti\u1ebfn v\u00e0 n\u00e2ng c\u1ea5p m\u1ee9c \u0111\u1ed9 ki\u1ec3m so\u00e1t c\u1ee7a m\u00ecnh.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Ch\u00fang ta \u0111\u00e3 \u0111\u1ea1t \u0111\u1ebfn c\u1ea5p \u0111\u1ed9 truy c\u1eadp th\u1ee9 hai: <\/span><b>ch\u1ebf \u0111\u1ed9 \u0111\u1eb7c quy\u1ec1n<\/b><span style=\"font-weight: 400;\"> \u2013 R1#. \u1ede \u0111\u00e2y b\u1ea1n c\u00f3 th\u1ec3 quan s\u00e1t m\u1ecdi h\u00e0nh \u0111\u1ed9ng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n v\u1edbi thi\u1ebft b\u1ecb (th\u00f4ng qua c\u00e1c l\u1ec7nh show kh\u00e1c nhau), nh\u01b0ng b\u1ea1n kh\u00f4ng th\u1ec3 th\u1ef1c hi\u1ec7n b\u1ea5t k\u1ef3 thay \u0111\u1ed5i n\u00e0o.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Router&gt;b\u1eadt<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>Router#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 t\u1ea1o ra c\u00e1c thay \u0111\u1ed5i cho thi\u1ebft b\u1ecb, ch\u00fang ta s\u1ebd ph\u1ea3i n\u00e2ng c\u1ea5p m\u1ee9c \u0111\u1ed9 truy c\u1eadp c\u1ee7a m\u00ecnh l\u00ean m\u1ed9t b\u1eadc n\u1eefa \u2013 \u0111\u1ea1t \u0111\u1ebfn m\u1ed9t c\u1ea5p \u0111\u1ed9 ch\u1ec9 huy \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 <\/span><b>ch\u1ebf \u0111\u1ed9 c\u1ea5u h\u00ecnh to\u00e0n c\u1ea7u<\/b><span style=\"font-weight: 400;\">. Tr\u1ea1ng th\u00e1i cao qu\u00fd n\u00e0y cung c\u1ea5p cho ch\u00fang ta kh\u1ea3 n\u0103ng v\u00e0 quy\u1ec1n h\u1ea1n l\u1edbn h\u01a1n tr\u01b0\u1edbc \u0111\u00e2y.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Router#c\u1ea5u h\u00ecnh terminal<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>Router(c\u1ea5u h\u00ecnh)#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">B\u1eb1ng c\u00e1ch truy c\u1eadp ch\u1ebf \u0111\u1ed9 c\u1ea5u h\u00ecnh to\u00e0n c\u1ea7u c\u1ee7a thi\u1ebft b\u1ecb Cisco, b\u1ea1n c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n b\u1ea5t k\u1ef3 thay \u0111\u1ed5i mong mu\u1ed1n n\u00e0o v\u1edbi to\u00e0n quy\u1ec1n ki\u1ec3m so\u00e1t \u2013 gi\u1ed1ng nh\u01b0 c\u00f3 quy\u1ec1n truy c\u1eadp Qu\u1ea3n tr\u1ecb vi\u00ean Windows ho\u1eb7c ng\u01b0\u1eddi d\u00f9ng root tr\u00ean Linux.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 \u0111\u1ea3m b\u1ea3o b\u1ea1n \u0111\u00e3 s\u1eb5n s\u00e0ng cho b\u1ea5t k\u1ef3 th\u1eed th\u00e1ch n\u00e0o, \u0111\u00e2y l\u00e0 m\u1ed9t v\u00e0i l\u1ec7nh m\u00e0 t\u00f4i khuy\u00ean b\u1ea1n n\u00ean l\u00e0m quen: N\u1ebfu b\u1ea1n mu\u1ed1n ti\u1ebft ki\u1ec7m th\u1eddi gian v\u00e0 c\u00f4ng s\u1ee9c g\u00f5 trong khi v\u1eabn \u0111\u1ea3m b\u1ea3o \u0111\u1ed9 ch\u00ednh x\u00e1c, ch\u00fang t\u00f4i c\u00f3 gi\u1ea3i ph\u00e1p ho\u00e0n h\u1ea3o \u0111\u1ec3 so\u1ea1n th\u1ea3o c\u00e1c l\u1ec7nh d\u00e0i h\u01a1n.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Khi b\u1ea1n g\u00f5 \u201cR1#show run\u201d v\u00e0 nh\u1ea5n ph\u00edm TAB, n\u00f3 s\u1ebd t\u1ef1 \u0111\u1ed9ng ho\u00e0n th\u00e0nh l\u1ec7nh c\u1ee7a b\u1ea1n. H\u01a1n n\u1eefa, n\u1ebfu b\u1ea1n nh\u1eadp d\u1ea5u h\u1ecfi (?), b\u1ea5t k\u1ef3 l\u1ec7nh ti\u1ebfp theo n\u00e0o s\u1ebd \u0111\u01b0\u1ee3c hi\u1ec3n th\u1ecb tr\u00ean m\u00e0n h\u00ecnh.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/R1-image-1.jpg\" alt=\"H\u00ecnh \u1ea3nh R1\" class=\"wp-image-1260\" width=\"841\" height=\"434\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"b-selecting-a-device-name-hostname\"><b>b) Ch\u1ecdn t\u00ean thi\u1ebft b\u1ecb (T\u00ean m\u00e1y ch\u1ee7)<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 thay \u0111\u1ed5i t\u00ean c\u1ee7a B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn ho\u1eb7c Chuy\u1ec3n m\u1ea1ch, t\u1ea5t c\u1ea3 nh\u1eefng g\u00ec b\u1ea1n c\u1ea7n l\u00e0m l\u00e0 nh\u1eadp l\u1ec7nh n\u00e0y: (b\u1ea1n s\u1ebd th\u1ea5y trong h\u00ecnh \u1ea3nh ti\u1ebfp theo)<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Router(c\u1ea5u h\u00ecnh)#t\u00ean m\u00e1y ch\u1ee7 ROUTER_NAME<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>ROUTER_NAME(c\u1ea5u h\u00ecnh)#<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"c-securing-access-to-the-router\"><b>c) B\u1ea3o v\u1ec7 truy c\u1eadp v\u00e0o B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 b\u1ea3o v\u1ec7 B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn c\u1ee7a b\u1ea1n kh\u1ecfi truy c\u1eadp tr\u00e1i ph\u00e9p, h\u00e3y xem c\u00e1ch ch\u00fang ta c\u00f3 th\u1ec3 thi\u1ebft l\u1eadp m\u1eadt kh\u1ea9u trong ch\u1ebf \u0111\u1ed9 \u0111\u1eb7c quy\u1ec1n (#). Th\u1ef1c hi\u1ec7n theo quy tr\u00ecnh \u0111\u01a1n gi\u1ea3n n\u00e0y \u0111\u1ec3 ho\u00e0n th\u00e0nh nhi\u1ec7m v\u1ee5:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Securing-access-to-the-router-2-1.jpg\" alt=\"B\u1ea3o v\u1ec7 truy c\u1eadp v\u00e0o h\u00ecnh \u1ea3nh b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn\" class=\"wp-image-1261\" width=\"838\" height=\"254\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>Router(c\u1ea5u h\u00ecnh)#t\u00ean m\u00e1y ch\u1ee7 R1<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#enable password cisco ho\u1eb7c<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)#m\u1eadt kh\u1ea9u b\u00ed m\u1eadt cisco123<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">S\u1eed d\u1ee5ng l\u1ec7nh n\u00e0y s\u1ebd \u0111\u1eb7t m\u1ed9t bi\u1ec3u ng\u1eef c\u1ea3nh b\u00e1o cho b\u1ea5t k\u1ef3 ai c\u1ed1 g\u1eafng truy c\u1eadp thi\u1ebft b\u1ecb, c\u1ea3nh b\u00e1o h\u1ecd v\u1ec1 c\u00e1c h\u1eadu qu\u1ea3 ti\u1ec1m \u1ea9n.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#banner motd \"TRUY C\u1eacP KH\u00d4NG \u0110\u01af\u1ee2C PH\u00c9P B\u1eca T\u1eea CH\u1ed0I\"<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">N\u1ebfu c\u00e2u h\u1ecfi c\u1ee7a b\u1ea1n li\u00ean quan \u0111\u1ebfn s\u1ef1 kh\u00e1c bi\u1ec7t gi\u1eefa \u201cenable password\u201d v\u00e0 \u201csecret enable\u201d, b\u1ea1n \u0111\u00e3 \u0111\u1ebfn \u0111\u00fang n\u01a1i. \u0110\u00e2y l\u00e0 nh\u1eefng g\u00ec ph\u00e2n bi\u1ec7t ch\u00fang:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Unauthorized-access-3-1.jpg\" alt=\"H\u00ecnh \u1ea3nh truy c\u1eadp tr\u00e1i ph\u00e9p\" class=\"wp-image-1262\" width=\"841\" height=\"453\"\/><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">M\u1ed9t c\u1ea5u h\u00ecnh (#enable secret) \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a trong khi c\u1ea5u h\u00ecnh kh\u00e1c (#enable password) v\u1eabn kh\u00f4ng \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">H\u00e3y b\u1eaft \u0111\u1ea7u b\u1eb1ng c\u00e1ch c\u1ea5u h\u00ecnh B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn \u0111\u1ec3 truy c\u1eadp m\u1ea1ng (kh\u1ea3 n\u0103ng ti\u1ebfp c\u1eadn) b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng c\u1ea5u tr\u00fac li\u00ean k\u1ebft sau:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Router-for-network-access-1.jpg\" alt=\"H\u00ecnh \u1ea3nh b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn cho truy c\u1eadp m\u1ea1ng\" class=\"wp-image-1263\" width=\"841\" height=\"421\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"d-configuring-an-ip-address-on-the-router\"><b>d) C\u1ea5u h\u00ecnh \u0111\u1ecba ch\u1ec9 IP tr\u00ean B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">M\u1ed9t B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn l\u00e0 m\u1ed9t c\u00f4ng c\u1ee5 v\u00f4 gi\u00e1 cho ph\u00e9p ch\u00fang ta k\u1ebft n\u1ed1i nhi\u1ec1u m\u1ea1ng m\u1ed9t c\u00e1ch li\u1ec1n m\u1ea1ch th\u00f4ng qua c\u00e1c c\u1ed5ng kh\u00e1c nhau, th\u01b0\u1eddng l\u00e0 hai ho\u1eb7c ba. Ch\u00fang ta g\u1ecdi m\u1ed9t c\u1ed5ng l\u00e0 kh\u00f4ng gian v\u1eadt l\u00fd m\u00e0 m\u1ed9t c\u00e1p c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i. C\u00f2n v\u1ec1 ph\u00eda logic t\u01b0\u01a1ng \u1ee9ng c\u1ee7a n\u00f3, ch\u00fang ta x\u00e1c \u0111\u1ecbnh n\u00f3 l\u00e0 m\u1ed9t giao di\u1ec7n.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">T\u00f3m l\u1ea1i:&nbsp;<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">C\u1ed5ng = V\u1eadt l\u00fd<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Giao di\u1ec7n = Logic <\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">V\u00ed d\u1ee5, ch\u00fang ta s\u1ebd c\u1ea5u h\u00ecnh m\u1ed9t \u0111\u1ecba ch\u1ec9 IP (logic) tr\u00ean giao di\u1ec7n v\u00e0 k\u1ebft n\u1ed1i n\u00f3 v\u1eadt l\u00fd v\u1edbi m\u1ed9t c\u1ed5ng qua c\u00e1p.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 b\u1ea5t k\u1ef3 giao ti\u1ebfp n\u00e0o di\u1ec5n ra trong m\u1ea1ng, c\u00e1c giao di\u1ec7n n\u00e0y c\u1ea7n m\u1ed9t \u0111\u1ecba ch\u1ec9 IP v\u00e0 ph\u1ea3i \u0111\u01b0\u1ee3c k\u00edch ho\u1ea1t, ngh\u0129a l\u00e0 b\u1eadt ON. Nh\u01b0 minh h\u1ecda trong h\u00ecnh, b\u1ea1n c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng c\u1ea5u h\u00ecnh m\u1ed9t \u0111\u1ecba ch\u1ec9 IP tr\u00ean m\u1ed9t giao di\u1ec7n m\u1ea1ng:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/IP-address-of-the-router-4-1.jpg\" alt=\"H\u00ecnh \u1ea3nh \u0111\u1ecba ch\u1ec9 IP c\u1ee7a b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn\" class=\"wp-image-1264\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)#giao di\u1ec7n FastEthernet0\/0<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(c\u1ea5u h\u00ecnh-n\u1ebfu)1TP5M\u1eb9o \u0111\u1ecba ch\u1ec9 192.168.1.1 255.255.255.0<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh-if)#kh\u00f4ng t\u1eaft<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"f-configuring-remote-access-on-a-router-telnet-ssh\"><b>f) C\u1ea5u h\u00ecnh truy c\u1eadp t\u1eeb xa tr\u00ean B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn (Telnet, SSH)<\/b><\/h3>\n\n<h2 class=\"wp-block-heading\" id=\"telnet\"><b>Telnet<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">C\u00e1c \u1ee9ng d\u1ee5ng m\u1ea1ng cung c\u1ea5p k\u1ebft n\u1ed1i t\u1eeb xa an to\u00e0n \u0111\u1ebfn c\u00e1c m\u1ea1ng, thi\u1ebft b\u1ecb (nh\u01b0 b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn v\u00e0 chuy\u1ec3n m\u1ea1ch) ho\u1eb7c m\u00e1y ch\u1ee7. \u0110i\u1ec1u n\u00e0y \u0111\u1ea3m b\u1ea3o truy c\u1eadp \u0111\u00e1ng tin c\u1eady t\u1eeb b\u1ea5t k\u1ef3 v\u1ecb tr\u00ed n\u00e0o.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/TELNET-5-1.jpg\" alt=\"TELNET 5 1\" class=\"wp-image-1265\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)#d\u00f2ng vty 0 14<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(config-line)#m\u1eadt kh\u1ea9u cisco<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(c\u1ea5u h\u00ecnh-d\u00f2ng)#\u0111\u0103ng nh\u1eadp<\/b><\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 b\u1eaft \u0111\u1ea7u, ch\u00fang ta s\u1ebd c\u1ea7n nh\u1eadp c\u00e1c d\u00f2ng \u1ea3o c\u1ee7a m\u00ecnh (t\u1ed5ng c\u1ed9ng 15), \u0111\u1eb7t m\u1eadt kh\u1ea9u (\u201cCisco\u201d), v\u00e0 sau \u0111\u00f3 b\u1eaft \u0111\u1ea7u qu\u00e1 tr\u00ecnh Telnet #login.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ssh\"><b>SSH<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">\u0110\u1ec3 k\u1ebft n\u1ed1i an to\u00e0n v\u1edbi m\u1ed9t thi\u1ebft b\u1ecb m\u1ea1ng c\u1ee5c b\u1ed9 ho\u1eb7c Internet t\u1eeb xa, SSH l\u00e0 giao th\u1ee9c l\u00fd t\u01b0\u1edfng. \u0110\u1ec3 c\u1ea5u h\u00ecnh \u0111i\u1ec1u n\u00e0y tr\u00ean c\u00e1c m\u00e1y Cisco, c\u1ea7n th\u1ef1c hi\u1ec7n m\u1ed9t s\u1ed1 b\u01b0\u1edbc nh\u1ea5t \u0111\u1ecbnh:<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Thi\u1ebft l\u1eadp m\u1ed9t t\u00ean \u0111\u0103ng nh\u1eadp v\u00e0 m\u1eadt kh\u1ea9u c\u00e1 nh\u00e2n.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Thi\u1ebft l\u1eadp m\u1ed9t t\u00ean mi\u1ec1n&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0110\u1ec3 \u0111\u1ea3m b\u1ea3o an to\u00e0n t\u1ed1i \u0111a, vi\u1ec7c t\u1ea1o ra c\u00e1c c\u1eb7p kh\u00f3a c\u00f4ng khai v\u00e0 ri\u00eang t\u01b0 l\u00e0 c\u1ea7n thi\u1ebft.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\u0110\u1ec3 k\u00edch ho\u1ea1t qu\u00e1 tr\u00ecnh d\u00f2ng \u1ea3o (vty), s\u1eed d\u1ee5ng l\u1ec7nh #login local.<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">Trong h\u00ecnh d\u01b0\u1edbi \u0111\u00e2y, b\u1ea1n c\u00f3 th\u1ec3 th\u1ea5y m\u1ed9t v\u00ed d\u1ee5 v\u1ec1 c\u1ea5u h\u00ecnh SSH tr\u00ean B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn Cisco:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/SSH-image-6-1.jpg\" alt=\"H\u00ecnh \u1ea3nh SSH \" class=\"wp-image-1267\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)#t\u00ean ng\u01b0\u1eddi d\u00f9ng admin quy\u1ec1n 15 m\u1eadt kh\u1ea9u admincisco321<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)#\u0111\u1ecba ch\u1ec9 mi\u1ec1n t\u00ean my.home.lab<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)#kh\u00f3a m\u00e3 h\u00f3a t\u1ea1o rsa modulus 1024<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)#\u0111\u1ecba ch\u1ec9 ssh phi\u00ean b\u1ea3n 2<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh)d\u00f2ng vty 0 15<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh-d\u00f2ng)#\u0111\u0103ng nh\u1eadp c\u1ee5c b\u1ed9<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(c\u1ea5u h\u00ecnh-d\u00f2ng)#giao th\u1ee9c \u0111\u1ea7u v\u00e0o ssh telnet<\/code><\/pre>\n\n\n<h2 class=\"wp-block-heading\" id=\"to-sum-up\"><b>T\u00f3m l\u1ea1i<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn l\u00e0 m\u1ed9t thi\u1ebft b\u1ecb thi\u1ebft y\u1ebfu<\/span> trong b\u1ea5t k\u1ef3 m\u1ea1ng m\u00e1y t\u00ednh n\u00e0o v\u00ec n\u00f3 k\u1ebft n\u1ed1i nhi\u1ec1u m\u1ea1ng l\u1ea1i v\u1edbi nhau. N\u00f3 c\u00f3 c\u00e1c giao th\u1ee9c m\u1ea1ng kh\u00e1c nhau \u0111\u01b0\u1ee3c k\u00edch ho\u1ea1t (nh\u01b0 RIP v\u00e0 OSPF) gi\u00fap n\u00f3 trong qu\u00e1 tr\u00ecnh k\u1ebft n\u1ed1i. N\u00f3 c\u0169ng cung c\u1ea5p nhi\u1ec1u c\u1ea5u h\u00ecnh kh\u00e1c nhau cho m\u1ee5c \u0111\u00edch b\u1ea3o m\u1eadt (nh\u01b0 m\u1eadt kh\u1ea9u tr\u00ean c\u00e1c d\u00f2ng \u1ea3o). Trong b\u00e0i vi\u1ebft n\u00e0y, ch\u00fang ta \u0111\u00e3 h\u1ecdc c\u00e1ch thi\u1ebft l\u1eadp m\u1ed9t \u0111\u1ecba ch\u1ec9 IP tr\u00ean B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn, c\u0169ng nh\u01b0 cho truy c\u1eadp t\u1eeb xa (Telnet &amp; SSH). Ch\u00fang ta c\u0169ng \u0111\u00e3 h\u1ecdc v\u1ec1 m\u1ed9t s\u1ed1 c\u1ea5u h\u00ecnh quan tr\u1ecdng nh\u1ea5t <span style=\"font-weight: 400;\">m\u00e0 m\u1ed9t qu\u1ea3n tr\u1ecb vi\u00ean m\u1ea1ng n\u00ean bi\u1ebft.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>M\u1ed9t \u0111i\u1ec3m chung n\u1ed5i b\u1eadt khi th\u1ea3o lu\u1eadn v\u1ec1 b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn v\u00e0 b\u1ed9 chuy\u1ec3n m\u1ea1ch m\u1ea1ng Cisco: l\u00e0 H\u1ec7 \u0111i\u1ec1u h\u00e0nh Internetwork (IOS) n\u1ed5i ti\u1ebfng. &quot;\u0110\u1ed9ng c\u01a1&quot; m\u1ea1nh m\u1ebd n\u00e0y l\u00e0 th\u1ee9 cung c\u1ea5p n\u0103ng l\u01b0\u1ee3ng cho t\u1ea5t c\u1ea3 c\u00e1c thi\u1ebft b\u1ecb n\u00e0y, \u0111\u1ea3m b\u1ea3o\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/cong-nghe\/nhung-dieu-can-biet-khi-cai-dat-router-wi-fi-tai-nha\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Nh\u1eefng \u0111i\u1ec1u b\u1ea1n n\u00ean bi\u1ebft khi l\u1eafp \u0111\u1eb7t B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn kh\u00f4ng d\u00e2y gia \u0111\u00ecnh (Wi-Fi)<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/cong-nghe\/nhung-dieu-can-biet-khi-cai-dat-router-wi-fi-tai-nha\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/cong-nghe\/nhung-dieu-can-biet-khi-cai-dat-router-wi-fi-tai-nha\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T20:26:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\"},\"headline\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"name\":\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"description\":\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Wifi router\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00e0i \u0111\u1eb7t B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn Kh\u00f4ng d\u00e2y Gia \u0111\u00ecnh (Wi-Fi) \u0111\u00fang c\u00e1ch | securitybriefing.net","description":"T\u00ecm hi\u1ec3u v\u1ec1 c\u00e1c t\u00ednh n\u0103ng v\u00e0 ch\u1ee9c n\u0103ng kh\u00e1c nhau c\u1ee7a b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn kh\u00f4ng d\u00e2y gia \u0111\u00ecnh v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 thi\u1ebft b\u1ecb v\u00e0 d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n v\u1edbi b\u1ea3o v\u1ec7 \u0111i\u1ec3m cu\u1ed1i","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/cong-nghe\/nhung-dieu-can-biet-khi-cai-dat-router-wi-fi-tai-nha\/","og_locale":"vi_VN","og_type":"article","og_title":"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net","og_description":"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection","og_url":"https:\/\/securitybriefing.net\/vi\/cong-nghe\/nhung-dieu-can-biet-khi-cai-dat-router-wi-fi-tai-nha\/","og_site_name":"Security Briefing","article_published_time":"2022-12-15T20:26:27+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"6 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44"},"headline":"What you should know when installing Home Wireless Routers (Wi-Fi)","datePublished":"2022-12-15T20:26:27+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","articleSection":["Tech"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","url":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","name":"C\u00e0i \u0111\u1eb7t B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn Kh\u00f4ng d\u00e2y Gia \u0111\u00ecnh (Wi-Fi) \u0111\u00fang c\u00e1ch | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","datePublished":"2022-12-15T20:26:27+00:00","description":"T\u00ecm hi\u1ec3u v\u1ec1 c\u00e1c t\u00ednh n\u0103ng v\u00e0 ch\u1ee9c n\u0103ng kh\u00e1c nhau c\u1ee7a b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn kh\u00f4ng d\u00e2y gia \u0111\u00ecnh v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 thi\u1ebft b\u1ecb v\u00e0 d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n v\u1edbi b\u1ea3o v\u1ec7 \u0111i\u1ec3m cu\u1ed1i","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","width":2560,"height":1707,"caption":"Wifi router"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What you should know when installing Home Wireless Routers (Wi-Fi)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}