Have you ever had the suspicion that the next door neighbor he is stealing your wifi? Is your network excessively slow at certain times of the day and you're not sure why? A good way to ensure that our connection is not being slowed down by "outside agents" is by mapping our home network.
In this way, if we have identified all the home devices that connect to the Internet, we can create a security whitelist. Thus, only mobiles, computers and gadgets that belong to said "white list" will have permission to establish a connection, leaving out any type of intruder or unauthorized access.
Step # 1 - Access the router's configuration settings
The first step will consist of entering the router configuration menu, which is where we will do all the pertinent steps. Access to the router is done from the web browser and it is usually enough to write the IP in the address bar (you can see the IP of your router together with the username and access password on a sticker that is usually attached to the router itself ). Usually the IP of the router is usually //192.168.0.1 or //192.168.1.1.
Once we are inside, we must locate the panel that refers to access control. Its location usually varies from one router model to another, although it is usually between the settings of “Security”.
Here we can also see a list with the IPs of all the devices that are currently connected to our wifi. So by boat it is soon impossible to know if all these devices are ours or if there is an intruder sucking from the jar, although this is a question that we will solve quickly.
Step # 2 - Disconnect all wireless devices from the network
Next we will proceed to change the Wi-Fi password. This will make the connection of all devices is cut off that until now were connected to the network (with the exception of those that are connected via ethernet through a network cable, such as the home desktop computer). Of course, this change will also cause the Wi-Fi thief to lose his connection and be unable to reconnect.
Step # 3 - Reconnect the devices to Wi-Fi one by one
Then we will connect to the network one by one all mobile phones and other devices that we have at home using the new password. With the router's admin panel in front of you, We will take note of the MAC address of each of the devices that are connecting to the network.
Important: we will not add a new device to the network until we have noted the MAC of the previous device (otherwise it will be impossible to know which MAC corresponds to each device).
Step # 4 - Create an access whitelist
Now is when the magic begins. Having in front of the list of MAC addresses that we have just collected, we will go to the router's administration panel, until the section of “Security -> Access control"And activate the option"White list”.
Next, we will add all our devices to the white list one by one, indicating the corresponding MAC address in each case. Once all the devices have been added, we save the changes.
This will mean that from now on, only computers whose MAC is added to the whitelist can connect to the home Wi-Fi network, keeping out all the intruders and chupawifis in the neighborhood. This is a tactic that gives us great security, since even if Wi-Fi thieves manage to hack the access password, they will not be able to enter as they are not added to the white list.
* To carry out this tutorial we have used a TP-Link router. Depending on our router it is possible that the menus are a little different.
** This trick does not prevent the router from being hacked at any given moment. To prevent the pirate from adding their devices to the white list (it is not something usual but it could happen) it is advisable to review said list and change the password to access the router that is usually set at the factory.You have Telegram installed? Receive the best post of each day on our channel. Or if you prefer, find out everything from our Facebook page.