A simple way to stop someone from using your Wi-Fi (mainly for Binatone Routers)

I checked some of my blog’s traffic stats recently and discovered that a lot of the people coming here were searching for a way to block someone from using their wireless connection. Now, I understand that a rudimentary way of doing so is changing the password, but this will not always work, especially if the people involved have easy access to your password.

Now, with this post, I will show you a simple way to block access to your wireless connection without having to change your password. This method is very basic; it will certainly not stop the most determined attacker, but it works when the people you want to block are say, family members. Here’s how to do it:

  1. You will have to block every device individually, so for starters, you will need the MAC addresses of the devices you want to block. If you don’t know what a MAC Address is, go here. You’ll find the MAC Address of a device somewhere in its network settings. If you still cannot find it, just go to Google and put in something like “how to find the MAC address <your_device’s_platform>. You will need physical access to the device you need to block. There is another way to block devices when you don’t have physical access to them; I will discuss that at the end of this post.
  2. Open your router’s configuration page (should be something like 192.168.1.1). Key in the username (usually admin/administrator) and password (the default password is generally password; you may also try leaving it blank. Once you are in, change your default log-in details.
  3. Once you are inside your router’s configuration page, go to the interface setup portion. For Binatone routers, it’s usually just a tab that says “Interface Setup”. For other routers, it’s usually somewhere near where your wireless connection’s password settings are.
  4. Go to the wireless connection settings (for Binatone) and for other routers, search for a similar sub-category or option.
  5. Search for the wireless/MAC Address filter. This is where you will do the actual blocking. Make sure you have the right MAC Address and put it in one of the text fields which will usually say 00:00:00:00:00:00. Once you have done this, select the required action, in this case, Deny Association. Now, click on the “Activate(d)” radio button and save your preferences.

That’s it. You can put in whatever MAC Address you want to block and save (remember to activate the filter and choose the correct action setting). Note that this won’t really stop a very determined attacker or someone who has a physical link with your router

If you do not have physical access to the devices you want to block, there is another way to go about this. This is by changing the action setting under the MAC Address filter. Change it from “Deny Association” to “Allow Association”, and instead of keying in the MAC Address(es) you want to block, key in the MAC Address(es) you don’t want to block. What this will (obviously) do is only allow certain devices access and block everyone else out. This is useful if you want to add an extra (but still basic) layer of security or don’t have physical access to the devices you need to keep out.

Warning: Take care while changing your router settings and only do so when you are completely confident and sure of what you are doing. If you block yourself out by mistake, you can always use a device with a physical link to your router (i.e. ethernet/USB connection with it [not wireless]) and access the router’s page, enabling you to remove the erratic settings.

That’s it! Thanks for reading. 🙂

Advertisements

Port Forwarding on the Binatone DT 845W Router

A lot of people have asked for this, since there are not many tutorials on port forwarding on your home router. In fact, I did not find even one useful tut on port forwarding on a Binatone router, except for forwarding on the ADSL2000 and ADSL2001 series. Here I have explained how to port forward on the Binatone 845W ADSL2+ Wireless Router. I hope this is of use to people, owing to the fact that many other home routers use the same, or similar settings:

  1. Type your Internet Protocol address in your favourite web browser’s (mine is Mozilla Firefox) URL bar and press the return key. This should open up your router’s log-in page. Usually, typing 192.168.1.1 (or a similar address) will suffice, but you may also type in your public Internet Protocol address for this purpose. If you want to find out what your public internet protocol address is, open Google and search for my ip or what is my ip. This should make Google give you your internet protocol address above the search results.
  2. When you have opened your router’s page, type your user name and password to log-in to your router. Usually, the user name is admin, and by default, the password is password. The user name will be admin for you in most cases, while if you have changed the password, well, put in whatever password you set it to. If you don’t remember your router’s password, you might want to reset your router by sticking a pin in the hole which houses the reset button. Press it for about 10 seconds till the router begins to restart. Now, log in to your router’s page, and enter the default log-in details, admin for user name, and password for password. Remember, once you are in, change your password to something else instead of password. Write down your new password in case you forget it.
  3. Once in, click on the Access Management tab, for DT 845W or search for the ACL option (Access Control Listing) on other routers. For 845W, now click on the ACL option below the Access Management tab. Make sure that Access Control Listing is set to enabled. It should be enabled by default. Now, in the Access Control Editing option, set the ACL Rule Index to 3. You might want to set it t another number; though I said 3 because by default Rule 1 and Rule 2 are already defined. You should check the Access Control Listing table below first. Suppose the number of entries in that table is n, set the ACL Rule Index to n+1.
  4. Now, for the option Active yes/no, set it to YES by choosing the appropriate radio button.
  5. Leave the Secure IP Address section blank unless you know what you are doing. If you want to allow only a specific range of internet protocol addresses, you can set the range there. The default entry for this option is 0.0.0.0 ~ 0.0.0.0, which means “All Internet Protocol Addresses”. If you are setting up a game server or a web server for which you want to forward ports, it is better to not change this setting and let the default setting remain.
  6. Now, for the APPLICATION drop-down menu, you must select the application you wish to port forward for. Though I don’t think you can enter custom ports through the ACL page, you might as well snoop around and find a similar option.
  7. Set the Interface option to LAN or WAN or BOTH as per your requirements, though you needn’t do so for LAN, because by default, the first ACL rule opens up every web application for LAN.
  8. Now press Save. The first step of our operation is completed.
  9. Now click on the Advanced Setup tab and go to NAT. For other routers, search for the Network Address Translation option or the DMZ (Demilitarized Zone) option. For 845W users, after clicking on NAT, click on DMZ. Set it to enabled and enter the relevant Internet Protocol Address over there. To find out the address you need, open the command line or terminal, and enter ipconfig for Windows or ifconfig for most Linux distributions and press the return key. You should have an address in front of you of the type 192.168.1.x or 192.168.x.y, I believe. Note down this address or simply copy-paste it to the text box in the DMZ option.
  10. Press Save and close the router configuration page. You are now good to go.

This tutorial teaches you how to open up your ports for traffic on port 80, 20, 21, Telnet, and IRC ports among others. Through this tutorial, you might also select ALL from the Applications option and open up either all of the above ports or all of your ports, but I strongly recommend to refrain from doing so. Do not mess up with these fragile security settings unless you know what you are doing.

I will soon put up another tutorial to teach you how to port forward on custom ports on home routers such as the DT 845W ADSL2+ Wireless Router! 🙂