Welcome to IE-LAB!

Search
Generic filters
CISCO
Search
Generic filters
CISCO

Do you still need 2.4GHz?

CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps

Do you still need 2.4GHz?

I believe that most of your devices have used 5G band wifi, and even some of your devices have caught up with the trend of the times, using whole-house fiber wifi6. In this case, we can still find a lot of 2.4ghz wireless signals everywhere. Why is this? Should we turn off 2.4ghz?

One possibility of opening 2.4GHz is that the 5GHz wall-penetrating effect is not ideal. For example, some corners of the kitchen and bathroom are not fully covered. It is not worthwhile to add a new device to roam for that area. Open it only for that in that humble corner we can also be happy to surf the Internet.

But more people may not think so much, just think that opening but not using 2.4GHz is better than leaving it, because it does not use much electricity. So we didn’t turn off 2.4ghz when we first configured wifi, but do you know? Not using it and not turning it off isn’t just relevant to electricity.

First of all, there are two reasons why 2.4ghz is a bad experience. First, its negotiated bandwidth of theoretical maximum is not big enough for us to use delightfully. The second reason is that the 2.4ghz signal is too dense at present, so we can see in each channel a bunch of crosstalk, in order to be unable to find a clean channel, which results nonfluency in our games, online classes, video conferences. But there are still many other consequencies. You should all use the so-called true wireless Bluetooth headphones by now, which, aside from being easy to lose, are pleasantly small and convenient. But I don’t know if you have noticed that bluetooth uses ISM 2.4GHz frequency band. Yes, Bluetooth headset and 2.4GHz wifi will also interfere with each other. The transmitting power of Bluetooth headset is usually not as high as that of router RF, which will not affect the Internet access. However, have you  ever experienced the sudden disconnection of using Bluetooth headset to make phone calls or listen to music? That’s, the 2.4ghz wifi RF will interfere with your Bluetooth headset!

In addition, in terms of security, 2.4ghz is easier to be breached by grabbing the handshake bag. I believe you have all heard of this, such as Kali CDLinux milk bottle, deeppin Aircrack, etc. Many friends have actually used it. However, these tools have been solved in the new generation of wifi protocol through deauth attack and handshake packet capture. However, if you turn on 2.4GHz and set the same wifi password as 5GHz, it is easy to be breached. Some students say that they have high bandwidth, so they don’t mind sharing network speed with others. But the actual situation is more complicated, if there is a camera installed in the home, the attacker may further invade the security equipment in the home after wifi is invaded into an internal network environment, and the privacy is completely exposed. Or, in conjunction with other attacks such as DNS contamination, spend every penny of your bank card. Or use your family’s network as a springboard to break the law, and the cops show up and you don’t even know what happened.

I know a new way to break the new wifi protocol! SHH! But have you noticed that the new technology is always known by a small number of people, and the commonly used wireless network card chip to support the attack usually only supports 2.4GHz, if the attack on the new wifi protocol is bound to increase the attack cost, at this time the attacker found around a large number of other 2.4g open. Do you know if he will dig into your password, or turn to something simpler.

In short, it is necessary to decide whether to turn on the 2.4ghz frequency band according to your actual use needs. If you must turn on the frequency band, you need to set a longer, more complex and irregular password. Although there is no absolute security system, increasing the cost of attackers is equivalent to strengthening the protection of yourself. In addition, secretly tell everyone, after getting the handshake bag, most attackers not only quickly run through the weak password dictionary, but also run all the phone numbers of the city where the signal source is, most likely, they will gain something. Those who use the mobile phone number as the password, do you know what to do now?

Do you still need 2.4GHz?

CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps CCIE Dumps

error: Content is protected !!
× How can I help you?