by Tommy N. Updated Apr 12, 2026
Your router is the gateway between your home network and the internet, and if it's not properly secured, everything connected to it is at risk. This router security checklist covers the 10 most critical settings you should change immediately to protect your network from unauthorized access, malware, and data theft.
Most routers ship with factory settings optimized for easy setup, not security. Default passwords, outdated firmware, and enabled convenience features create vulnerabilities that attackers actively exploit. By working through this checklist, you'll close the most common security gaps in under an hour. Start by logging into your router at 192.168.1.1 or 10.0.0.1 — if you're unsure of your router's address, learn how to find your router IP address.
Below is a quick reference table showing each security setting, its risk level if left unchanged, and the estimated time to fix. We'll dive deep into each one in the sections that follow.
| # | Security Setting | Risk if Unchanged | Time to Fix |
|---|---|---|---|
| 1 | Default admin password | Critical | 2 minutes |
| 2 | Router firmware | Critical | 5-15 minutes |
| 3 | WiFi encryption (WPA3/WPA2) | Critical | 3 minutes |
| 4 | WPS (WiFi Protected Setup) | High | 1 minute |
| 5 | Remote management | High | 1 minute |
| 6 | Default SSID name | Medium | 2 minutes |
| 7 | Built-in firewall | High | 3 minutes |
| 8 | UPnP | High | 1 minute |
| 9 | Guest network | Medium | 5 minutes |
| 10 | MAC address filtering | Low-Medium | 10 minutes |
The default admin password is printed on your router's label and published in online databases. Anyone who can access your network — or exploit a browser vulnerability — can log into your router with these default credentials and take full control. They can change your DNS settings to redirect your traffic, open ports, disable security features, or monitor everything you do online.
Log into your router admin panel and navigate to Administration or System settings. Look for the password change option. Create a password that's at least 12 characters long with a mix of uppercase, lowercase, numbers, and symbols. Use a password generator for maximum strength. Store this password in a password manager — if you forget it, you'll need to factory reset your router. Follow our detailed guide to change your router admin password.
Router firmware updates patch known security vulnerabilities that attackers actively exploit. Outdated firmware is one of the most common reasons routers get compromised. Some vulnerabilities allow remote code execution, meaning an attacker can take over your router from anywhere on the internet without needing your password.
In your router's admin panel, look for Firmware Update, System Update, or Router Update. Many modern routers can check for updates automatically — enable this feature if available. For detailed instructions specific to your router brand, see our complete guide on how to update router firmware. Set a monthly reminder to check for updates if your router doesn't support auto-updates.
WiFi encryption prevents unauthorized users from intercepting your wireless traffic. WPA3 is the newest and most secure standard, while WPA2-AES remains acceptable. Older protocols like WEP and WPA-TKIP have known vulnerabilities and can be cracked in minutes using freely available tools.
Go to your Wireless Security settings. Select WPA3-Personal if available, or WPA2-AES (sometimes labeled WPA2-PSK with AES). If you have older devices that don't support WPA3, use WPA3/WPA2 transition mode. Never select WEP, WPA-TKIP, or "Auto" mode which may default to weaker encryption.
WPS was designed to make connecting devices easier via a PIN or button press. However, the WPS PIN is vulnerable to brute-force attacks. An attacker can crack the 8-digit PIN in a matter of hours, gaining full access to your WiFi network regardless of how strong your WiFi password is.
Find WPS settings in your wireless configuration or advanced wireless settings. Disable both PIN-based and push-button WPS. Some routers have separate toggles for each method — make sure both are turned off. Note that some router models don't fully disable WPS even when the setting is toggled off; check your router model's known issues.
Remote management allows access to your router's admin panel from the internet. If enabled, anyone who discovers your router's public IP can attempt to log in. Combined with default credentials or weak passwords, this is a direct path to complete network compromise.
Look for Remote Management, Remote Access, or Web Access from WAN in your router settings. Ensure it's set to disabled or off. If you need to manage your router remotely, set up a VPN on your router and connect through that instead — it's far more secure than exposing the admin panel directly to the internet.
Default SSIDs like "NETGEAR_5G" or "TP-Link_A4B2" reveal your router's manufacturer and sometimes model number. Attackers use this information to look up known vulnerabilities and default credentials specific to that device. A custom SSID eliminates this information leak.
Navigate to your wireless settings and change the network name. Don't use personally identifiable information like your name or address. Choose something unique but generic. See our guide on how to change your WiFi name for brand-specific instructions. Avoid hiding your SSID (disabling broadcast) — it doesn't improve security and can cause connectivity issues.
Your router's firewall inspects incoming and outgoing traffic, blocking potentially malicious connections. Most routers include SPI (Stateful Packet Inspection) firewalls that track active connections and block unsolicited incoming traffic. Without the firewall enabled, your network is directly exposed to internet-based attacks.
Check your router's Security or Firewall settings. Enable SPI Firewall and DoS (Denial of Service) protection if available. Some routers also offer content filtering, IP filtering, and port filtering — configure these based on your needs. Understanding how NAT works alongside your firewall helps you make better configuration decisions.
Universal Plug and Play allows any device on your network to automatically open ports on your router. While convenient for gaming consoles and streaming devices, UPnP is routinely exploited by malware to open backdoor connections. The protocol has no authentication mechanism, so any compromised device can punch holes in your firewall.
Find UPnP in your router's Advanced settings or NAT configuration. Disable it completely. If a specific device requires port forwarding to function, manually set up port forwarding for only the ports that device needs rather than leaving UPnP open for everything.
A guest network provides internet access to visitors without giving them access to your main network devices like computers, NAS drives, and printers. It also serves as an isolated network for IoT devices that don't need to communicate with your primary devices. See our detailed guide on setting up a guest WiFi network.
Enable the guest network in your wireless settings. Create a separate SSID and strong password. Disable "Allow access to local network" or "Allow guests to see each other" options. Set bandwidth limits if your router supports them to prevent guest devices from consuming all your bandwidth.
MAC address filtering creates a whitelist of approved devices that can connect to your network. While not foolproof — MAC addresses can be spoofed — it adds an extra layer of security that deters casual attackers and prevents unauthorized devices from connecting even if they know your WiFi password. Learn more about MAC address filtering and how to understand your MAC address.
Navigate to your wireless security or access control settings. Enable MAC filtering in "allow" (whitelist) mode. Add the MAC addresses of all your authorized devices. You can find a device's MAC address in its network settings or by checking your connected devices list in your router admin panel.
Use this scoring table to assess your current router security posture. Check each item and add up your score — aim for 90 or above.
| Security Item | Status | Points |
|---|---|---|
| Admin password changed from default | Yes / No | 15 |
| Firmware updated to latest version | Yes / No | 15 |
| WPA3 or WPA2-AES enabled | Yes / No | 15 |
| WPS disabled | Yes / No | 10 |
| Remote management disabled | Yes / No | 10 |
| Default SSID changed | Yes / No | 5 |
| Firewall enabled | Yes / No | 10 |
| UPnP disabled | Yes / No | 10 |
| Guest network configured | Yes / No | 5 |
| MAC filtering enabled | Yes / No | 5 |
Pro Tip: Schedule a quarterly security audit using this checklist. Router settings can reset after firmware updates or power outages, and new vulnerabilities are discovered regularly. A 15-minute quarterly check keeps your network locked down.
Signs of a compromised router include unexpected DNS setting changes, unknown devices on your network, slow internet speeds, browser redirects to unfamiliar sites, and new admin accounts you didn't create. Check your router's admin panel regularly to monitor for these changes.
No. Changing the WiFi password only prevents unauthorized wireless connections. You also need to change the admin password, update firmware, disable risky features like UPnP and WPS, and enable firewall protection for comprehensive security.
Hiding your SSID provides negligible security benefit. Hidden networks are still detectable with basic scanning tools, and hiding the SSID can cause connection issues with some devices. Focus on strong encryption and passwords instead.
Change your WiFi password immediately if you suspect unauthorized access. Otherwise, changing it every 6-12 months is reasonable. More importantly, ensure you're using a strong, unique password with WPA3 or WPA2-AES encryption.
No. A router firewall and antivirus software protect against different threats. The firewall blocks unauthorized incoming connections at the network level, while antivirus software detects and removes malware on individual devices. You need both.
If you use weak encryption (WEP), have WPS enabled, or use a simple WiFi password, your neighbor could potentially crack into your network. Following this security checklist — especially using WPA3 and disabling WPS — makes unauthorized access extremely difficult.
Router security isn't a set-it-and-forget-it task. Work through this checklist today, then revisit it quarterly to ensure nothing has reverted or new vulnerabilities haven't emerged. For additional guidance on securing your home network, the CISA Secure Our World initiative provides excellent resources and best practices.
![]() |
![]() |
![]() |
![]() |
About Tommy N.
Tommy is the founder of RouterHax and a network engineer with 10+ years of experience in home and enterprise networking. He specializes in router configuration, WiFi optimization, and network security. When not writing guides, he's testing the latest mesh WiFi systems and helping readers troubleshoot their home networks.
Promotion for FREE Gifts. Moreover, Free Items here. Disable Ad Blocker to get them all.
Once done, hit any button as below
![]() |
![]() |
![]() |
![]() |