Router Security Checklist: 10 Settings to Change Right Now

by Tommy N. Updated Apr 12, 2026

Your router is the gateway between your home network and the internet, and if it's not properly secured, everything connected to it is at risk. This router security checklist covers the 10 most critical settings you should change immediately to protect your network from unauthorized access, malware, and data theft.

Router Security Checklist: 10 Settings to Change Right Now
Figure 1 — Router Security Checklist: 10 Settings to Change Right Now

Most routers ship with factory settings optimized for easy setup, not security. Default passwords, outdated firmware, and enabled convenience features create vulnerabilities that attackers actively exploit. By working through this checklist, you'll close the most common security gaps in under an hour. Start by logging into your router at 192.168.1.1 or 10.0.0.1 — if you're unsure of your router's address, learn how to find your router IP address.

The 10-Point Router Security Checklist

Below is a quick reference table showing each security setting, its risk level if left unchanged, and the estimated time to fix. We'll dive deep into each one in the sections that follow.

#Security SettingRisk if UnchangedTime to Fix
1Default admin passwordCritical2 minutes
2Router firmwareCritical5-15 minutes
3WiFi encryption (WPA3/WPA2)Critical3 minutes
4WPS (WiFi Protected Setup)High1 minute
5Remote managementHigh1 minute
6Default SSID nameMedium2 minutes
7Built-in firewallHigh3 minutes
8UPnPHigh1 minute
9Guest networkMedium5 minutes
10MAC address filteringLow-Medium10 minutes

1. Change the Default Admin Password

Why It Matters

The default admin password is printed on your router's label and published in online databases. Anyone who can access your network — or exploit a browser vulnerability — can log into your router with these default credentials and take full control. They can change your DNS settings to redirect your traffic, open ports, disable security features, or monitor everything you do online.

How to Change It

Log into your router admin panel and navigate to Administration or System settings. Look for the password change option. Create a password that's at least 12 characters long with a mix of uppercase, lowercase, numbers, and symbols. Use a password generator for maximum strength. Store this password in a password manager — if you forget it, you'll need to factory reset your router. Follow our detailed guide to change your router admin password.

2. Update Your Router Firmware

Why It Matters

Router firmware updates patch known security vulnerabilities that attackers actively exploit. Outdated firmware is one of the most common reasons routers get compromised. Some vulnerabilities allow remote code execution, meaning an attacker can take over your router from anywhere on the internet without needing your password.

How to Update

In your router's admin panel, look for Firmware Update, System Update, or Router Update. Many modern routers can check for updates automatically — enable this feature if available. For detailed instructions specific to your router brand, see our complete guide on how to update router firmware. Set a monthly reminder to check for updates if your router doesn't support auto-updates.

Warning: Never interrupt a firmware update in progress. Don't unplug the router or close the browser during the update process. A failed firmware update can permanently brick your router, requiring a replacement.

3. Enable WPA3 or WPA2-AES Encryption

Why It Matters

WiFi encryption prevents unauthorized users from intercepting your wireless traffic. WPA3 is the newest and most secure standard, while WPA2-AES remains acceptable. Older protocols like WEP and WPA-TKIP have known vulnerabilities and can be cracked in minutes using freely available tools.

How to Enable

Go to your Wireless Security settings. Select WPA3-Personal if available, or WPA2-AES (sometimes labeled WPA2-PSK with AES). If you have older devices that don't support WPA3, use WPA3/WPA2 transition mode. Never select WEP, WPA-TKIP, or "Auto" mode which may default to weaker encryption.

4. Disable WPS (WiFi Protected Setup)

Why It Matters

WPS was designed to make connecting devices easier via a PIN or button press. However, the WPS PIN is vulnerable to brute-force attacks. An attacker can crack the 8-digit PIN in a matter of hours, gaining full access to your WiFi network regardless of how strong your WiFi password is.

How to Disable

Find WPS settings in your wireless configuration or advanced wireless settings. Disable both PIN-based and push-button WPS. Some routers have separate toggles for each method — make sure both are turned off. Note that some router models don't fully disable WPS even when the setting is toggled off; check your router model's known issues.

5. Disable Remote Management

Why It Matters

Remote management allows access to your router's admin panel from the internet. If enabled, anyone who discovers your router's public IP can attempt to log in. Combined with default credentials or weak passwords, this is a direct path to complete network compromise.

How to Disable

Look for Remote Management, Remote Access, or Web Access from WAN in your router settings. Ensure it's set to disabled or off. If you need to manage your router remotely, set up a VPN on your router and connect through that instead — it's far more secure than exposing the admin panel directly to the internet.

6. Change Your Default SSID

Why It Matters

Default SSIDs like "NETGEAR_5G" or "TP-Link_A4B2" reveal your router's manufacturer and sometimes model number. Attackers use this information to look up known vulnerabilities and default credentials specific to that device. A custom SSID eliminates this information leak.

How to Change

Navigate to your wireless settings and change the network name. Don't use personally identifiable information like your name or address. Choose something unique but generic. See our guide on how to change your WiFi name for brand-specific instructions. Avoid hiding your SSID (disabling broadcast) — it doesn't improve security and can cause connectivity issues.

7. Enable the Built-in Firewall

Why It Matters

Your router's firewall inspects incoming and outgoing traffic, blocking potentially malicious connections. Most routers include SPI (Stateful Packet Inspection) firewalls that track active connections and block unsolicited incoming traffic. Without the firewall enabled, your network is directly exposed to internet-based attacks.

How to Enable

Check your router's Security or Firewall settings. Enable SPI Firewall and DoS (Denial of Service) protection if available. Some routers also offer content filtering, IP filtering, and port filtering — configure these based on your needs. Understanding how NAT works alongside your firewall helps you make better configuration decisions.

8. Disable UPnP

Why It Matters

Universal Plug and Play allows any device on your network to automatically open ports on your router. While convenient for gaming consoles and streaming devices, UPnP is routinely exploited by malware to open backdoor connections. The protocol has no authentication mechanism, so any compromised device can punch holes in your firewall.

How to Disable

Find UPnP in your router's Advanced settings or NAT configuration. Disable it completely. If a specific device requires port forwarding to function, manually set up port forwarding for only the ports that device needs rather than leaving UPnP open for everything.

Pro Tip: After disabling UPnP, test all your devices and services to see what breaks. In most cases, nothing will be affected because UPnP is primarily needed for peer-to-peer applications and game hosting. Services like Netflix, Spotify, and web browsing work fine without UPnP.

9. Set Up a Guest Network

Why It Matters

A guest network provides internet access to visitors without giving them access to your main network devices like computers, NAS drives, and printers. It also serves as an isolated network for IoT devices that don't need to communicate with your primary devices. See our detailed guide on setting up a guest WiFi network.

How to Set It Up

Enable the guest network in your wireless settings. Create a separate SSID and strong password. Disable "Allow access to local network" or "Allow guests to see each other" options. Set bandwidth limits if your router supports them to prevent guest devices from consuming all your bandwidth.

10. Enable MAC Address Filtering

Why It Matters

MAC address filtering creates a whitelist of approved devices that can connect to your network. While not foolproof — MAC addresses can be spoofed — it adds an extra layer of security that deters casual attackers and prevents unauthorized devices from connecting even if they know your WiFi password. Learn more about MAC address filtering and how to understand your MAC address.

How to Enable

Navigate to your wireless security or access control settings. Enable MAC filtering in "allow" (whitelist) mode. Add the MAC addresses of all your authorized devices. You can find a device's MAC address in its network settings or by checking your connected devices list in your router admin panel.

Security Audit Score Table

Use this scoring table to assess your current router security posture. Check each item and add up your score — aim for 90 or above.

Security ItemStatusPoints
Admin password changed from defaultYes / No15
Firmware updated to latest versionYes / No15
WPA3 or WPA2-AES enabledYes / No15
WPS disabledYes / No10
Remote management disabledYes / No10
Default SSID changedYes / No5
Firewall enabledYes / No10
UPnP disabledYes / No10
Guest network configuredYes / No5
MAC filtering enabledYes / No5
Pro Tip: Schedule a quarterly security audit using this checklist. Router settings can reset after firmware updates or power outages, and new vulnerabilities are discovered regularly. A 15-minute quarterly check keeps your network locked down.
Key Takeaways
  • Change your router's default admin password immediately — it's the single most critical security step
  • Keep firmware updated to patch known vulnerabilities that attackers actively exploit
  • Use WPA3 or WPA2-AES encryption and disable the vulnerable WPS feature
  • Disable remote management and UPnP to close unnecessary attack vectors
  • Set up a guest network to isolate visitors and IoT devices from your main network
  • Perform quarterly security audits using the scoring table to maintain your protection level

Frequently Asked Questions

How do I know if my router has been hacked?

Signs of a compromised router include unexpected DNS setting changes, unknown devices on your network, slow internet speeds, browser redirects to unfamiliar sites, and new admin accounts you didn't create. Check your router's admin panel regularly to monitor for these changes.

Is it enough to just change the WiFi password?

No. Changing the WiFi password only prevents unauthorized wireless connections. You also need to change the admin password, update firmware, disable risky features like UPnP and WPS, and enable firewall protection for comprehensive security.

Should I hide my WiFi network name (SSID)?

Hiding your SSID provides negligible security benefit. Hidden networks are still detectable with basic scanning tools, and hiding the SSID can cause connection issues with some devices. Focus on strong encryption and passwords instead.

How often should I change my WiFi password?

Change your WiFi password immediately if you suspect unauthorized access. Otherwise, changing it every 6-12 months is reasonable. More importantly, ensure you're using a strong, unique password with WPA3 or WPA2-AES encryption.

Does a router firewall replace antivirus software?

No. A router firewall and antivirus software protect against different threats. The firewall blocks unauthorized incoming connections at the network level, while antivirus software detects and removes malware on individual devices. You need both.

Can my neighbor hack my WiFi?

If you use weak encryption (WEP), have WPS enabled, or use a simple WiFi password, your neighbor could potentially crack into your network. Following this security checklist — especially using WPA3 and disabling WPS — makes unauthorized access extremely difficult.

Router security isn't a set-it-and-forget-it task. Work through this checklist today, then revisit it quarterly to ensure nothing has reverted or new vulnerabilities haven't emerged. For additional guidance on securing your home network, the CISA Secure Our World initiative provides excellent resources and best practices.

About Tommy N.

Tommy is the founder of RouterHax and a network engineer with 10+ years of experience in home and enterprise networking. He specializes in router configuration, WiFi optimization, and network security. When not writing guides, he's testing the latest mesh WiFi systems and helping readers troubleshoot their home networks.

Promotion for FREE Gifts. Moreover, Free Items here. Disable Ad Blocker to get them all.

Once done, hit any button as below