-
tp-link: default username and password admin admin
For others, please see the manual.
-
The five static route configuration commands are: iproute, iproutedefault, iprouteadd, iproutedelete, and iprouteshow.
1. iproute command.
The iproute command is the most basic command in static routes, which is used to manually add route information. For example, if we need to send packets from the network to this router, we can use the following order to kill the liquid burner:
2. iproutedefault command.
The iproutedefault command is a command used to set the default route. When the router is unable to match the destination address, it sends the packet to the next-hop device specified by the default route.
For example, if we need to send all unmatched packets to this router, we can use the following command:
3. iprouteadd command.
The iprouteadd command is similar to the iproute command and is used to manually add route information. Its syntax format is as follows: iprouteadddestination-network subnet-maskvianext-hop-ip-address.
For example, if we need to send packets from the network to this router, we can use the following command:
4. iproutedelete command.
The iproutedelete command is used to delete route information. Its syntax format is as follows: iproutedeletedestination-network subnet-mask.
For example, if we need to delete the routing information of the network, we can use the following command:
5. iprouteshow command.
The iprouteshow command is used to view the route table information. Its syntax format is as follows: iprouteshow: The command lists all routing information, including information about the destination network, subnet, mask, segment, tick code, next-hop device, and interface.
For example, if we want to view the current route table, we can run the following command: iprouteshow.
-
1 Basic configuration of the router
The main content of the basic configuration of the router is to configure the router hostname and super user account password.
(1) Configure the hostname of the router
In global configuration mode:
Enter the hostname router name.
2) Configure the superuser password.
Enter the enable secret password.
Enter the enable password 7 password.
(3) Set the system clock
Format: calendar set hh:mm:ss <1 -31> month <1993-2035>
2 Several common commands
(1) Exit command
Whether you exit from port mode, return to global configuration mode, or exit from global configuration mode and return to privileged user mode, you can use the exit command to exit one level at a time, or you can use the end command to directly fall back to privileged user mode.
(2) Save the configuration
When the router configuration is complete and you need to save the configuration, you can run the write command in privileged user mode.
In privileged user mode:
Write memory is saved to the router's NVRAM.
Write Network TFTP is saved to the TFTP server.
(3) Delete the configuration
In privileged user mode, use the write command.
write erase
(4) The basic detection command of the network judgment closure
Router's. The basic detection commands include telnet, ping, trace, and show. You can use the show command to view the configuration file in privileged user mode.
Interface working status and routing table.
buffers and various operating states of the router in order to verify that the router is configured correctly and that the router is working properly.
① telnet
You can remotely log in to one router to another router to check that router. One router can support 5 telnet connections.
② ping
Ping can use the echo protocol to determine the network connectivity. The ping command sends a packet of data to the destination host and waits for a reply from the destination host.
③ trace
The trace command is a tool that queries the direction of data transmission on a network. The same technique used as the ping command is used to track each step of the test packet path. From the trace command traced results, you can understand the working status of each level of router on the path, and the delay time.
show command
The show command can help you get important information about the monitoring router, and you can use the show command to understand the configuration of the router, the working status of the interface, the content of the routing table, the working status of various protocols, the utilization of router resources, and the software and hardware versions of the router.
-
Enter on your browser.
These are the login IP addresses of the current mainstream routers, you can try it yourself. Also, the back of your router will give you the correct login address.
I don't know what you mean by the network cable is the landlord's? It's really hard for you. >>>More
alias associates a command with another name, e.g. if you associate 123 with 456, then you type 456 equals 123 >>>More
There are two situations, first: your computer is poisoned by ARP, as soon as you start the Internet virus, trick other computers into sending data packets to your machine, and your computer throws away these packets, their computer will not be able to get on, use 360 to kill the virus. >>>More
To put it simply, the router is used for automatic dialing, as long as your router has a few jacks, it will work, if there are only 2 jacks (one is ** line, one is network cable) then it is terrible. >>>More
VPN: The Access 101 permit IP defines security federation and key exchange policies. >>>More