-
As if you're not doing something good! It's remote control or something!
Enter the router port mapping,Use someone else's external network to do the port**,It's okay,No, there are a lot of animation tutorials on the Internet.,Just look at it.。 Very simple.
-
It's all blocked, and it's impossible to set it up.
-
Oh,It's very simple,There should be a MAC address bound on your router,You can bind the IP address of the three of you to the MAC,Set it so that only the bound can access the Internet through the router,The rest can't be connected to the Internet even if it's plugged into the network cable.,And if you don't want anyone to set it up in the firewall inside the router.,Set his IP and MAC address to prohibit him from passing.,That's it.。 Also, your P2P is spoofed through ARP addresses, and if anyone has an ARP firewall, P2P will not work. Look at the inside of the router.
The initial username and password of the router are admin, and the address is generally or, and after the setting is completed, the router is set up with a complex password of more than 7 letters and numbers, so that it is very safe. I set it that way a lot. Personal experience.
I'll give you a screenshot for you to see, it's in the security settings.
-
The router is simple if it is there for you.
You set the number of connections to 80
They're stupid. Totally stupid x. You don't have to modify anything.
-
The outdated one will be discovered sooner or later, with the latest skiller
-
You now have two network egresses, a router, and two switches.
It's about the same as an Internet café?
The solution, of course, is also the solution of the Internet café.
If your router supports PBR is the best, you can make full use of network resources, if not, you can only choose a good line to surf the Internet.
1. If your router is relatively high-end and supports policy routing, you can connect the two exit lines to the same switch (use port), and then connect the third port to the router. The 4th port is connected to another switch, and the other ports can be connected to a PC. Let's talk about the configuration:
As long as it is a router, configure three IP addresses on the WAN port, two of which are provided by the exporter, and the other is set to . Then configure PBR (contact me for details).
2. If your router is relatively simple, there are a lot of information on the Internet that you can refer to, so I won't talk about it.
-
Your switch should be a low-end switch, the route should be able to set dial-up, and the possibility of dividing the VLAN is relatively small, so: the WAN port of the route is connected to the external network, and the line can be connected to the modem or something else, depending on your situation! Then, the LAN port is connected to two switches respectively, which will form two broadcast domains and improve resource utilization, because the low-end switch does not support STP (a LAN protocol, which swells to cut off the LAN loop), so the two switches cannot be directly connected!
Finally, 6 of the 12 computers are connected to two switches, which creates a relatively small broadcast, so this is the best way to make the most of the resources.
If you are a high-end switch, then don't worry, the average user, there are few relatively high-end switches...
-
Try my method First build the LAN with a network cable to connect the two switches, so that there are 16 ports that can be plugged into the network cable, connect the computer to pay attention to the IP to be set to the right and then set up the external network (can access the Internet) among them Find a machine as the host and then install a network card, find a separate cable to connect it to one of the switches That's it, but only one computer can go to the Internet I don't know if the other can be on it It should be possible But you have to set it Oh I know a little bit If it's wrong, please forgive me!
-
An external network connection router.
The router is connected to two switches.
The switch is connected to the computer.
The other is a leased line.
For privileged use.
-
Dial in with the router.
Then the two switches are cascaded.
Connect 2 computers directly to the LAN port on the router.
The remaining two are connected to the WAN ports of the switch.
Other computers are connected to other ports of the switch.
-
Extranet Cat Route 1 Switch 6
Route 1--- switch 6
-
First, attach the configuration diagram of the computer.
Subnet Mask: Subnet Mask:
Default Gateway: Default Gateway:
Details Details.
Subnet Mask: Subnet Mask:
Default Gateway: Default Gateway:
DHCP Server:
dns server: dns server:
DNS Server (Standby): DNS Server (Standby): None.
wins server: none wins server: none.
-
As long as the LAN is divided into 2 subnets, one can access the Internet and the other can only access the internal.
-
When it's time for class, just cut off the internet and that's it, and that's how it is in our school.
-
For example, configure the internal IP address as follows: --ip: subnet.
The public IP address is configured as follows: --IP: Subnet.
The modem configuration is as follows--- ip: Subnet.
You also need to add a super network management and other software that can be tied to the mac, and you can also restrict it on the server.
-
Wrong gateway setup on student machine Setting DNS error.
Simple but troublesome.
The easiest P2P terminator is him, but it's easy to crack him, and some can't use it, it's very simple, and I don't know if I'm looking for it.
This one that our school uses only needs to be maintained after the trouble.
The main thing is that the rules are troublesome.
isa(internet security acceleration)
The current versions of ISA are ISA2000, ISA2004, ISA2006, ISA2008, and is a well-known router-level network firewall produced by Microsoft. Its main functions are:
1. Firewall
A firewall can filter traffic in and out of the internal network and can be used to control communication between the internal network and the Internet to increase the security of the network. It can also be used to securely publish internal servers so that customers and partners can share internal network resources, such as email servers, etc. In addition to the general packet filtering capabilities, the ISA also provides a number of application filters that can filter packets against the application.
2. Virtual Private Network (VPN).
A virtual private network (VPN) allows a remote user to establish a secure channel over the Internet between a remote user and a local area network (LAN), or between two LANs.
3. Web cache
By saving the web pages frequently visited by users to the hard disk and memory of the ISA server, it not only allows users to access web pages faster, but also improves the utilization of network resources and saves network bandwidth.
-
It's okay to go into the router to limit it.
-
This is the external network IP, that is, the operator's server IP, if your computer is directly connected to the cat dial-up Internet, use the IP assigned to you by the operator, if the router used is the intranet IP, the IP address is assigned to you by the router. Generally, your IP is detected by software, of course, the IP address of your computer is not like this. You can enter cmd in the box to start --- running, enter "ipconfig -all" in the dos prompt and press enter, you can see the actual IP assigned to you, if it is the intranet, that is, your network cable is connected from the router or switch, or the wireless router is connected.
That's all intranet, and the IP address is assigned by the router. The above IP you mentioned is generally detected by software, which is the network IP used by the operator, or the rented IP, like I use Tietong in Shaoxing, Zhejiang, but the IP address detected by software is Shanxi Unicom. Of course, your actual IP address is the IP assigned to you by the operator, or the IP assigned to you by the router, not the IP detected by the software.
-
Intranets generally start with 192. The extranet is not possible.
-
There is no way to connect if the network is not connected, and the network can be connected only when the network is connected, and you can add an isolation gate to connect the internal and external networks.
-
Distributed programs should not directly use the client to access the server's database.
Generally, it is like this: the client connects to the hostingservice and connects to the database to do the corresponding operation.
-
This shouldn't have much to do with the program.
The main thing is the NAT protocol router setup.
Once the router is set up, it can be accessed.
-
The port number of the private server
-
Connect the two LANs with a switch, the switch connects to the router, and then dial-up shares the Internet. But the gateway of the other computer must be dialing up the IP address of this computer, because the other computer is through the network on this computer.
-
Add a router, connect the two LANs to the router with one network cable each, and then add two static routes.
-
What problem does the landlord want to solve, say more details to help.
-
Working Group. That's it.
-
Each of the two LANs has a static route, and then a route is used to connect the two static routes.
Hello, if your scanner has the problem you described, 1. It is recommended that you first confirm that the scanner module lock is turned on and restart your scanner; >>>More
No, Liu Fangfei debuted very early, and together with Shen Bing, she also stood out in a certain selection competition, and the champion who challenged the host this year was Zhang Lei.
Scold. The switch works in much the same way as the wire collector you are talking about. >>>More
After exercising regularly, it will make your muscles tense and make you feel less flexible than before, which is a common thing in the gym, and it is normal for you to make a noise in your wrist, so you don't have to pay attention to it, please keep exercising.
Refer to Facing the Sea Spring Blossoms.
The new year is coming, in the last month of farewell to 2005, recalling this year's work of a lot of hard and sweet, how many memories arise spontaneously, is gratifying, is intoxicated, is the bitterness behind the joy of success, or the summary after the dismal failure, no matter what, everyone is welcome to express it together here, for our hard work in 2005, but also for our hope in 2006! >>>More