Nat configuration for Huawei router 1760

The router of Huawei has different ports in the specified outside and inside,I hope to help you and avoid detours! Quidway # show runNow create configuration...Current configuration!Version 1.66:Enable password, Y @ JM, UXNZL0XaLTV. U4

1.2 LAN

The LAN end is the line that is connected to the enterprise user. Some routers have LAN ports and can be connected to switches. Some network administrators connect the routers to the backbone switches and then to the General switches. Both of the

6.3 System Log Configuration

Network administrators can choose different ways to save system logs: More detailed logs can be easily located during future checks, but there will be a lot of records, which is inconvenient to save; the simplified log can be used to notify the

How to implement QoS filtering in real-time video multicast

1 IntroductionWith the development of multicast technology and the popularization of distributed multimedia applications, many real-time video applications based on IP multicast have emerged on the Internet. However, these applications face a major

RIP Protocol Processing

The operation process of the RIP Protocol is the process in which the router software processes the message input and output. The input and output processes are roughly described as follows: (1) Input Processing: mainly refers to the processing of

The RIP Protocol makes horizontal segmentation valid or invalid.

Generally, a router connected to a broadcast-type IP network and a distance vector routing protocol uses a horizontal partitioning mechanism to avoid loops. Horizontal segmentation prohibits routers outside the information source interface from

Sets inter-group latency using the RIP Protocol.

By default, the software does not delay the packet interval sent during multi-packet RIP update. If a high-end router is sent to a low-end router, the latency between packages may be increased when RIP is updated. The delay is 8-15 milliseconds. To

Introduction to the application of multicast technology (1)

IP multicast technology has been around for a long time, but it is only the beginning of the IP multicast era. We believe that IP multicast is one of the most exciting network technologies that have emerged since the promotion of WWW technology.As

Strengthen the security protection capability of the border router in nine steps

For most enterprise LAN, routers have become one of the most important security devices in use. Generally, most networks have a primary access point. This is the "virtual border router" that is usually used with a dedicated firewall ". After proper

Multicast solution in IRF Network (1)

With the rapid development of information technology, the overwhelming network has gradually become an indispensable part of people's life and work, in particular, modern young people put more learning and entertainment time into computer networks,

Distance Vector Routing Protocol (1)

Routing AlgorithmAmong all the dynamic routing protocols, the simplest is the distance vector routing protocol D-V ). It uses the simplest Distance Vector Distance-Vector (D-V) routing algorithm. Algorithm Model 1 is shown in.  Figure 1 Distance

How to Use Static Routing for Network Access Control (1)

When a Host application needs to send data packets to different network destinations, the router receives data information from an interface. The Network Layer checks this packet to determine the expected network to be sent. Then, the router checks

Familiar with cisco rommon for vro maintenance (1)

The IOS file in Router flash is upgraded or restored after being damaged. This situation is serious. It often occurs when the router system fails to work due to upgrade of the IOS version of the router or other hardware and software faults,

The router introduction, working method, and Protocol

Routing Principle When one host in the IP subnet sends an IP group to another host in the same IP subnet, it will directly send the IP Group to the network, and the other party will receive it. To send the IP address to a host on the internet, you

How to Set security for tengda Wireless Router

Tengda Wireless Router Security Settings-client Filter You can use the client filter function to control computer access to certain ports on the Internet in the LAN. Filter mode: You can select "prohibit only" or "allow only ". Select: If you have

Router connection instance resolution

Router Connection Device Using ADSL to access the Internet, there are two soho routers connected to each other, both of which are 4, and have been successful at, but currently there are 5, that is to say, the first line after the router comes out

Graphic tutorial on basic router settings (1)

Router settings-broadband access method Before configuring a vro, you need to understand your own broadband access methods. The simplest way is to consult an Internet service provider, or you can quickly query the Connection Methods on the network.

How to Set Up A vro in win7

How to Set vrouters in win7The problem is that netizens are more concerned about it. Because there are more and more people applying the win7 system, the problem of surfing the Internet also becomes complicated. Next we will explain the problem

Router password cracking method

Vro password crackingTwoVroFor two routes, we have an ADSL cat with a route and a TP-LInk router. If your ADSL does not have a route, find another one, the hardware requirements are as follows. Vro password cracking process Step 1: ADSL Broadband

Router speed limit method: How does a Router speed limit?

Router speed limit questions When you and your friends use oneVroWhen surfing the internet, you may not be able to play a game when watching a movie. Is it very depressing? Then you know the router Speed Limit Method andHow does a vro Speed

Total Pages: 64722 1 .... 26867 26868 26869 26870 26871 .... 64722 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.