Linksys equipment (Linksys signal is very strong) occupied Channel6, as long as he turned on the impact of the quality of our connection, the original ping packet loss rate from 1% Hu Shen to 50%. Then will transmit the signal frequency band adjusts to Channel1, who knows discovers two channel1 equipment in nearby, turns CHANNEL11 unexpectedly has 5 radio. How to solve it?
The above example is the author
By default, the SSID (wireless network Name) is configured for wireless network settings, and many people use default names such as D-link, Linksys, dd-wrt, and even if they are modified, the SSID is made up of letters and numbers.
However, the SSID, which consists of letters and numbers, can be scanned into the corresponding wireless network and successfully invaded, even if no "broadcast" is set up by the intruder, through BT3,BT4, network ants, et
when more than a Linksys equipment (Linksys signal is very strong) occupied Channel6, as long as he turned on the impact of the quality of our connection, the original ping packet loss rate from 1% Hu Shen to 50%. Then will transmit the signal frequency band adjusts to Channel1, who knows discovers two channel1 equipment in nearby, turns CHANNEL11 unexpectedly has 5 radio. How to solve it?
The above examp
1. Mixed wireless networks often fall off the line
Failure phenomenon
Use the Linksys WPC54G network card and Linksys WRT54G AP to build a wireless LAN that uses IEEE 802.11G protocols and a few 802.11B network adapters. The line is often dropped when using wrt54g for 54mb/s connections.
Fault analysis
In theory, the IEEE 802.11g protocol is backward-compatible with the 802.11B protocol, and devices usi
Regarding the wireless internet is not smooth, the wireless network connection is not good question, this article has summed up many for everybody, and has provided the concrete breakdown description, the solution and so on. Hope that through this article, can make everyone convenient, simple to solve their own computer wireless fault. Wireless network connection is not 1: Mixed wireless networks often fall off the line fault phenomenon: Using Linksys
serious problems. For example, if the WEP configuration is incorrect, the wireless client will not be able to obtain an IP address from the DHCP server on the wireless network (even if the wireless access point has no DHCP capabilities). If the wireless client uses a static IP address, it will not be able to ping the IP address of the wireless access point, which is often mistaken for the network is not connected.
The basic technique for determining whether a WEP configuration error or a netwo
1. Mixed wireless networks often fall off the line
Failure phenomenon
Use the Linksys WPC54G network card and Linksys WRT54G AP to build a wireless LAN that uses IEEE 802.11G protocols and a few 802.11B network adapters. The line is often dropped when using wrt54g for 54mb/s connections.
Fault analysis
In theory, the IEEE 802.11g protocol is backward-compatible with the 802.11B protocol, and devices usi
can cover, and the manufacturer has the default SSID settings for the devices it produces. For example, the SSID of a Linksys device is usually "Linksys." Admittedly, knowing the SSID itself does not allow your neighbors to break into your wireless network, but knowing the SSID can easily lead to other unintended consequences.
More importantly, if someone discovers the default SSID, it's easy to be the ta
your network will be assigned a unique key to transform the encrypted data. Since WPA uses dynamic key cryptography, the key is constantly changing, making it almost impossible to invade your wireless network. If your device supports encryption technology that is considered one of the highest levels of security for your wireless network, we will recommend WPA to you.
Why is WPA security important? If WPA is not configured in your wireless network, you are open to having someone intercept your
Describes how to set up a home wireless local area network articles, you can search out a lot of online, these articles look very good, not only the details of the process described with the relevant pictures. Because of professional reasons, although I used to pay attention to the wireless router configuration in this respect, but because there is no actual operation and flow on the surface, the last few days can not resist the temptation to do a set of Netgear (the United States Network) of th
addresses, subnet masks, gateways, and DNS servers on each computer. In addition, in the address pool start address and address pool end address, you can flexibly control the start address and end address when the DHCP server automatically assigns an IP address, let the Intranet host get the IP address between the two addresses.In addition, the built-in DHCP servers of the Broadband Router also have the static address allocation function. You can reserve static IP addresses for computers with s
Directly dragging the mouse topic to the theme window will result in incomplete display of the mouse chart (for example, you can only display the custom Mouse icon on the webpage). There are two ways to completely display the chart. 1. decompress the downloaded icon file, replace the cursors folder and index. theme file with the same files and folders under/usr/share/icons/DMZ-White, and restart. Note: This method replaces the default system icon with
Client list: You can view all active users of the Cisco wireless router configuration through the client list function.Static Address Allocation: Through the static address allocation function, you can specify an IP address for the PC on the vro side and an IP address based on the MAC address of the NIC on the PC side.
4. Set forwarding rule options
When accessing the Internet through a router, all clients can only use private addresses, which limits some Internet applications. Forwarding rul
", click "Network Service"-"details", and then select the "General plug-and-play" check box. After the restart, WinXP prompts you to find the new hardware. after entering the network neighbor, you will find the vro, indicating that the UPnP function is enabled. In addition, the UPnP function of the BT download software must be enabled.
BitComet supports UPnP automatic port ing and automatically configures the gateway port ing on the local machine. (This function is enabled by default) The softwa
, a conflict may occur.
2. Special Applications with advanced functions of home Routers
Advanced functions of home routers. Some applications require multiple connections, such as Internet games, video conferences, and network phones. Because of the existence of firewalls, these programs cannot work under simple NAT routers. However, special applications allow some such applications to work under the NAT router. When an application initiates a connection to the trigger port, all corresponding op
takes TP-LINKWR641G wireless router as an example to introduce the functions and settings of each option in forwarding rules.
Virtual Server: the virtual server defines the ing between the WAN service port and the lan network server. All accesses to the WAN service port will be relocated to the LAN network server specified by the IP address. For example, we need to map our Internet FTP service to a machine with the IP address 192.168.1.246.
Virtual Server Settings
company information should be no problem, unless it is a new computer.
1-2. I have learned a certain amount of personnel information. During this period, you should write down the important data such as the account and password you have mastered and use them for a certain amount of time. Therefore, before you penetrate into the system, you may wish to create a notebook to save important information. Writing a notebook won't waste much time.
Next, we should have a certain understanding of this n
We will discuss the practices of network security equipment, and we should arrange the location of the equipment in actual work. The advantages of such deployment are extremely inadequate.
1. Basic router filter practices
650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0T412G49-0.png "/>
Disadvantages:
1. The service area is in the Intranet. Once the server is broken, it will directly attack the Intranet without going through the filter of the rou
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.