enterprise)
The first routing with dial-up Internet settings has been said before, and now mainly said that the second router settings.
The first way: LAN port (the first router) to connect LAN port (the second router), WLAN port is not set up, turn off the DHCP service (wireless connection can be used normally). To facilitate the management of IP that can set LAN port IP as the first route and not within its network pool of DHCP, such as the first route lanip:192.168.1.1, the child mask: 255
. Because generally speaking, the smaller the office size, the fewer users, the lower the risk faced.
As a result, simple packet-filtering firewalls are sufficient for small offices, such as those that are randomly brought by many DSL or cable routers. These include broadband routers from companies such as D-link, 3Com, Netgear and Linksys. In addition, WatchGuard Firebox Soho, Symantec Firewall 100, global technology company Gnat, NetScreen and Sonic
infrastructure does not need to bury, but directly in the building exterior wall or other empty place arranges the equipment. Wireless LAN is mainly composed of wireless hub and wireless network card and other devices.
Netgear Router looks good for home
You can use the wireless card extra
Wireless router in the transmission mode in line with 802.11b/g, in the actual use of the data from the cable cat will be through such equipment for other co
role. We usually say that the antenna gain, the gain of the unit of measurement for DB, the greater the gain, the better the signal transceiver. At the same time, the antenna gain size is not only related to the size of the antenna, but also has a great relationship with the internal materials and workmanship of the antenna. At present, the products in the market are mainly 2dB and 5dB products, but some products in the antenna claimed to be 5dB products, but the actual workmanship and material
disconnected for a long time. But this router is not good quality and repair is very high. One of my 1-month hang up, repair back 5 days and hung up. Now continue to rework. My RP is so bad ^_^!
4. Netgear NET piece WGR614
It's a pity I didn't use it to talk. (who has to be able to test under)
It is also known as the Chinese menu. The antenna can not be removed (can't change the high-power antenna).
5. D-link Di-624+a
Have a friend in use, asked
Width AP51BT
This product is a wireless secure access point (AP) product that complies with the IEEE 802.11B specification. (See Figure 1)
Figure 1
AP51BT supports industrial-level wireless safety standards, i.e. 802.1X certification and authorization. AP51BT wireless APs provide wireless data to Ethernet data conversion, and as a bridge between wireless customers, the use of multiple AP51BT can achieve a large range of seamless coverage. The connection rate is up to 11Mbps and can be adap
always forget to open it, LED does not normally light up.
Section II: View the wireless router basic information
Now all we have to do is look at the default IP address, username, and password for the wireless router.
View the wireless router basic information
IP address, user name, password these basic information is generally written in the wireless router at the bottom of the nameplate, the default IP address is generally 192.168 1.1, the default username and password are g
Services, network connection Management Services, HTTP Transport encryption services, are back on.
22 computer software started successfully, the phone has been getting IP
WIN7 can be a different encryption method to try.
23-compatible wireless network card
Atheros ar5xxx/ar9xxx cards; Driver version 8.0.0.238;
Broadcom 4310-series (in many Dell laptops);
Broadcom 4321ag/4322ag/43224ag WLAN Adapter; Driver version 5.60.18.8 (here);
D-link airplus G dwl-g510 Wireless PCI adapter;driver ve
Atheros ar5xxx/ar9xxx cards; Driver version 8.0.0.238;
Broadcom 4310-series (in many Dell laptops);
Broadcom 4321ag/4322ag/43224ag WLAN Adapter; Driver version 5.60.18.8 (here);
D-link airplus G dwl-g510 Wireless PCI adapter;driver version 3.0.1.0;
D-link DWA-140 rangebooster N USB adapter;driver version 3.0.3.0;
Dell 1510 Wireless N adapter; Broadcom version;driver 5.60.18.8;
Intel 5100/5300; WiFi Link 1000 BGN; Driver version 13.0.0.107;
Linksys dual-band wireless-n USB network Adapter
key. For ordinary users, it is not necessary to understand the concept of SSID and security key to achieve a secure connection, and the user's security key can not be cracked by outsiders, because it is randomly generated, and most importantly, users do not have to memorize lengthy wireless encryption password, avoid the trouble of forgetting passwords.
Insufficient
As described in the previous article, WPS is an optional certification project launched by the Alliance of WiFi organizations, s
. Because generally speaking, the smaller the office size, the fewer users, the lower the risk faced.
As a result, simple packet-filtering firewalls are sufficient for small offices, such as those that are randomly brought by many DSL or cable routers. These include broadband routers from companies such as D-link, 3Com, Netgear and Linksys. In addition, WatchGuard Firebox Soho, Symantec Firewall 100, global technology company Gnat, NetScreen and Sonic
density coverage, so that different data and video and audio files can be transmitted on the whole network.Provides M-bandwidthAP devices in this program use the WG602 of the American Mesh, which operates in the frequency band of the 2.4 GHZ and can be covered within the diameter m by the rate of Mbps in the room. The M bandwidth enables the user not only to transmit the ordinary data packet, also may transmit the video and the audio and so on multimedia file, provides the foundation for the wi
). However, Viehbock says, most users can't tolerate such a long wait time. A typical identification takes only 1-3 seconds. A clever hacker will also take some steps to reduce this time.
Suppose an identification process takes 1.5 seconds. With a maximum of 11,000 identification, the hacker may gain access for approximately 4.5 hours or less (perhaps nearly 2 hours). In the coffee shop or on many other occasions, two hours will certainly not attract the attention of others. As its name implies
. In half, passwords that are less than 8 characters are considered to be easily cracked. can use 10, 12 characters as the password, 16 of course better. It's safer to keep your password as long as possible without being too long and difficult to type.
2, do the Border protection
Not all security issues occur on the system desktop. Using an external firewall/router to help protect your computer is a good idea, even if you have only one computer.
If you're looking at the low end, you can buy
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.