Now almost every family has a wireless network, do not know if you have ever encountered such a situation? password often changed but also always be near the internet people rub net, next door neighbor to ask WiFi password don't say it feel embarrassed, said it is afraid to affect their own speed.
Now it's just a trick to get rid of the hidden WiFi signal (SSID Broadcast) and no devices will be able to search your wireless network. So as to avoid being asked by others to passwor
A. Test topology:
Reference Links:
A.configuring VRF tables-Cisco MPLS Tutorial
Http://www.doc88.com/p-085712708378.html
B. How to create multiple routing tables on a single router using VRF
Http://net.zdnet.com.cn/files/all-2081627.htm
C. Configuring Vrf-aware IPsec VPN on a Cisco router
Http://networking.ctocio.com.cn/76/12336576.shtml
Two. Basic configuration:
A.SW1:
① Create VLAN
VLAN dat
I don't know where you are. Anyway, I have a place called the ISP bandwidth service provider, Dr. Peng ... As the original credulous landlord said the legendary telecommunications plus the Great Wall Broadband dual service, the last to pull the landlord's net. As a result, I have never encountered my own IP address is telecommunications. Dr. Peng has always been the bar called the Great Wall broadband. I'm going to go oh ~ ~Always hijack my DNS, and, the landlord is using a garbage software
1, everyone first look at a global map, b for the second route, we want to reach the target of the first route does not need to change any settings, only need to change the second route B
2, separate route B to the computer to set up, Bwan mouth first, only LAN access to the computer
3, the browser to open the management interface of the router, to change the B routed LAN port IP address
4, turn off the B routing
360 Routing Area P1 has a feature that adjusts the signal strength
1, first, the computer and the router to connect (wired wireless Can)
2, open the browser, in the browser address input 192.168.0.1, enter
3, enter the router's password, enter the route of the management system
4, click on the function expansion, click Signal Adjustment
5, here can have 3 files can be adjusted, select the appropriate
With the rapid development of wireless network, wireless router is an indispensable part of our life. Many friends have a cable router at home, want to connect to a wireless router, so as to achieve WiFi access, it's convenient, fast, well received by friends like. I am using the jhr-n835r wireless router, then the fol
Article title: Custom open-source vro launched by US network parts. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Netgear joined a network device manufacturer camp and announced the launch of a highly customized open-source wireless router.
The WGR614L Wireless G
are not good enough, so up to 5dB. The author in the market turn on the time found Netcore (Lei branch) a new one without line by, this route I tried, Performance is very good. It is worth mentioning is that its antenna to do very well, is the standard 5Db antenna size, excellent workmanship.
Wireless Router selection standard 4, product brand
Wireless routers, including the ability to share broadband Internet access and wireless client access capa
the sharing of data is slower than the original.
4, after sharing the local connection becomes a gateway. Other hosts want to surf the Internet are through this machine. As long as the other computer IP to the same network segment, IP not the same, the gateway to fill the top of the host IP can be online. Because the computer has become a network switch.
Green Tea Small series of reminders: Other machine lines connected to the switch interface to the IP address of the local connection, with w
will be pleasantly surprised to find that our development board is already moving, and the running light program runs like this. The specific principle of our future analysis, a small demo demo to add a little interest. If the following information is displayed, you will be pleasantly surprised to find that our development board is already moving, and the running light program runs like this. The specific principle of our future analysis, a small demo demo to add a little interest. It is import
Careful router, national Internet emergency center issued an alert
On October 18, March 28, the national Internet emergency response center published the "Overview of Internet network security situation in October 2013", showing:
Vro products of multiple vendors, such as D-LINK, Cisco, Linksys, Netgear, and Tenda, have backdoors. Hackers can directly control the vro and initiate DNS hijacking, information
How does the mercury router back up? Sometimes, in order to prevent the broadband account and password forget, we usually through the backup router configuration file, easy to restore later. For example, during the spring Festival, small set will work to the wireless router back home temporary use, to the home after the need to reconfigure the Internet account, i
Wireless routers have become more and more popular, most laptops or only mobile phones, want to be able to directly use WiFi connection to the Internet, convenient, provincial traffic. However, many just contact the wireless router's children's shoes, do not know how to use the wireless router.
Although there are instructions, but some of the instructions are really brief, need to study a period of time to really understand how to use the wireless
With the popularity of smartphones, wireless routers are already in the tens of thousands of households, while smartphones, tablets and laptops and other wireless devices Wi-Fi internet is mainly provided by wireless router wireless network. However, sometimes there will be some network problems, resulting in a computer or smart phone device this time we can usually use the router led to determine the statu
First, you need to prepare two routers, one of which is the wireless router. Here we use the Tp-link.
Methods Show:
Prepare before setting: If you have previously changed the router's settings, it is best to revert to the router's "factory settings" first.
First, you need to prepare two routers, one of which is the wireless router. Here we use the Tp-link.
1, after restoring the wireless
http://wangye.org/blog/archives/845/Recently began to toss up Raspberry Pi came, because somewhere in the internet need Ruijie dialing, so I would like to be able to let my Raspberry Pi do, of course, first of all to transform it into a router, the default comes with the network as a WAN port, we also lack a network port, Wood has a way, had to occupy a USB port, Connected to a USB card, the network of USB to RJ45 network cable adapter Less, the price
The primary wireless device consists of two types: a stand-alone AP and a wireless router that integrates wireless APs and broadband access routers.
AP is the abbreviation of Wireless access Bridge (access point), is the traditional cable local area network and wireless local area network or wireless local area network and wireless local area network between the bridge, it is in the wireless LAN continuously receive and transmit data Any PC equipped
In the process of using routers, you often need to login to the admin interface. After you enter the admin address in the browser address bar, the admin page cannot be displayed, or the page cannot be displayed after you enter the admin password, as shown below:
If you are unable to log in to the admin interface and may be related to factors such as routers, lines, browsers, or computers, please follow these instructions for detailed troubleshooting.
Solutions
One
1.router (config) #router rip start RIP process
2.router (conifg-router) #network 172.17.0.0 The primary network that specifies the RIP protocol
3.router (config-router) #passive-interface F0/1 to configure F0/1 as passive
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.