Recently, a lot of friends asked me, telecom to close the route of the incident is true? According to the author's friends in the telecom work, Guangdong Telecom has not received any closed route information. But there is no reason. No matter whether the incident is true or not, at least this is a deterrent to the killing of chicken police monkeys. Therefore, in the Declaration, installation of broadband, if you want to share also have to consider repeatedly.
However, the author believes that if telecommunications really want to close the route to share, the entire network industry will bring extreme negative impact, so in the implementation of telecommunications also have to consider repeatedly. First of all, China's broadband business so far, only the key cities and the level of the county, the city popularization, in some rural areas, poor areas did not really spread out, if the price is not lowered or even hit the words, will be overshadowed by the future development. In case of closure, does the router need to exit the Chinese market? This is worth pondering, such as routers do not have an anti-blocking function, who is willing to buy? If the router has an anti-blocking function, then what about telecom? Of course, this is not what everyone wants to see. The author still very much agree to charge by the way of flowmeter fees, the premise is under the tariff concessions.
Since talking about the sharing of broadband routing, the following author for you to share the use of routers to share broadband methods bar!
The easiest and quickest way to achieve multiple computers sharing a single broadband is to buy a router. Now the market's home broadband routers are a variety of, dazzling, some routing equipment also integrates the modem and print server functions, but the approximate routing function is all change.
First, the Broadband modem (modem) is connected to the router's WAN (WAN) port, and then the computer is connected to the router's LAN (LAN) port. In general, routers have 4 LAN ports, and if there are too many computers, you can access the switch device at the router's LAN port.
When everything is ready, the router is set up.
The default IP that goes into the router management interface is different, and if you have previously been modified, you can restore the initial state of the device by pressing the recovery key. Access to the router management interface is the first task is to modify the password, passwords do not use full digits, preferably with the letter, the number is more secure. After the password has been modified, the device will reboot more than once.
After reboot, we can choose the router's quick configuration function, if you have a router that does not even have this function, throw it away. Fast configuration is simply the choice of broadband access, the basic can be divided into three kinds, the most commonly used ADSL pppop connection, followed by the video cable dynamic IP connection, the most is the fiber-optic access or dedicated fixed IP address access. In contrast, the most common family is the first two choices, the latter for the use of the Enterprise network.
When you set up the broadband, it means that all the machines in the network can be connected to the Internet, but how to better control these computers? And how to prevent ARP spoofing? This requires a further device router. The general router will have an address pool option, we can set the number of computers in the network settings IP segment, such as 192.168.0.2 start, to 192.168.0.8, so that 7 IP can be allowed to use simultaneously. Then, we will each computer's network card MAC address input to the settings, the MAC address binding, so that can effectively prevent IP by other illegal computer intrusion. Moreover, this setting, in the computer can also save a little time, each computer using automatic access to IP can be.
The rest is the setting of the firewall, because everyone's settings and requirements are different, firewall features here is unknown, can be divided into content filtering and keyword shielding, in addition to a number of different brands of additional functions and so on.
Finally, in everyday use, may wish to pay more attention to the log table and the use of State, because this can reflect the use of the network, such as the discovery of an IP occupied a large amount of resources, or through the traffic is too high, this should be careful, he may be in BT or in a certain virus, or even hackers. In short, the network unlimited good, the Internet to be careful! Because now netizens like to be hackers.