How to configure LAN sharing and access

Source: Internet
Author: User
Tags net command

Windows operating system LAN cannot access each other solution

Windows XP is installed on the LAN and cannot be accessed from Windows 98. Windows XP and Windows XP cannot communicate with each other. When the workstation accesses the server, the server name can be seen in the workstation's "Network Neighbor", but no shared content can be seen after clicking it, or the system prompts that no network path or access permission is found, summarized as follows:
When XP is used for the first time, you need to create a new network connection in the properties of the network neighbors for the Network Installation Wizard.

1. Check physical connections between computers

The NIC is the basic device for network connection. In the desktop computer, the indicator light behind each Nic should be on, which indicates that the connection is normal. If the link is not on, check that the hub or switch is on, and the indicator light for each client connection is on. This indicates that the link is normal. Next, check whether the crystal head of the network cable is in good contact.

2. Make sure that TCP/IP is installed on all computers and works properly.

TCP/IP is installed by default in Windows XP. However, if a network problem occurs, it is not easy to reinstall TCP/IP after uninstalling it: click the Internet Protocol (TCP/IP) item in the following project list on the "local connection" attribute. You will find that the unmount button is unavailable (disabled ).

This is because the Transport Control Protocol/Internet Protocol (TCP/IP) Stack is a core component of Microsoft XP/2003 and cannot be deleted. In this case, if you need to reinstall TCP/IP to restore the TCP/IP stack to its original state. You can use the netshell utility to reset the TCP/IP stack and restore it to the status when the operating system is installed for the first time. Method: Enter the following command at the command prompt, and press Enter: netsh int IP reset C:/empty log file and complete path. The result of running this command is the same as that of deleting and re-installing the TCP/IP protocol.

3. Run the ping command to test the connection between the two computers in the network:

Ping the IP addresses of other computers. In the command prompt, type Ping X. x. x. X (where X. x. x. X is the IP address of another computer), and then press Enter. You can see several replies from another computer, such:

Reply from x. x: bytes = 32 time <1 ms TTL = 128

If you do not see these answers or see "request timed out", the local computer may have a problem. If the ping command is successfully executed, you are sure that the computer can be correctly connected. You can skip the next step. If you do not see these answers or see "request timed out", the local computer may have a problem. Ping the local IP address. If "request timed out" is displayed, the local computer may be faulty.

4. Run the ping command to test whether the name resolution in the network is normal.

Ping computername, where computername is the name of the remote computer. Use the ping command to test the computer connection. To determine the computer name, enter systeminfo in the command prompt. Alternatively, right-click my computer-properties on the desktop and click the computer name tab. If you see a successful response to this command, you have a basic connection and name resolution between computers. Name resolution is closely related to NetBIOS. refer to the following steps.

5. Correctly install network components

First, right-click "Network Neighbor"-"properties" and select the NIC to be shared. Set the IP address to the same CIDR Block of the LAN. For example, 192.168.1.x. Check whether NetBIOS is enabled in the Advanced properties of TCP/IP.

In a network system built using winnt4.0, the unique identifier of each host is its NetBIOS name, the system uses WINS service, information broadcast mode, and lmhost file to resolve NetBIOS names to corresponding IP addresses for information communication.

In the internal network system (also known as the LAN), it is very convenient and fast to use NetBIOS name for information communication. However, the unique identifier of a host over the Internet is its FQDN-format domain name (163.com). On the internet, DNS standards are used to resolve a domain name to a corresponding IP address, win2k supports dynamic dns. machines running the Active Directory Service can dynamically update the DNS table.

The WINS service is no longer needed in the Win2k network, but Win2k still supports wins, which is due to backward compatibility. Currently, most networks are hybrid networks, including systems such as WIN98 and WINXP and Win2k. Therefore, NetBIOS must be bound to the TCP/IP protocol to resolve the computer name.

Check whether the "file and print service" component is selected. If it is deselected, "Browse service" is not bound to the NetBIOS interface. A Windows-based computer that becomes a backup browser and does not enable "file and print sharing" cannot share the browsing list with the client. Any computer that will be included in the browsing list must also enable "file and print sharing ".

6. Enable print and file sharing

In the network neighbor and Local Connection Properties, You can see whether the printer and file sharing are installed. Verify: if you cannot see your machine in the network neighbor, it means you have not installed a printer to share files.

7. Start the "Computer Browser" Service

The Computer Browser Service maintains a computer update list on the network and provides this list to the computer designated as the browser. If the service is stopped, the list is neither updated nor maintained.

Win2k/XP: Make sure that the computer browsing service starts properly. Choose Computer Management> services and applications> services. In the right window, make sure that "Computer Browser" is not stopped or disabled.

8. Run the network ID wizard

Select "properties" for my computer, click the "computer name" tab, and click the "Network ID" button to start the "Network ID wizard": click "Next ", select "this machine is part of a commercial network and connect it to another computer that is working", click "Next", select "company uses a network without a domain", and click "Next, enter the Working Group Name of your LAN, click "Next", and then click "finish.

9. Install netbeui protocol in Win2k

In Win2k, The netbeui protocol is an efficient protocol used in the LAN. Therefore, you must install this Protocol:

Network neighbors-> properties-> Local Connection-> properties-> Installation ------> protocol -------> netbeui Protocol

10. Use the Guest account

Windows XP's guest account allows others to use your computer, but does not allow them to access specific files or install software. Guest accounts are used for all network access to Windows XP Professional computers on Windows XP Home Edition computers or working groups. Use Net user guest to ensure that a guest account is set for network access. If the account is active, a line similar to the following will appear in the Command output: account active yes; if the account is not active, use the following command to grant the Guest account network access:

Net user guest/active: Yes

Choose Control Panel> User Account or choose management tools> Computer Management> local users and groups to open the Guest account.

11. Allow the guest (guest) account to access from the network

Enter gpedit. MSC, pop up the Group Policy Manager, in 'computer configuration-Windows Settings-local policy-user rights assignment, the policy "Deny access to this computer from the network" prevents access to this computer from the network. If there is a guest account, the solution is to delete the Guest account in the denied access.

12. Firewall

Make sure that the firewall that comes with WINXP is not enabled. Enable local connection properties-> advanced, and disable the Internet Connection Firewall. If a third-party firewall product is used, see its user manual to ensure that the firewall does not prohibit communications on the following ports: UDP-137, UDP-138, TCP-139, TCP-445 (Win2k and later operating systems only ).

The latest SP2 patch of Windows XP has greatly improved the ICF and has more powerful functions. The ICF has its own settings. After SP2 is installed, the ICF firewall is enabled by default, no external active connections are allowed. Even local applications need to make settings in the license list to access the network.

However, the firewall blocks normal network browsing service communication, and the result is that someone else cannot see your computer in the network neighbors. Is there any perfect way to allow browsing services while enabling the firewall.

If ICF is enabled, open the attribute. In the service column, select Add. The add service dialog box contains four edit boxes, at the top of which is the description service name, which is easy to remember, from top to bottom, the second is the IP address or name of the Application Service. enter 127.0.0.1 to indicate the local machine.

The following is the internal and external port number. The TCP/UDP next to it indicates whether the port is a UDP connection or a TCP connection.

Enter 3 services in the following table.

Name protocol port

NetBIOS Name Service UDP 137

NetBIOS datemediservice UDP 138

NetBIOS session service tcp 139

137/udp -- NetBIOS name server. The NetBIOS Name Server (NBNS) protocol is part of the NetBIOS (netbt) protocol family on TCP/IP, it provides the Host Name and Address ing method on the network accessed Based on NetBIOS name.

138/udp -- NetBIOS datagram. NetBIOS datagram is part of the NetBIOS (netbt) protocol family on TCP/IP. It is used for network login and browsing.

139/tcp -- NetBIOS session service. NetBIOS session service is part of the NetBIOS (netbt) protocol family on TCP/IP. It is used for Server Message Block (SMB), file sharing, and printing.

13. Check that the RPC, Plug and Play services have been started, check the permissions of the corresponding system folder, and re-register the following dynamic link library

Regsvr32 netshell. dll

Regsvr32 netmask X. dll

Regsvr32 netman. dll

14. Set the account and password

As the operating system of the WINNT kernel always tries to use the current local user name and password to access the remote computer first, which may cause access failure, add the user password here.

15. Access to "network computers" in multiple ways"

For example, to open a computer named "killer" on the network, its IP address is 192.168.1.8. If you do not know the IP address of another computer, you can use "Ping computer name" to obtain its IP address.

Use a computer name to access the services provided by NetBIOS. Click the Start Menu, click Run, enter/killer in the address bar, and click OK ".

Access with an IP address, enter "/192.168.1.8" in the address input column, and click "OK ".

It takes time to update the computer list by searching for a computer. Searching for a computer can speed up updating the list. Right-click "search computer" in "Network Neighbor", enter the computer name, and click "Search now" to view the computer you want to access. Double-click the computer name on the right to open it.

Access by ing the drive, enter the DOS mode, enter "net view/killer", and press enter to view the shared folders on the computer killer, such as D. Enter net use Z:/killer/d to map the folder D shared by the computer's IBM-ZB to H: disk and type "Z:" at the command prompt :". You will find that you have connected to the killer computer.

1. added the NetBIOS protocol to both hosts,
2. enable two guest accounts
3. Enable shared folder,
4. Start -- enter // enter the IP address of the other party and press Enter .. OK,
There is another way to save Step 3:
Start -- enter // the IP address of the other Party/the drive letter you want to access $ press Enter.
Example: // 192.168.1.3/C $
Then, a "connect to ***" window will pop up. You can enter the username (Default Administrator) and password of the sub-host (not blank, you can manage the user name and password in "My computer-properties-management-local users and groups.
Top 10 classic application skills for network neighbors
Nowadays, people are increasingly accustomed to using "Network neighbors" to drag and share files, which is convenient and convenient. But you know, there are a lot of tips for using such a small component as "Network Neighbor! Today, we are aiming to show you top 10 "online neighbors" with the purpose of learning and playing!

10 clever settings of network neighbor protocols

Some people say that there is no Internet neighbor icon on his computer desktop. Why? In fact, this is caused by the failure to correctly set the network neighbor Protocol. To make the network neighbor work normally, you must set a network protocol named netbeui reasonably. By default, neither Windows 98 nor Windows 2000 will automatically install the netbeui network protocol, when we access other workstations in the LAN directly through the network neighbor icon in the future, there may be various inexplicable errors, for example, you may find that many workstations in the LAN cannot be accessed in the neighbor window on the network, and others cannot see your computer name in the neighbor on the network. The specific setting method is as follows: first, find the "Network Neighbor" icon on the Windows 2000 desktop, right-click the icon, and then execute the "attribute" command from the shortcut menu that is subsequently opened; then, right-click the "local connection" and execute the "properties" command from the shortcut menu that is opened later. In the "properties" dialog box, click the "Install" button; select "protocol" and execute the "add" command. In the displayed protocol selection list box, you can select the "netbeui" protocol and click "OK; then the system may pop up a prompt dialog box asking you to put the Windows 2000 installation disk in the optical drive, and finally follow the on-screen Installation Wizard prompts to complete the protocol installation task.

Practical index:★★★Surprise index:★Overall index:★★☆

9 online neighbor search techniques

When you double-click the "Network Neighbor" icon on the Windows system desktop, the computer connected to the Windows system will be located; if you cannot find the name of the computer you want to find in the window of the network neighbor, and the computer you want to find is indeed connected to the LAN, you can no longer query the workstation of the network neighbor through common methods. You can use the "Search for a computer" method to find the computer in the network neighbor to be accessed. The procedure is as follows: click Start, search, and search for computers on the Windows system desktop. In the subsequent dialog box, enter the name of the shared computer you want to search, click the "Search now" button, and the computer specified in the network neighbor will appear on the search results page.

Practical index:★★★★Surprise index:★★Overall index:★★★

8 fast access techniques for network neighbor IP addresses

If the network neighbor icon in your computer is invalid, you can use an IP address to quickly access the Internet neighbor's shared computer. This access method is generally applicable when you do not know the name of the shared computer in the network neighbor. For example, if the IP address of the computer shared by the network neighbor to be accessed is 192.168.0.1, you can follow the steps below to access the computer shared by the Network Neighbor: first on the Windows system desktop, run the "Start" menu, select the "run" command from the pop-up list, and then enter "192.168.0.1" in the "run" dialog box ", click OK to view the shared computer you want to access.

Practical index:★★★★★Surprise index:★★★Overall index:★★★★

7 network neighbor name access techniques

In Windows, you can use the name of the shared computer in the accessed network neighbor as a network connection command to access the specified shared computer. For example, when you want to access the shared computer XXX in the network, you can first click "start"/"run" command, and then enter "XXX" in the dialog box that appears ", click OK in the dialog box, and then you can access the content on the specified computer in the network neighbor.

Practical index:★★★★★Surprise index:★★★★Overall index:★★★★☆
6 cleaning techniques for junk information of network peers

In the Win98 system, when a LAN User accesses a network neighbor, the registry records information about a series of command operations in the heky_current_user/Network/recent primary key, contains the name of the accessed machine, the accessed application, and the file name. For example, the primary key recent contains a sub-primary key entry named/ierl_server/software, indicates that you have visited the software folder on the server named ierl_server. Click this item and the name and key value of this item are displayed in the right window of the editor. These contents are useless. You can clear them as appropriate. Open the Registry Editor, open the primary keys at all levels in the following order: heky_current_user/Network/recent, and then delete the subkeys of the primary key recent.

Practical index:★★★★★Surprise index:★★★★★Overall index:★★★★★

5 techniques for improving the access speed of network peers

Currently, the use of network neighbors for information exchange is often the first choice for many LAN users, but many people often feel that they are very slow when accessing other shared information through the network neighbor icon; in fact, you can improve the access speed of network neighbors through the following methods: first, click Run in the Start menu on the Windows system desktop, and enter the Regedit command in the open run dialog box, in this way, the registry editing window can be opened. In this window, you can access the HKEY_LOCAL_MACHINE/software/Microsoft/Windows/current ersion/Explorer/remotecomputer/namespace branch in sequence, delete the sub-keys under the corresponding namespace branch, disable the registry, and restart the computer.

Practical index:★★★★★★Surprise index:★★★★★★Overall index:★★★★★★

4 network neighbor dos access techniques

If you are not lucky one day, the Windows system will suddenly fail to start normally, and you need to be very anxious to access the shared resources in the network neighbors through the network, what should you do? It is unrealistic to use the icon of a network neighbor to access resources. Because there are no icons in the DOS state, how should we access Shared Resources in the DOS state? In fact, the net command in the DOS state can help you achieve this goal. You only need to enter the "net view XXX" command at the doscommand prompt (xxx indicates the name of the shared computer in the network neighbor ), press enter to view the resource files on the shared computer XXX. If you enter the "net use F: xxxyyy" command, you can map the YYY directory on the shared computer XXX to the f disk on the local computer. Then, you can directly type "F:" at the command prompt :", you can perform operations on the shared resources in the network.

Practical index:★★★★★★Surprise index:★★★★★★Overall index:★★★★★★☆3 fast logon techniques for specified domain of network neighbors

In Lan, sometimes, for management convenience, the master Domain Controller and backup domain controller are often established first, and the user name is set up for each user in this domain, and store a large amount of information resources in the member servers of the domain. To normally access the data stored on the member server, a normal workstation must first log on to the domain at startup. To this end, you must set the workstation machine as follows: first, right-click the "Network Neighbor" icon on the Windows desktop, and then execute the "attribute" command from the shortcut menu that appears; in the displayed Properties dialog box, you can select "Microsoft Network Customer" and then click "properties". In the displayed dialog box, select "log on to Windows NT domain", enter the domain name that the computer will automatically log on to in the text box in the setting column, click "OK", and restart the computer.

If the workstation uses the Windows 2000 operating system, you can follow the steps below to ensure that the computer can automatically log on to the specified domain and have all operation permissions on the local computer: first, apply to the LAN administrator for the username and password required to log on to the master domain of the server, and log on to the local computer as a super administrator; next, execute the "program", "Management Tools", and "Computer Management" commands in sequence. In the window that will be opened, expand "users and groups" and select "groups "; right-click the "Administrators" icon and select the "add to group" command from the shortcut menu. Follow the on-screen prompts below, add the user applying to the Administrator to the Administrators group. When selecting the domain name used by the server, the computer will ask you to enter the user name and password for access to the domain, you must enter the user name and password you have applied for in advance, and then restart the computer.

Practical index:★★★★★★Surprise index:★★★★★★★★Overall index:★★★★★★★

2. Invalid Shared Folder deletion Techniques

When transferring files in network neighbors, we usually store the files in a folder first, and then set the folder to share, in this way, you can directly use the mobile and copy methods to achieve the purpose of file exchange and transmission. However, by default, even if the folder sharing method has been removed, we can also see the shared folder name in "Network Neighbor", but this folder is no longer valid. To delete the invalid shared folder, follow these steps:

First, open the run dialog box and enter the Registry Editing Command "Regedit" to open the registry editor window. Execute the "edit" menu item on the page and select the "Search" command below, in the search settings window that appears, enter the name of the shared folder, select the "primary key" option in the window, and then execute the "Find Next" command. After a while, the Registry Editor opens the hkey _ local_machinesoftwaremicrosoftwindowscurrentversionnetworklanman branch. in the right area of the corresponding LANMAN key value, we can find the name of the shared folder. Right-click the name of the folder, run the "delete" command from the shortcut menu, exit the registry editing window, restart the system, and when the network neighbor is opened again, we will not see the invalid shared folder name.

Of course, there is also a simpler Delete method, that is, first create an empty folder on the local computer, set the shared name of the folder to the same name as the invalid folder in "Network Neighbor". In this way, a shared folder conflict prompt appears on the screen, in this case, you can run the "yes" command in the prompt box to delete the invalid shared folder!

Practical index:★★★★★★★Surprise index:★★★★★★★★★Overall index:★★★★★★★★

1. Online neighbor deletion Techniques

Sometimes, to ensure security, you need to delete the network neighbor icon from the system desktop. The most convenient way to delete a network neighbor is to delete the netbeui and IPX/SPX protocols directly in the network settings. The specific operation is: first open the "control panel" window, in this window, open the "network" attribute dialog box, select the netbeui and IPX/SPX protocols, and run the DELETE command; right-click the "Dial Network" icon, right-click the "properties" command from the pop-up menu, and select "server type" in the dialog box that appears ", disable netbeui and IPX/SPX, and restart the computer.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.