Introduction to broadband Internet sharing and vro setting

Source: Internet
Author: User

Recently, many of my friends asked me whether the events that require telecom to disable routing are true? According to my friends who work in China Telecom, Guangdong Telecom has not received any messages about closed routes. However, it may not be a failure. Whether the incident is true or not, at least this attack kills chickens, police, and monkeys and still suffers some blocking effects.

Therefore, when you declare and install broadband, you have to consider sharing it over and over again.

However, I believe that if China Telecom really wants to close its route sharing, it will have an extreme negative impact on the entire network industry. Therefore, China Telecom has to think twice during its implementation. First of all, China's broadband business has so far only popularized in key cities and counties and cities at the level, but not in rural areas and poverty-stricken areas, if the price is not lowered or even cracked down, the future development will be shadow. Then, in case of closed access, do vrouters need to exit the Chinese market? This is worth pondering. Who is willing to purchase a vro if it does not have the anti-blocking function? What if the router has the anti-blocking function? Of course, this is not what everyone wants to see. I still agree with the paybytraffic billing method, provided that the cost is favorable.

Now that we are talking about the sharing of broadband routes, I will share with you the method of using vro to share broadband!

The easiest and quickest way to share a broadband record with multiple computers is to buy a router. Home broadband routers on the market can be described as varied and wide-ranging. Some routing devices also integrate MODEM and print server functions, but the general routing functions are inseparable.

First, connect the broadband MODEM to the WAN (WAN) Port of the router, and then connect the computer to the LAN (LAN) Port of the router. Generally, there are four LAN ports on the vro. If there are too many computers, you can connect to the vswitch at the LAN port of the vrolan.

After everything is ready, you can configure the vro.

The default IP addresses on the vro Management page are different. If you have already modified the default IP addresses, you can press the restore key to restore the initial status of the device. Enter the vro management interface. The first task is to change the password. Do not use full numbers. It is better to use numbers and letters to ensure security. After the password is changed, multiple devices will restart.

After the router is restarted, we can select the quick Configuration feature of the router. If you have no vro in your hand, forget it. The quick configuration function is nothing more than broadband access, which can be divided into three types: The most common ADSL PPPoP connection, and the second is the dynamic IP connection of the video cable, the most frequent access is fiber access or the fixed IP address of the leased line. In contrast, the first two most common choices in the family are enterprise network.

After setting up broadband, all the machines on the network can access the Internet. But how can we better control these computers? How can we prevent ARP spoofing? This requires further device routers. Generally, a vro has an address pool option. We can set IP segments based on the number of computers in the network, for example, starting from 192.168.0.2 to 192.168.0.8. In this way, seven IP addresses can be used simultaneously. Then, we enter the MAC address of each computer's Nic into the settings to bind the MAC address. This effectively prevents IP addresses from being infiltrated by other illegal computers. In addition, this setting can also save a lot of time on the computer, and each computer can use the automatic acquisition of IP addresses.

The rest is the firewall settings. Because everyone has different settings and requirements, the firewall functions are not described here. They can be divided into content filtering and keyword shielding, in addition, there are some additional features of different brands.

Finally, you may want to pay more attention to the log table and usage status during daily use, because it can reflect the usage of the network. If an IP address occupies a large amount of resources, or the traffic passing through is too high, so you should be careful. He may be in BT or has a virus or even be attacked by hackers. In short, the network is infinitely good, so be careful when surfing the internet! All because the current Internet users like to be hackers.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.