Joke Collection Website - Blessing messages - 192.168.1.1router setup tutorial (2)

192.168.1.1router setup tutorial (2)

4. How to set up 192. 168. 1 router if it can't open (take WIN7 as an example).

1, computer setup problem:

Right-click Network-> and select Properties.

Click Change Adapter Settings.

Right-click local area connection-> and select properties.

Select internet protocol version 4 (TCP/IPv4),->; And click "Properties".

Check "automatically obtain IP address" and "automatically obtain DNS server address"->; Click "OK".

2. Router connection problem

The WAN interface in the router needs to be connected to the cat's network port (LAN port) with a network cable; If you don't use the cat for broadband, you need to plug the broadband network cable into the WAN interface of the router. Win7 computer network cable connects to any interface in router LAN (1234).

3. Router problem

The default IP of the router is not192.168.1.1.

Many users have a misunderstanding that all router IP addresses are192.168.1.1. So when setting up the router, you always enter192.5438+068.438+0.438+0.

But the reality is that the default IP (URL setting) of different routers is different, and not all routers have IP addresses of192.168.1.1.

If your router IP address is simply 192. 168. 1, then you can't open the router settings page of192.168.

So you can check the default IP address (URL) information of your router in the bottom tab.

The IP address of the router has been modified.

If the default IP of the router is 192. 168. 1, but the default IP has been modified, then the login IP of the router is no longer 192. 168. 1.

At this time, if you continue to use the IP address of 192. 168. 1, you will definitely not be able to open the router settings page.

Check the real IP of the router:

(1), right-click Network->; Select "Properties".

Click Change Adapter Settings.

->-click the local connection with the mouse->; Select "Status" to open

Click on "Details"

Find the "IPv4 Default Gateway" option in the page, and the IP address behind it is the current real login IP of the router.

In this example,192.168.3.1is the real login IP address of the router. Now you need to enter192.168.3.1in the browser to open the router settings page.

Reset the router

Sometimes the router will crash and be unstable, which will also lead to the failure to open the login interface of192.168.438+0.1

Working principle of router

Routers are devices that connect local area networks and wide area networks in the Internet. It will automatically select and set the route according to the channel conditions, and send signals in turn by the best path. Let's study together!

Traditionally, the router works in the third layer of the OSI seven-layer protocol, and its main task is to receive the data packet from the network interface and decide to forward it to the next destination address according to the destination address contained in it. Therefore, the router must first look up its destination address in the forwarding routing table. If it finds the destination address, it will add the next MAC address before the frame of the packet, and at the same time, the TTL(TimeToLive) field of the IP packet header will start to decrease, and the checksum will be recalculated. When a packet is sent to the output port, it needs to wait before it can be transmitted to the output link.

When the router is working, it can look up the routing table in the device according to a certain routing communication protocol. If there are multiple paths to a specific node, the basic predetermined routing criterion is to choose the best (or most economical) transmission path. Because various network segments and their interconnections may change due to environmental changes, routing information is generally updated regularly according to the provisions of the routing information protocol used.

In the network, the basic function of each router is to dynamically update its own routing table according to certain rules to maintain the validity of routing information. In order to facilitate the transmission of messages between networks, routers always decompose big data into packets of appropriate size according to predetermined rules, and then send these packets through the same or different paths respectively. When these packets arrive at the destination in turn, the decomposed packets are encapsulated into the original message form in a certain order. The hierarchical addressing function of the router is one of the important functions of the router, which can help the network with many nodes to store addressing information, and at the same time intercept the messages sent to remote network segments between networks, thus playing a forwarding role. Choosing the most reasonable route and guiding communication are also the basic functions of routers. Multi-protocol routers can also connect network segments using different communication protocols and become communication platforms between network segments with different communication protocols.

The main difference between routing and switching is that switching takes place at the second layer (data link layer) of the OSI reference model, while routing takes place at the third layer, namely the network layer. This difference determines that routing and switching need to use different control information in the process of moving information, so the ways to realize their respective functions are also different.

Random talk on router security

For hackers, it is usually easy to exploit the vulnerability of the router to attack. Router attacks will waste CPU cycles, mislead information flow and paralyze the network. A good router will take good security mechanisms to protect itself, but this alone is not enough. Protecting router security also requires network administrators to take corresponding security measures in the process of configuring and managing routers.

Plug a security hole

Restricting the physical access of the system is one of the most effective ways to ensure the security of the router. One way to restrict physical access to the system is to configure the console and terminal session to automatically log out of the system after a short idle time. It is also important to avoid connecting the modem to the auxiliary port of the router. Once the physical access of the router is restricted, users must ensure that the security patch of the router is up to date. Vulnerabilities are often disclosed before the patch is released by the manufacturer, which makes hackers take advantage of the affected system before the patch is released by the manufacturer, which needs to attract the attention of users.

Avoid identity crisis

Hackers often use weak passwords or default passwords to attack. Measures such as extending the password and choosing a password validity period of 30 to 60 days can help prevent such loopholes. In addition, once an important IT employee resigns, users should immediately change their passwords. The user should turn on the password encryption function on the router, so that even if the hacker can browse the configuration file of the system, he still needs to decipher the ciphertext password. Implement reasonable authentication control so that the router can transmit certificates safely. On most routers, users can configure some protocols, such as remote authentication dial-in user service, so that these protocols can be used in combination with authentication servers to provide encrypted and authenticated router access. Authentication control can forward a user's authentication request to an authentication server, which is usually located on the back-end network. The authentication server can also require users to use two-factor authentication to strengthen the authentication system. The former is the token generation part of software or hardware, while the latter is the user identity and token password. Other authentication solutions include transmitting security certificates in Secure Shell (SSH) or IPSec.

Disable unnecessary services

It is a good thing to have many routing services, but many recent security incidents have highlighted the importance of disabling unnecessary local services. Note that disabling CDP on the router may affect the performance of the router. Another factor that users need to consider is timing. Time is critical for effective network operation. Even if users ensure time synchronization during deployment, after a period of time, the clock may gradually lose synchronization. Users can use a service called Network Time Protocol (NTP) to check the effective and accurate time source to ensure the clock synchronization of devices on the network. However, the best way to ensure the clock synchronization of network devices is not through the router, but to place an NTP server in the network part of the demilitarized zone (DMZ) protected by the firewall, and configure the server to only allow time requests to external trusted public * * * time sources. On the router, users rarely need to run other services, such as SNMP and DHCP. Use these services only when absolutely necessary.

Restrict logical access

Restricting logical access mainly depends on the reasonable handling of access control lists. Restricting remote terminal sessions helps prevent hackers from gaining logical access to the system. SSH is the preferred logical access method, but if Telnet cannot be avoided, terminal access control can be used to restrict access to trusted hosts. Therefore, users need to add an access list to the virtual terminal port that Telnet uses on the router.

Control Message Protocol (ICMP) is helpful for troubleshooting, but it also provides information for attackers to browse network devices, determine local timestamps and network masks, and guess OS version. In order to prevent hackers from collecting the above information, only the following types of ICMP traffic are allowed to enter the user network: ICMP network unreachable, host unreachable, port unreachable, packet too large, source suppressed and TTL exceeded. In addition, logical access control should also prohibit all traffic except ICMP traffic.

Use inbound access control to direct specific services to the appropriate servers. For example, only SMTP traffic is allowed to enter the mail server; DNS traffic enters DSN server; HTTP(HTTP/S) traffic enters the Web server through Secure Sockets Protocol Layer (SSL). In order to prevent the router from becoming the target of DoS attack, users should reject the following traffic: packets without IP address, packets with local host address, broadcast address, multicast address and any forged internal address. Although users cannot stop DoS attacks, they can limit the harm of DoS. Users can take measures such as increasing the length of SYNACK queue and shortening the timeout of ACK to protect the router from TCPSYN attacks.

Users can also use outbound access control to restrict traffic within the network. This control can prevent internal hosts from sending ICMP traffic and only allow valid source address packets to leave the network. This helps to prevent IP address spoofing, and reduces the possibility of hackers using user systems to attack another site.

Monitor configuration changes

Users need to monitor the router configuration after the change. If users use SNMP, they must choose a powerful * * * string, and it is best to use SNMP that provides message encryption. If the device is not remotely configured through SNMP management, it is best for users to configure the SNMP device as read-only. By denying write access to these devices, users can prevent hackers from changing or closing interfaces. In addition, users need to send system log messages from the router to the designated server.

In order to further ensure security management, users can use SSH and other encryption mechanisms to establish encrypted remote sessions with routers. In order to strengthen protection, users should also restrict SSH session negotiation and only allow the session to communicate with several trusted systems that users often use.

An important part of configuration management is to ensure that the network uses a reasonable routing protocol. Avoid using Routing Information Protocol (RIP), it is easy to be tricked into accepting illegal routing updates. Users can configure protocols such as Border Gateway Protocol (BGP) and Open Shortest Path First Protocol (OSPF) to verify each other by sending MD5 password hashes before accepting routing updates. The above measures help to ensure that any routing updates accepted by the system are correct.

Implement configuration management

Users should implement configuration management strategy to control the storage, retrieval and update of router configuration, and properly save configuration backup documents on the security server in case users need to replace, reinstall or restore the original configuration when they encounter problems with the new configuration.

There are two ways for users to store configuration documents on router platforms that support command line interface (CLI). One way is to run a script, which can establish an SSH session between the configuration server and the router, log in to the system, turn off the controller log function, display the configuration, save the configuration to a local file and exit the system. Another method is to establish an IPSec tunnel between the configuration server and the router, and copy the configuration file to the server through TFTP in this secure tunnel. Users should also know who can change the router configuration, when and how. Before making any changes, please make a detailed reverse operation procedure.

Router speed limit setting

1. The computer connected to the router logs on to the router management page of 192. 168. 1. In the network management interface, select "IP bandwidth control function". Most routers have this function.

2. Because in the setting of the router, the computer automatically obtains the IP from the router, that is to say, the IP address obtained by the same computer from the router is not necessarily the same every time, so we must first bind the IP address obtained from the router with the MAC address of the computer itself, so that the computer can obtain a fixed IP address from the router. In order to limit the network speed of some computers.

3. Before binding, you need to know how many devices are connected to the router device and the MAC address of each device. Select DHCP Server and click Client List.

4. Clearly see the MAC address of the device connected to the router and the obtained IP address, then choose the MAC address of the computer for speed limit at this time, and then copy the MAC address of the device. When copying a MAC address, you can only use Ctrl+C to copy it.

5. After copying the MAC address, it is time to bind the MAC address and the IP address. Click "bind MAC address and IP address", and then follow the instructions in the picture to proceed to the next step. Click Add Single Entry.

6. In the next pop-up page, paste the copied device MAC address into the function box option to be filled in. When pasting, you can only paste with Ctrl+V, and then enter an IP address. The format of IP address can start from192.168.1.2. Click Save after filling in, and be sure to remember the IP address you just filled in.

7. Next, you can really start setting the speed limit of the router. In the opened interface, you need to open the IP Bandwidth Control function first, and then fill in the total network bandwidth. This is very important. Don't make a mistake.

8. Start to enter the IP address that needs to limit bandwidth. Fill in the IP address you just set in the IP address pool below. The IP address filled in here is exactly the same.

9. First, you can set the maximum bandwidth limit of this IP to "1000kbps", so you can select "Limit the maximum bandwidth" and then click "Enable" in the box on the right.

10, and then ensure that the minimum bandwidth of this IP is a fixed value to ensure that the bandwidth in the LAN is reasonably and fairly allocated. For the same reason here, select "Guarantee minimum bandwidth" and then select "Enable".

1 1. Click "Save" to complete all settings. In this way, this computer will definitely abide by the bandwidth limit and will not exceed the set maximum network bandwidth, thus realizing the configuration of this computer's network functions.

Swift router settings

I. Internet hardware

A broadband cat, a four-port broadband router, and two direct twisted-pair network cables.

Second, the hardware installation

1. Insert the output line of the broadband cat into the WAN port of the broadband router, and connect the LAN port of the router with the computer network card with a straight-through twisted-pair cable.

2. Start the power of the broadband cat and router.

Third, configure the router.

Take TP-LINK's SOHORT402 broadband router as an example, and make the following settings (according to the router instructions):

1. Enter 192. 168. 1 in the address bar of IE window and press "Go" to open it.

A dialog box asking for a user name and password.

2. Enter "admin" in the user name and password text boxes respectively, and confirm to open the configuration interface of the browser.

3. Select "WAN port" and "PPPOE protocol" in the routing network connection wizard (be careful not to choose dynamic and static), then enter your own telecom broadband account and password, and select: automatic dialing in the advanced options. After the configuration is completed, turn off the routing power and restart it.

Fourth, configure the network computer.

Assign fixed IP addresses to two computers.

1. Open the local connection property, double-click the TCP/IP protocol to open a dialog box, select "Use fixed IP address" in the dialog box, and enter192.168.1.2 in the IP address, with the subnet mask of 255.255. Gateway192.168.1.1,main DNS192.168.1,ok, except that the IP address of the other computer is/kloc.

Broadband connection is considered to be automatic, so two computers can surf the Internet at the same time or independently.

Function of router

(1) Protocol conversion: you can convert the protocols of the network layer and its lower layers.

(2) Routing: When a packet arrives at the router from the Internet, the router can select the best route to forward the packet according to the destination address of the packet, and can automatically adjust the routing table with the change of network topology.

(3) Routing can support multiple protocols: Routers are related to protocols, and different routers have different router protocols and support different network layer protocols. If the interconnected LAN adopts two different protocols, such as TCP/IP protocol and SPX/IPX protocol (that is, the transport layer/network layer protocol of Netware), they are distributed on TCP/IP (or SPX/IPX) hosts in the Internet and can only be connected to other Internet through TCP/IP (or SPX/IPX) routers. Multiprotocol routers can support multiple protocols, such as IP, IPX and X.25 protocols, and can establish and maintain different routing tables for different types of protocols. This can not only connect the same type of network, but also connect different types of networks with it. Although this function makes the router more adaptable, it also reduces the overall performance of the router. Now IP protocol is more and more dominant in the network, and the next generation router (such as switched router) only needs to support IP protocol.

(4) Traffic control: The router not only has buffering, but also can control the data traffic of the sender and the receiver, so that the two can be more matched.

(5) Segment assembly function: When multiple networks are interconnected through routers, the packet size transmitted by each network may be different, which requires the router to segment or assemble the packet. That is, the router can package the received large packets into small packets and forward them, or assemble the received small packets into large packets and forward them. If the router does not have the segmentation assembly function, then the whole Internet can only transmit according to a certain allowable shortest packet, which greatly reduces the efficiency of other networks.

(6) Network management function: The router is the intersection point connecting various networks, and all inter-network data packets pass through it, so it is convenient to monitor and manage the data packets and devices in the network. Therefore, high-end routers are equipped with network management functions to improve the operating efficiency, reliability and maintainability of the network.

The router must have a network interface greater than or equal to 2 to have routing function. Otherwise, if there is only one interface, there will be no "pathfinding"! The network interface mentioned here is not necessarily a physical interface, such as a network card or others, but also a virtual interface, such as a tunnel entrance.

As mentioned above, the routing information running on the router can be configured statically or generated dynamically. The former is completed by manual configuration, and the latter dynamically changes the routing table in the kernel according to the network state by running programs running related routing protocols on the router. Here are some configurations of these two types of routers in detail. Usually, a router has both static configuration and dynamic configuration, and the two are combined.

Brief introduction of Xiaomi router

Xiaomi router can realize NAS-like functions, can be used as a home data center, and will have a built-in hard disk to store data. The official Wang needs to pay a dollar for the first public beta.

Xiaomi router adopts Broadcom 1GHz dual-core processor, supports 2.4GHz+5GHz dual-band WiFi and 802. 1 1ac protocol, and has built-in 1TB SATA hard disk and 256MBD DR3 memory. The beta version is also equipped with 6 kinds of network cables (testing gigabit network ports), screwdrivers, gloves, cooling fans, infrared remote controllers, Thunder Platinum membership cards and so on.

Main configuration

hard disc

The built-in Xiaomi router is Seagate/Toshiba's 3.5-inch 1TB (optional 6TB) monitoring hard disk, which realizes the function similar to NAS. With SATA3 high-speed interface, the highest reading speed can reach 1 15MB/s through gigabit LAN port, and it only takes 18 seconds to transmit a 2GB movie. Monitor-level hard disk runs more stably than ordinary hard disk, and the average trouble-free working time can reach1.2000 hours.

aerial

Xiaomi router adopts PCB array antenna. The antenna core is composed of circuit board, and there are four antenna elements. The design accuracy is as high as 0.02 mm, which is 40 times that of general metal antenna. PCB array antenna is more excellent in improving dual-frequency performance, with the highest gain of 4dBi at 2.4GHz and 6dBi at 5GHz, which is superior to ordinary antenna in both frequency bands.

cpu

Xiaomi router is the first in the world to launch Broadcom4709C dual-core 1.4GHz, because intelligent routers need to deal with more complex tasks, and processor performance is very important. Compared with the previous generation, the performance of the new millet router has improved by 40%. When multiple devices are connected to the router, it provides powerful processing performance when reading and writing data, watching videos or downloading files at the same time.

Signal amplifier chip

Xiaomi router has built-in four independent PA signal amplification products, from SkyWorks, the top American manufacturer, which can enhance the WiFi signal, and the through-wall mode signal is stronger.

flash memory

Unique 5 12MB SLC flash memory is used to store the router system. As an intelligent router, its flash memory is 128 times that of ordinary routers.

Innovative function

Camera photo backup

After the SLR and digital camera USB are connected to the router, photos can be automatically imported/backed up, and WiFi devices such as mobile phones can be directly backed up online. The maximum built-in hard disk is 6TB, with sufficient space. The average trouble-free running time is 654.38+0.2 million hours, and the storage safety is guaranteed. After the photos are conveniently stored centrally, they can also be shared among home devices through the router, and the photos stored in the router can be accessed at any time with the mobile phone in the remote state. Under the trend that computers are not often turned on, more convenient import and sharing may lead to a new revolution in photo storage.

Remote offline download

Xiaomi router is more like a small computer that works 7x24 hours a day. Initiate download tasks through mobile app, computer and browser, and support mainstream download methods such as BT, magnetic link and PT. At the same time, we will integrate Xiaomi's powerful video resources and directly download massive HD genuine video resources such as iQiyi, Xiaomi Video and Thunder Cinema. The third party has developed a drama-chasing plug-in, which can automatically download resources such as concerned American dramas. Support samba, DLNA and other LAN * * * sharing protocols, you can directly watch downloaded movies and manage downloaded files through mobile phones, televisions and computers.

Online game acceleration

Xiaomi router can monitor and automatically download the game update package in real time and save it in the built-in hard disk. When you turn on the computer to prepare the game, you can get the game update quickly. At the same time, it supports intelligent QoS speed limit, which can give priority to protecting the game network and is not afraid of the game card when the family grabs the network speed. It is called a necessary "game artifact" by players except the mouse and keyboard.

G technology

Xiaomi router can be regarded as a combination of NAS and router, and can be used as a file server of local area network, where all photos, documents, movies and music can be stored. You can read or edit documents wirelessly, which is simpler than connecting a general mobile hard disk with a USB cable. The wireless transmission speed up to 58MB/s is twice as fast as that of the general USB2.0 mobile hard disk. More importantly, you can access it remotely when you are not at home, and your information can be accessed remotely through your mobile phone and tablet.

Television browsing

Although the TV at home is very big, what should I do if I have been suffering from no source? Xiaomi routing will help you. If your TV is Xiaomi TV, you can watch movies directly on Xiaomi routing hard disk by directly connecting to Xiaomi routing network. It doesn't matter if the TV at home is not Xiaomi TV. Now the millet box can also achieve the same function.

Synchronous use

What if you want to watch American TV, your girlfriend wants to watch cartoons and your mother wants to watch action movies? It doesn't matter. Now you can read different files in Xiaomi router at the same time as long as you download the special software of Xiaomi router on your mobile phone, tablet or PC through Wang Guan.

technology

Beamforming beamforming technology

Generally, the antenna can only send WiFi signals evenly in all directions. Xiaomi router with intelligent signal tracking technology goes further. Based on beamforming technology, it can detect the position of 802. 1 1ac devices such as mobile phones in the network environment, and then concentrate the WiFi signals in a specific direction, so that your mobile phones, laptops and other networked devices can obtain more stable and higher-speed WiFi signals.

5G-WiFi, 802. 1 1ac protocol

Xiaomi router supports the latest 802. 1 1ac Gigabit WiFi standard, providing 3 times faster WiFi performance and stronger and clearer wireless network signals, and the highest wireless rate can reach 1 167Mbps. It can transmit data at the frequency of 2.4GHz and 5GHz at the same time, so that your mobile phone, tablet computer, TV and other devices can be connected to the best available frequency band, and you can get the best network experience whether you play online high-definition movies, browse the web or play large-scale online games.

Troubleshooting method of router

I. Access points

Check whether each wireless device can normally connect to the wireless access point and directly ping the IP address of the wireless access point. If the wireless access point does not respond, there may be a problem with the wireless connection between the computer and the wireless access point or the wireless access point itself.

Second, MAC

Generally, a wireless access point has a client list, and only the wireless devices in the list can access it, because the list records the MAC addresses of all wireless terminals that can access the access point. If this function is activated, if the MAC address is not saved in this list, it will be impossible to connect.

Third, the hardware problem.

If there is something wrong with the hardware itself, then the wireless network will definitely not work. We can check whether the wireless router works normally through the indicator light, and we can try to replace the wireless router.

Fourth, the equipment configuration

Generally speaking, the quality of the wireless router itself is still credible, so the biggest possibility of the problem lies in the configuration, not the hardware itself. The direction of checking configuration can be SSID, key matching between devices and so on.