路由器

Although routers are widely used in va……

Although routers are widely used in various fields to establish wireless networks that can be accessed wirelessly, for some special places, the routers that need to be used are quite different from the common routers in our life. For example, enterprises. Due to the particularity of enterprise sites, generally, the routers we choose are large-scale routers of Gigabit level. Therefore, its configuration and setting methods are slightly different from ordinary routers. Now we will introduce some design methods of enterprise routers.
Connection network configuration


No matter what kind of router it is, the foundation of establishing wireless network is to make a wired connection first in order to successfully access the Internet. The previous network cable connection method is the same as that of ordinary routers. After connecting, enter the address "192.168.1.1". Generally, the user name and password are guest. After logging in successfully, we can configure the network. Select the "quick configuration" function, and click next after the pop-up window. In the next window, you don't need to modify it. Just click next. The next step is wan configuration. Generally, the enterprise level routing network should select the static IP option, then next, and then click finish.
Optimized configuration of network speed
After completing the basic network connection configuration, we will configure the network speed optimization. We choose the host broadband configuration button, turn on QoS and start it. Here are several cases. If the broadband is controlled by the default host: the uplink standard is 100kb/s, and the downlink standard is 200KB / s. If it is elastic bandwidth: both uplink and downlink should be checked. When setting the elastic broadband occupancy rate: both uplink and downlink should be 80%, which can greatly improve the actual utilization of broadband. For network burst traffic settings: check both uplink and downlink settings, which can speed up the speed of opening web pages and videos and improve the fluency and experience of network access.
Network security settings


Generally, the network of enterprises is very vulnerable to external attacks. Therefore, a secure firewall must be established to prevent malicious hackers from attacking the network. First, we bind through ip/mac according to the settings, and select "prohibit hosts not bound with ip/mac from surfing the Internet" in the setting window. In this way, we can initially establish a firewall of the network and play a preliminary effect of releasing malicious programs. Then we find the "one click binding" function, and select "ARP monitoring" to strengthen the initial firewall originally established. After these two steps, the security performance of the network is greatly improved. Such a firewall can basically prevent most malicious program attacks. At this time, you can safely use the network.
After the specific setting of the above three steps, the network setting of the enterprise router is basically completed, and then the enterprise personnel can use this network for network access. Of course, we usually need special personnel to maintain this network and router.