Position: Home page » Blockchain » How to set up Bihu routing blockchain

How to set up Bihu routing blockchain

Publish: 2021-05-02 07:32:43
1. The same problem to rescue, this will tiger and the same virus to invade other people's router, this kind of company should close down, we don't buy his goods
2. Bihu router installation is very simple, just plug in the power supply and network cable can work normally! There is a small breathing light in the middle, which shows the working status! At the beginning, the red breathing light indicates that it is starting. After it turns blue, it works normally
as long as the app software is installed on the mobile phone, you can login and set it
the exclusive app interface is also very simple and clear, with three main moles: my routing, intelligent hardware and more
some basic settings of the router can be set, including modifying the password and Internet type of the router.
3. It depends on what you do. If you want to use it to link to the Internet and let the downstream devices access the Internet normally, you need to set up the
WAN port Internet access mode, which is generally PPPoE dial-up mode. In this way, you need to know the account password. After filling in the correct account password, you can access the Internet normally
if you are not using the Internet, but as an expansion device, you need to set up your route The gateway address of the router cannot be the same as that of the uplink device
I hope I can help you
4.

Bihu router is a combination of high-speed and stable signal transmission, technology and strength, which adopts Qualcomm enterprise chip, built-in al antennas, gold-plated shielding wrapped sea blue RJ45 terminal, high-density anti-interference shielding multiplication layer. From the bird's nest to the family, from the enterprise to the indivial, the coverage area is up to 1949 square meters (under the condition of open space and no interference). It can support up to 100 terminals to surf the Internet without worry. Bihu routing depends on the demand, automatically allocates the bandwidth, adjusts the intensity, and effectively guarantees the concurrent use of multiple terminals with large traffic. Bihu routing app intelligent control, simple settings, security protection, intelligent speed limit, timing limit network, human management. Wpa-psk / wpa2-psk encryption, wireless access control, SSID hiding, dos and other network firewalls + app intelligent control make hackers have nowhere to pin

5. Router setting method
different Internet environment, wireless router setting method is different. If you need to dial a fiber-optic cat to connect to a wireless router, follow the following methods: 1. Plug in the wireless router, do not connect the cat, and connect the computer to any LAN port of the wireless router
; 2.
in the browser address bar, enter the IP address of the router (on the label on the back of the router), and enter the login user name and password to enter the settings page; 3. According to PPPoE (ADSL virtual dial-up) mode, input the internet account and password; 4. Set SSID, encryption method and
password; 5. Save and restart; 6. After setting, connect the cable from the cat LAN port to the WAN port of the wireless router
6. The terminal (notebook, mobile phone, etc.) connects to the WiFi of the router, logs in to the router management interface, and usually sets the Internet access mode to dynamically obtain IP, and then sets the wireless parameters.
7. First wireless router:
1. First log in to the router connected with the broadband cat
2. Set "SSID number" and "channel" in Wireless Settings - basic settings, and set fixed channel number
3. Set the wireless signal encryption information in Wireless Settings - wireless security settings, and record the SSID, channel and encryption setting information of the wireless router
second wireless router:
1. Log in to the second wireless router to be bridged
2. In the network parameter LAN port setting, the modified IP address is different from the first router (to prevent IP address conflict),
for example, 192.168.1.2, save it and the router will restart automatically
3. Check "turn on WDS" in Wireless Settings - basic settings. Click "scan" to search the surrounding wireless signals
4. Select the SSID number of the first router from the scanned signal list and click "connect"
5. Set the channel to be the same as that of the first router. At the same time, set the same encrypted information as the first router, and click "save"
6. Shut down the DHCP server. In the DHCP server, select "do not enable", save and restart the router
7. At this time, the first wireless router and the second wireless router have successfully established WDS.
8. How to restore the factory settings of wireless router:

there is a reset key on the router. In the case of power on, press 5-10 seconds until all the indicators of the wireless router go out, then flash, and the wireless router will return to the factory settings
after the wireless router is restored to the factory settings, it needs to be reset before it can be used.
9. Maybe the black heart manufacturer designed a free sharing non encrypted wireless network by using the back door to steal personal wechat QQ and other information, which has achieved the purpose of advertising and so on. The router design can not be found or closed. Contact the manufacturer directly or complain to the Ministry of instry and information technology. You can detect it like this, and wait 3-5 minutes for the cat to unplug the line between the routers, That is the background control of your router, it is recommended to replace the router for your security.
10. The settings are as follows:
1. Run the command prompt as an administrator:
shortcut key win + R → enter CMD → enter
2. Enable and set the virtual WiFi network card:
run the command: Netsh WLAN set hosted network mode = allow SSID = diligent key = password
this command has three parameters, as follows:
mode: whether to enable the virtual WiFi network card, If it is disallow, it will be disabled<
SSID: wireless network name, preferably in English (for example, diligent)
key: wireless network password, more than eight characters (for example, password)
the above three parameters can be used alone. For example, only using mode = disallow can directly disable the virtual WiFi network card
after successful opening, there will be one more wireless connection 2 with "Microsoft Virtual WiFi miniport adapter" in the network connection.
for convenience, rename it as & quot; Virtual WiFi & quot
if not, just update the wireless network card driver
3. Set Internet connection sharing:
in the "network connection" window, right-click the network connection that has been connected to the Internet, such as "local connection", select "properties" →
"sharing", check "allow other connections (n)" and select "virtual WiFi"
note: if you click sharing, an error will appear, You need to start the windows firewall service“ Right click "computer" →
"management" → "services and Applications" → "services", find the "Windows Firewall" service in the list and start it, that is OK
after confirmation, the word "shared" will appear next to the icon of the network card provided for sharing, indicating that "broadband connection" has been shared to "virtual WiFi"
4. Start the wireless network:
continue to run in the command prompt: Netsh WLAN start hosted network
(change start to stop to close the wireless network, To enable the wireless network after power on, just run this command again)
so far, the red fork of virtual WiFi disappears, the WiFi base station has been set up, and the host has been set up. Notebook, mobile phone with WiFi mole
and other sub computers search the wireless network diligent, enter the password, and you can share the Internet!
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750