如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc

上传人:rrsccc 文档编号:9285437 上传时间:2021-02-15 格式:DOC 页数:12 大小:41.50KB
返回 下载 相关 举报
如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc_第1页
第1页 / 共12页
如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc_第2页
第2页 / 共12页
如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc_第3页
第3页 / 共12页
如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc_第4页
第4页 / 共12页
如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc_第5页
第5页 / 共12页
点击查看更多>>
资源描述

《如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc》由会员分享,可在线阅读,更多相关《如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing).doc(12页珍藏版)》请在三一文库上搜索。

1、如何突破网通限制使用路由(How to break through Netcom to restrict the use of routing)How to break through the restriction of the use of CNC routingHelp MAC address cloneMAC: the address of the WAN router MAC address, this value does not change. But some ISP may require binding to the MAC address, then ISP will p

2、rovide a valid MAC address to the user, you can according to the value it provides input to the MAC address bar, and then click save, you can change the MAC address of the WAN router.The current management of the PC MAC address: the ongoing management operation of the computer MAC address.Function b

3、uttonRestore factory MAC: click this button, you can restore the router to the WAN MAC address to the factory default settings.Clone MAC address: click this button, you can put the current management PC MAC address into the MAC address column. Note: only the LAN computer can use clone MAC address fu

4、nction.You put your Mac copy the address to the MAC address routing there! So, network terminal will show you there is a computer without a router! Because each company product is the scope of the MAC address!About the MAC address cloneWhat is not only a clone?Another machine, whether you need to cl

5、one?If I clone, the MAC addressIt is the 2 computer, 2?A persons 2009-08-20 12:31As long as you can clone a! The recognition as long as a computer OK?1, the routing address cloningIn our router there is a MAC set up this one, we open the settings, and then see a clone of the MAC address of the butto

6、n, and then clone, save, and restart the router! Of course, if you can, your speed will be affected.2, the use of shared software breakthroughFirst, open the router firewall options, close the SNMP agreement, or turn off the port 161162;Secondly, from the Internet to download a product called sharin

7、g Aegis software, then it can be installed and running.About the software, sharing aegis, ShareShield is a network operator for the use of monopoly restrictions against the breakthrough software for home broadband sharing. The underlying network and message driven software Windows camouflage technol

8、ogy based on configuration and his request is very low, can very well break the blockade.3, the host Internet sharingYou can use the home computer with one server, which is used to dial the other computer through this server to realize the sharing of the internet. The use of specific methods accordi

9、ng to how to realize several computers use the switch ADSL to share the internet4, through a proxy serverIn fact, this method with third kinds of methods about, but this need to find a proxy server software, which you can download, for example: from the Internet SuperProxy CCProxy (usage: http:/ the

10、 Baidu search. Then the setting method in software which are, I will not say more. Ha-ha4 ways to break a seal routerThe first methodAfter N test, network pioneer has cracked, sharing the Internet feel faster than it is now, not afraid not afraid of sharing single dial, refresh. Moreover, setting is

11、 very simple, hope to see friends support me, oh.The method is very simple, but need to have two routers for the two routing, here is a routing ADSL cat, and a TP-LInk router, if you dont take the ADSL route, then look for a bar, good hardware requirements so.Step one, ADSL broadband modem set to au

12、tomatically dial, shut down its DHCP function, SNMP function to close security options, with no introduction.Step two, the WAN port cable access router ADSL on the cat,Then the computer will IP and router IP as a network, open the IE (I 192.168.123.254) to set the router:The wide area network connec

13、ted type to the static IP (note, not PPPOE) wide area network addresses for IP and ADSL a cat IP, such as 192.168.1.2 (ADSL IP 192.168.1.1 for my cat) 255.255.255.0 subnet mask, gateway 192.168.1.1, DNS:202.99.*.*.Another method of sharing software under the aegisDownload: http:/ DownloadStart solut

14、ion aegis failed shared filter / inspirationStart sharing aegis filter / inspired device failure, the reason is not caused by a shared drive aegis installed correctly to the network components, we introduce the solution:Install shared aegis will automatically reboot and open the control panel - netw

15、ork connection - local connection - right-click properties - installation service if you didnt see ChinaStart SoftwareOn the point of installation from disk, find your installation directory sharing aegis has a Driver folder to install the file netsf Filter Driver install and remove the cut and then

16、 install it on the OK must be no machine installed oh!Third kinds of methodsIf blocked Netcom, access to the Internet through a proxy server, you can download the following does not set the software download address: http:/ DownloadDownload after installation, the user name and password are connecte

17、d by guest on the internet!Fourth methods of how to prevent the closureYou can download a firewall, I use the Kingsoft Internet security, download address: http:/ after installation, the level of security to the network and the 161 highest dart, turn off the port.Crack closure (clone MAC Netcom rout

18、ing address.)Method:Make sure the computer has been able to access the application state machine. The computer network card MAC address is legal MAC address.To enter the system MSDOS, issuing the ipconfig/all command, you can find that the computer network card MAC address. For example: 00-50-8D-D1-

19、71-A7.In the search for a legal MAC addressThe external leads from the computer network card pull, insert broadband router WAN port; the network broadband router with multiple clients connected to the LAN port.Turn on the power of the broadband router. Start the IE browser in any client connection o

20、n broadband router.This type IP router http:/192.168.1.1 address in the IE browsers address bar.Enter the router Web settings page.Click the configuration page left window network parameters button, select one of the MAC address clone button.MAC address clone window.Fill in the current management PC

21、 MAC address the window found on the legal MAC address:00-50-8D-D1-71-A7.Then click MAC address clone button, the MAC address will fill in the MAC address window. Finally, restart the router settings to take effect.This router won a legal binding MAC address is ISP. You can achieve more than one com

22、puter to share the internet.Note: there are some router clone MAC address is clone Mac button English.Attached: modify the network card MAC address.Experience shows that all computer LAN LAN MAC address changes can also be shared online.Methods two:Some broadband providers in order to limit the numb

23、er of access users, the authentication server is bound to the MAC address. At this time, the first will be binding MAC address to connect to router LAN port (but do not connect the Modem router or ISP connection), then,The routers MAC address cloning, copy the MAC address of network card to broadban

24、d router WAN port.Methods three:The use of broadband router MAC address clone function, address binding breakthrough broadband providers, shared Internet access computers.TP-Link TL-R400+ small router as an example. From the MAC address of the computer is bound into the router Web settings page, in

25、the main menu of the basic settings select initial set, WAN interface type column click Edit button, then select dynamic IP.After saving, return to the initial settings page, there is a text box in the Wan MAC address bar option, the contents of which is the MAC address of the machine, the user can

26、modify the MAC address directly in the text box to be bound to the network card MAC address in here. If you do not know the MAC address of network card, you can choose Clone MAC (clone MAC address) button directly to the current computer network card MAC address cloning to TL-R400+ Wan port. Save an

27、d restart the router can come into effect.Note: in the WAN interface type must choose dynamic IP, otherwise it will not appear to modify the wide area network interface MAC address and MAC address cloning options. If you are using other access methods, such as static IP, PPPoE etc., can be completed

28、 in the above, and then re-enter the settings interface for WAN type change.Sharing Netcom router guards crack sealing tutorialClose friends often said in the letter of the telecommunications network sharing Internet router what, today the colleague also asked this question, Internet search tutorial

29、, put up, use convenient. ha ha dayNeed to download a software named sharing guardsShare download address: http:/ guardsThe specific steps above the site for help.MAC Address CloneAt present, there are some areas of Netcom or telecom broadband blocked multi machine sharing Internet access, in order

30、to guarantee the ISP (network operators) of their own interests, because of the different city or region blockade in different ways, so the corresponding crack method also changed, but most are used MAC address detection mechanism to limit, it is usually the user is connected to the network of the f

31、irst computer network card MAC address lock, as the only legitimate terminal, in order to provide normal network connection service.And if it is sharing the Internet router as network equipment itself with a MAC address, connected by the cable broadband will occupy the quota, connecting with other c

32、omputer on the router to share Internet access, will be issued by the bureau is detected at the router in the IP packet with other illegal MAC the address information, so office will detect these IP packets discarded or closed.Tips: packet card to send IP packet or other network layer protocol, it w

33、ill automatically split it and packaged into maximum 1518Byte, minimum 64Byte data frame. The data frame includes the target MAC address, their source MAC address and data packet protocol type and a DWORD type of CRC code.Due to the extremely individual city will use a permanent MAC address binding

34、rules, or by changing the dialing process account or password in the way, so it is difficult to solve, telephone network operators have been replaced by card or the use of sniffer software to detect the true account or password, so as to set the parameters of the dial right in the broadband router.B

35、ut from your description you can see, your city is just using a binding dial-up host MAC address of network card, so the use of broadband router special dialing mode, can all make it a IP data package contains a unified MAC address information, in order to break the limitation of the objective.Inter

36、net sharing schemeNow the majority of broadband routers support MAC address clone and host camouflage pattern and other functions,The conversion into a single networking equipment in the form of a router, to break through the multi machine sharing restrictions end MAC address binding.The TP-LINK pro

37、duct as an example, log into the management interface, click the menu on the left side of the network parameters, MAC address clone option, then turns to the right side of the window, in which will see using the routers MAC address is 00-14-78-B6-47-5D.The current log into the router PC using the MA

38、C address is 00-11-85-1B-0D-0C, click clone MAC address button (Figure 1), the router will convert itself to the MAC address for the currently logged in the MAC address of the host, the IP data and then send the package, contains only the MAC address information save, can break through the limitatio

39、n of multi machine sharing.Click the clone MAC address buttonIf this setting is still valid, then it can be the host camouflage pattern check, multi machine sharing restrictions can be saved after the breakthrough of broadband operators. In addition, in some areas of telecommunications, Netcom broad

40、band, will use a dedicated dial-up software, special character encryption account limit multi machine sharing, broadband router also provides related response function. For example, the broadband router settings dial mode, with special dial function, use it to add special characters for broadband ac

41、counts, deal with individual regions add special characters in the dial account restrictions in the.Broadband router dialing modesummaryAlong with the network operators in the limit of multi machine sharing the technology gradually, the original some infallible way out of action. According to this,

42、the broadband router vendors have also been carried out corresponding break operation, so now the use of broadband router friends, in the encounter many machine sharing restrictions, except for the corresponding crack set on the broadband router, may wish to update the Fireware version of this device, so you can find a better way in which so, multi machine sharing always can be smoothly.

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 社会民生


经营许可证编号:宁ICP备18001539号-1