In this guide we want to discuss the main facts to consider when configuring a router in order to have optimum speed combined with best balance and to ensure that all associations are properly made to the Internet.

Each router is a world and therefore it is impossible to state with certainty where every section is situated in each model. In each section we will put some types of different models that will help to find the equivalent section in each different model, nevertheless , if you will still find doubts rather than the corresponding segments can open a query in our forums where the community will probably be enchanted help.

How to Gain access to the Router’s Web Construction
The easiest way to configure a router is to do it through the web server it includes. This offers an interface accessible from any kind of web browser in order that from there we are able to configure the majority of the basic areas of this.

In order to access our router we all simply have to enter in our web browser the IP address of the same one particular, which usually corresponds to the one of the gateway. To know this IP address we can open up an MS-DOS window in Windows and type:


Most applied passwords
Generally routers are password guarded to prevent illegal users out of accessing them. If we have got changed the password and we do not know it we must obligatorily restart the router towards the factory prices to be configured, among other things, the default account details.

In terms of standard passwords, the best by many routers will be:

admin /
admin / admin
1234 as well as admin
192.168.l.254 Login
admin / 1234

If none of them do the job we should check with the manual or the sticker on the bottom just where they usually arrive written.

Configuring your router’s Wi-Fi securely and suitably
To stop users out of connecting to our access level and surfing around the Internet with the connection, have to configure a series of security procedures.

The first thing to accomplish is opt for the type of encryption that we are going to use. We could not leave the network open because anyone would probably connect to this and our traffic examine be protected nor make use of a simple exploit algorithm that permits knowledgeable users to acquire our security password.

The best option from which to choose in the encryption section is usually:

When this type of security is decided on, we can set up the password. Having determined a WPA2 security the password can easily have the characters we want, both uppercase and lowercase correspondence or icons.

The more intricate the pass word is and simple to remember meant for oneself, the better.

A few access items offer the opportunity to configure WPA2 TKIP + AES. This implies that devices which have been compatible with WPA2 will use this type of encryption to connect, but the ones that are not uses TKIP encryption, corresponding to WPA and fewer secure than WPA installment payments on your If all our devices are compatible with WPA2 and AES we must keep this option decided on, without TKIP.

2 . 4Ghz or 5Ghz?
As for the frequency, in the event that our router and all the devices connected to it support the 5Ghz technology we need to use this since it has many much less devices involving it (the 2 . 4Ghz network is in many spots saturated with devices that connect in a nearby spot by Wifi to various other access points), offers greater coverage, higher speed and better stability, nevertheless , if any of our gadgets do not support this frequency will not be capable to connect to the online world, so that we need to configure the network to 2 . 4Ghz and select the least saturated channel.

Most up to date routers have automatic route analysis so they really themselves will choose the least saturated channel to work with.

MAC PC filtering
Several models allow you to configure a “MAC Filtering” that assesses all the MACINTOSH addresses that connect to the access point and allows or sections access in line with the configuration.

In the event that our AP has this function we could add to the “white list” the MAC tackles of our devices by setting up this blocking so that just those APPLE PC addresses contained in the white list can be coupled to the Internet, departing all the other MAC addresses authorized) with gain access to blocked.

Leave a Reply

Your email address will not be published. Required fields are marked *