Ip Address

In addition to, an additional personal IP address that is widely used is, and in addition, just like the many other personal IP addresses, their purpose should be to maintain the data files that pass through them.

STUN Stun is synonymous with Session Traversal Utilities for NAT and as you may have guessed by its name, it is a collection of utilities that make it easy to cross a NAT device.

Look for “query timeout” errors in the “ response” list as long as they occur with respect to a “trigger request” error at 10 “ response”. You may need a repeater.

If the problem has lasted, try this method. Click the Start button and navigate to Run. Type ‘cmd’ (without quotes and as is) in the blank field and press Enter on the keyboard. Type “ping” (without the quotation marks) and press Enter when the Command Prompt window appears. Test ‘ping’ to verify that the computer is connecting to the router.

This is the step in which you need to configure your main DVR settings and customize them to your specific needs. These include activating motion detection or permanent recording, setting up monitor display, and checking other features such as email notification or resolution.

PING! – Then we use a command line function called PING. Type “cmd” in the execution field to bring up your DOS window. Now enter ping and enter the TCP / IP address of your default gateway. If you have not changed it, the IP address of your default gateway must be or When you receive a reply, you know that you are correctly connected to your router.

Wireless computers use network discovery software to automatically search for nearby SSIDs. Some of the more advanced software will query the SSIDs of neighboring networks and even show their names. Therefore, changing the network name only partially helps to secure your network. To prevent detection of your network name, you must disable SSID transmission.

Then you have to select the security mode. By default, it should be disabled. There will be several options, including WEP, WPA and WPA2. WEP is the least secure method. WPA is safer and WPA2 offers the best security. If you choose WEP, enter a passphrase and click Generate. Write down the generated key. If you select WPA or WPA2, create a shared key (password) and enter it in the box. Save the settings and the router will restart.

Here you have to remember a few things. If the above steps do not resolve your connectivity issue, disconnect the modem and / or router for a few seconds and try again. This “ipconfig” command displays the internet protocol assigned to your PC, such as and In the event that you have more than one connection to the computer, such as both the LAN and wireless network cards, you can use the ipconfig / all command, which displays all the IP addresses assigned to your computer.