(Open in a new tab or window, you'll want to keep this one open.) (Where you would connect to any old website.) In fact, go ahead and use the following to attempt a connection. ![]() ![]() Pop this address straight into your internet browser. Should yours be nonstandard, then it's obviously already been changed by someone who knows how to operate the router, or yourself. I know some D-Link routers are 192.168.0.1. Your access address should be listed on a technical information sheet that belongs to your router, or available online (or sometimes, printed on a sticker on the device itself). Mine would be 192.168.1.1, and I know this from experience in dealing with mine. You'll need to know your router's access address. I'll be trying to also generalize it in a fashion that would apply to general networking. The following instructions are specifically for the WRT54GS Router, which, if that's your router as well you're in luck. Unfortunately I am only versed in the administration of a Linksys (model WRT54GS, but Linksys nonetheless) router. Usual suspect routers would be something along the lines of Linksys, D-Link, Netgear, Belkin etc. Routed connections typically end up in a configuration where your computer is connected to a small box which is connected to another. If your connection is wireless (meaning you are not using a CAT cable to give your computer internet, and Windows tells you that you are on a Wireless Internet Connection, you are definitely on a router.) ![]() If you do not have a router and are POSITIVE that you have a DIRECT CONNECTION to your internet, you can skip this section. If you go through a router (a device which allows multiple computers and devices to connect over one wired connection to your Internet Service Provider), you more than likely have whats called a hardware firewall that keeps your computer safe from a myriad of possible attacks. Let's start with analyzing your router, if you have one.Ĭheck your connection to the internet. SECTION 1: ROUTERS AND ALLOWING ACCESS TO YOUR COMPUTER OVER THE INTERNET. ![]() Section 1 is all about your router, ignore it if you have understanding how to forward ports, or do not need to. Being able to bypass a router's firewall is essential in all forms of server hosting. If you have a router in your household, but you are not the administrator of it (say, your parents or roommate operate the router and connectivity) and you cannot gain access to it or instruct the owner of it, you will be unable to produce a working Internet-accessible server. You'll need to set your computer up so that you can broadcast and recieve information to your potential clients without a firewall denying access. Section 3: PREPARING YOUR CLIENT TO CONNECTĪN UNDERSTANDING OF YOUR ROUTER'S CONNECTION ABILITIES IS VERY HELPFUL. Section 2: SETTING UP YOUR SERVER SOFTWARE FOR EXTERNAL CONNECTION Section 1: ROUTERS AND ALLOWING ACCESS TO YOUR COMPUTER OVER THE INTERNET Before we continue, you'll need all the tools that were required in your initial setup, as we'll be hexing your Pangya client and changing some. This is a guide on how to properly set up your Pangya private server to play on a WAN (Wide Area Network) Configuration.
0 Comments
Leave a Reply. |