• Appropriate configuration for adding a wireless router to a wired network

    What is the appropriate configuration for adding a wireless router to my wired network without affecting the network. This will be for visitors and does not need access to the network other than internet and printing. I would like to separate this out to our dmz. Are there white papers on this?

    TeachMeIT975 pointsBadges:
  • Static webpage to instruct users what to do to gain access to network

    I have seen schools that have informational pages when you connect to their hotspots telling you what you need to do to access it. What can I do to do something similar on my corporate network. Instructing the users to contact the right person by displaying a static webpage.

    Troubleshooter24755 pointsBadges:
  • Organizing traffic with mixed wireless and wired clients

    If I have a mixture of wireless and wired clients connecting to the same devices across my network do I need to separate the traffic into vlans? Will this help network speed? Or is it not necessary?

    NewnanIT1,110 pointsBadges:
  • Answer a Question, Get A Practical Guide to Linux!

    This week's IT book giveaway is A Practical Guide to Linux Commands, Editors, and Shell Programming. Answer one of five unanswered questions then leave a link to your answer in the discussion area below. On Friday, August 20, 2010 at 12 PM ET, we'll choose a winner from those who answer. Ready,...

    MelanieYarbrough6,345 pointsBadges:
  • Connecting two routers on the same network to extend range

    Can I connect 2 wireless routers on the same network to extend the range of the network? What changes will I have to make and what routers would you recommend?

    ITKE1,050,955 pointsBadges:
  • Results of two wireless clients logging into the same network with the same static IP

    If two wireless clients log on to the same network and both have the same static ip configured for the wireless adapter and they log on at the same time what will happen? Will either be able to use it? Or both intermittently? Is there a way to protect from this? We use static ips around here for...

    ITKE1,050,955 pointsBadges:
  • Wireless Network Bypassing

    hi i have one wireless Linksys usb network adaptor , i connect it to my Laptop after getting signal internet start normally .know question is that i want to use my laptop as a wireless repeater .( like attach one router to laptop and getting signal in my place) actually in my room there is very...

    Danial370 pointsBadges:
  • Bridging mode on a LinkSys router

    What is bridging mode on a linksys router and how does it differ from using signal extenders. Is this a good way to add routers to remote parts of my network to extend the signal? We have a big mix of OSes and machines connecting to the network and we have points where the signal does dwindle down...

    ITKE1,050,955 pointsBadges:
  • How can I see what users are connected to my wireless network?

    How can I see what users are connected to my wireless network? I am running a sonicwall tz170 for wireless connectivity. Is there a place I can see which machines are connected? Host name and dynamic IP? Can I export this information as well?

    MelanieYarbrough6,345 pointsBadges:
  • Can I connect a Linksys Wireless-G USB Adapter and an HP Photosmart C6280 to my wireless network without plugging the printer into my router?

    Hi, I just bought a HP Photosmart C6280 and it has an Ethernet port. I also bought a Linksys Wireless-G USB Adapter. Is there a way I can connect the two to my wireless network without plugging the printer into my router? What I want is the printer in one room, the router in another, and my two...

    NetworkingATE1,545 pointsBadges:
  • the gateway will not transmit the Mac address of my wireless devices connected to it.

    I am setting up a corporate WiFi hotspot. (Internet)--Router---Dell 2650 Server with hotspot software---Mesh corporate network system. The issue I am having is that the gateway will not transmit the Mac address of my wireless devices connected to it. It sees any device that connects to it as having...

    Komputerguy15 pointsBadges:
  • What are the dangers of others having access to my wpan password?

    I have netgear setup in my house for my laptop and another desktop computer in another room. Unknown to me a relative gave my access code to someone in the house to operate their ds; gave it to his mother for her new laptop who lives across the street and uses it on one or two of his devices. He...

    Doriselaine5 pointsBadges:
  • Windows XP router – wireless network security

    How can i protect my wireless network from war drivers or hackers?

    Cisco170080 pointsBadges:
  • AP-5131 WAP RADIUS Configuration?

    I am in the process of helping my boss apply some basic security to our current WLAN. The company has not applied security to this point since the information we have is not really that confidential and we are in a cynder block building which kills most of the signal before it even leaves the...

    erin0201215 pointsBadges:
  • Security of MAC-based wireless access permissions

    A colleague and I were recently debating whether it's an OK policy to allow wireless access based on users MAC addresses. He has a small office where most people are wired, but a few are wireless and are part of that notorious gang that can't be bothered with passwords. He also said that basing...

    ITKE1,050,955 pointsBadges:
  • WEP key for WLAN ( 4 mobile phone use )

    im trying to connect to a WLAN using my mobile phone. When i try to browse the web im asked to enter a WEP for WLAN. what does this mean and what should i do?

    NOMADIK5 pointsBadges:
  • iSeries Wireless Network

    We have an iseries 8203-E4A in our main office in NJ along with a SonicWall network device, we are thinking about going wireless in our office in California.   Any thoughts on speed and security?  

    Karens6180 pointsBadges:
  • Unauthorized wireless networks in your environment

    Do you have an official policy on unauthorized wireless networks in your environment? How do you go about detecting and disabling unauthorized devices, and what are the consequences? How often do you encounter this problem in your business?

    ITKE1,050,955 pointsBadges:
  • Networking two location within 150 meters

    I have two shop the distance between them is 150 metres i want to connect my computer with my two shop which will be the best and cheapest method and the price.

    Tyre5 pointsBadges:
  • how a wireless client (A) associated to Access point will communicate with a pc (B) connected to the ethernet port of the same Access point.

    I have a network scenario like this A (wireless client)    AP-----B (wired) When sending a packet/data from A to B, what is background process that happens between A->AP, AP->B and vice-versa. It would be great if someone can explain at packet level

    NKiran5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following