Extending a third party network - security question

I have a problem with an extended network. The set up is as follows:
BT Business Broadband - 2Wire router/ADSL modem, providing SSID (lets call it networkA) - this has been working fine for 2 years without change
I added an Airport Express connected to said 2Wire router by Ethernet in Bridge mode
Followed the prompts in Airport utility and it also reports itself as SSID networkA, has taken an IP address from the 2Wire and I can connect to the internet on my iPad, iPhone and Mac. the AE has been set with the same WPA key as the 2Wire. Hence they are broadcasting the same SSID and expecting the same WPA key. I believe I should be able to move around the house and stay connected on whichever is providing the stronger signal.
Problem arises when I move to an area where the iPad wants to connect to the 2Wire due to proximity. It now asks me for the WPA key again to authenticate on the 2Wire, but refuses to accept it. I enter it (correctly) but it keeps reporting "Unable to join network".
I trust that all makes sense - any ideas anyone?

Accidentally I've activated MacBook Air (13-INCH, MID 2011), Mac OS X (10.7.4). My question is about iPhone

Similar Messages

  • Third-party keyboard security question

    Hello everyone,
    Apple says that third-party keyboard developers have access to all of the data user types. Then it says "If you enable Full Access", developers are permitted to access, collect and transmit the data you type".
    So my questions are:
    1. Do developers have access to the data I type with full access enabled or no?
    2. If I'm using apple keyboard but third-party keyboard is installed do they still have access to the data I type?
    For example: When I access to my credit card I will use apple keyboard but while I'm chat in Facebook or watsApp I use third-party keyboard. Do they(Third-party keyboard devs) have access to my credit card password?

    NO.  The 3rd party keyboard is only communicating with your iPad.

  • The picture ID on my outgoing Mac mail  is not mine -- it's the photo of boyfriend of my mother in law is appearing as my ID photo.  I have no link or connection with anybody  or other accounts whatsoever, and I don't have ANY third-party networks myself.

    The picture ID on my outgoing Mac mail  is not mine -- it's the photo of boyfriend of my mother in law is appearing as my ID photo.  I have no link or connection with anybody  or other accounts whatsoever, and I don't have ANY third-party networks myself.    HELP!!!

    Nobody but you sees that photo, it does not appear on outgoing emails.
    To remove the picture rather than change it, open Address Book and select your personal card, then from the menubar select Card > Clear Custom Image. Now the system will use Apple’s generic user picture in the login window and System Preferences’ Accounts pane. Mail and Address Book will remain blank until you designate a new picture in Address Book or System Preferences > Accounts.

  • Using a Third Party Network Adapter

    I would like to use a third-party network adapter instead of the Realtek network adapter built in to my L955-S5370. Are there any changes I need to make to the laptop before I connect the third-party network adapter? I thought I might want to disable the Realtek adapter in Device Manager.
    Solved!
    Go to Solution.

    Found my answer:
    Before adding a third-party wireless network adapter to a laptop that has a built-in wireless network adapter, you need to disable the laptop's built-in wireless network adapter. There are two ways to do this:
    From the Network and Sharing Center. These instructions from Microsoft were initially written for Windows Vista, but they work the same way for Windows 7 and Windows 8: Enable or disable a network adapter.
    From Device Manager. You don't have to be a 'dummy' to follow these instructions: How to Disable the Original WiFi adapter.
    If the laptop's wireless network adapter is re-enabled every time you reboot, you may need to disable the WLAN AutoConfig service, as follows:
    Go to Administrative Tools > Services
    If the WLAN AutoConfig service is enabled, Stop and then Disable that service.
    The laptops's wireless network adapter is now permanently disabled.

  • Help: network security question

    I just bought a PowerBook G4 running OSX 10.4.5 and was wondering about network security. What are some good anti-virus protection programs? I was searching the Apple store and found Net Barrier X4 and Virus Barrier X4 by INTEGO. What is the difference between the two? Are there other programs out there that are better? I will be the only person using this computer and it's for personal use, not business. Does anybody have any recommendations?
    powerbook G4   Mac OS X (10.4.5)  

    What you mention anti virus software programs. In your topic it reads "network security question"
    There is a difference between the two. Network security would be protecting a local LAN or WAN home network used for gaining access to the net. If this is what you want to do then you should have your network WEP or WPA password protected and enable OS X's personal Firewall by going to System Preferences->Sharing->Firewall->Start Firewall. Some good tips to remember are:
    * Never leave your network unlocked.
    *Keep your network password complex (12 digits and letters).
    *Don't hesitate to tell your ISP if someone is "using" your Network.
    *If you see any unknown files don't open them!
    Now if your were talking about a Software virus that affects your computer and causes it to malfunction/crash/break Then you don't have very many worries as there are no "Real" viruses for the Mac right now other then two worms, one which is spread via iChat and the other Bluetooth, both causing you to open them and give your Admin password to run them
    In other words moral of the story is don't open unknown files/programs and don't give your Mac your password unless you know what it's for and why it's asking.
    Net barrier acts as a firewall with more options all though I have found it to cause trouble with my network and have stopped using it.
    Virus Barrier, attempts to keep viruses from affecting your OS by scanning for them and warning you if it finds one and delete them. Once a again two different types of software.
    -Internet Wiz

  • HomeHub2 as Modem with Third Party Router, Securit...

    okay i've configured my Homehub to be set as a Router and conencted a Belkin G Plus Mimo router as the third party router, connection and everything is fine but theres on problem...
    security, there is no scurity protecting my wireless network which means everyone can access my network which is bad.
    when i try accessing the third party router (belkin router) i'm forwarded to the BT home hub control panel page...
    any help? i need protection on my wireless!
    Kind Regards, Bert

    Hi Bert,
    What you will need to do is manually change your Network Adaptor to an address in the 192.168.2.2-255 range. Set the gateway to 192.168.2.1 and try and access your third party router again. Then enable the DHCP Server on the LAN interface of your Belkin router.
    Don't forget that you have to be connecting through your Belkin router in order to use it properly like Computer - Belkin - Homehub, not Computer - Hub - Belkin otherwise it will just ignore the additional router (Belkin).
    You will also need to add a Static Route on the Belkin and set the Destination network to 192.168.1.0/24 and set the gateway to 192.168.1.254 in order to access the internet and Homehub. This will need to be set on the WAN interface.
    I hope this helps.
    Like this post? Give it a Star . If this post answers your question, please Mark it as the Accepted Solution.

  • Configuring extreme so that it joins a third party network

    I would like to configure an Extreme so that it joins a third party (Verizon) wireless network making it a remote prining hub for my USB printers. I have been successful in getting my MacBook Pro to print to it, but my G5 which is wired to a Verizon wireless router can't find the printer.

    I have a Verizon wireless network I use for my home/office network. I thought I could use my Exteme, which I was using before I went with Verizon, as a remote WDS printing hub for a USB printer in another room. I spoke to tech support and read some material and have been able to configure the Extreme to (I think) join the network.
    Using my MacBook Pro, using Airport to link directly to the Extreme, I reconfigured it by: Enabeling WDS, selecting Remote Base Station, selecting an AirPort ID from the Verizon network, turned off Distribute IP Address and set up a WEP security with the password for the Verizon network.
    Using AirPort Admin Utility, using my Verizon network, my MacBook Pro sees the reconfigured Extreme and I can print to my printer. My problem is that my G5 tower which is wired to the Verizon router, does not pick up the Extreme in Airport Admin Utility and needless to say won't print to it. So I am trying to figure out the last hurtle to a full remote network with all my computers.
    Like I said, I am ready to buy another Express and be done with all this, but I guess I want to exhaust all my options first, before I put the Extreem up for sale on eBay.

  • Re Third Party Processing Interview Questions

    Hai Friends
    This is the similar type of Questions I  faced in the interview.
    a. Explain the third party process
    b. What is the item category used?
    c. How will a PR or a PO get created automatically? What are the settings required?
    d. Is it necessary to make a Goods Receipt before creating the Invoice Receipt? What are the setting involved?
    e. When does a customer invoice get created?
    pl mail me the solutions to these Questions to my mail id <REMOVED>
    Message was edited by:
            Yathish K

    Hi
    Third party order processing is as follows:
    Assume three companies X, Y and Z
    X - The company,
    y - The customer
    Z - Vendor
    When ever X gets a PO from Y to supply some goods, X has an option of either manufacturing those goods or procuring those goods.
    If he is procuring the goods, there are two methods that are generally followed:
    Method 1) After receiving the PO from Y, X creates a sales order against Y.
    Now at the same time he also creates a PO to a vendor Z to produce the goods
    Z produces the goods and supplies to X
    X receives the goods from Z
    Then X delivers the same goods to Y.
    After that X invoices Y and Z invoices X.
    Note : Here there is no direct/ Indirect relation between Z and Y.
    This process is known as Trading Process. and the Material here is created  with Material type HAWA.
    The other method is a Third party order processing method:
    Here the glaring difference is that instead of Z supplying the material to X and X in turn supplying the same material to Y.
    X authorizes Z to supply the material to Y on his behalf and notify him once the delivery is complete.
    Now Z supplies the material to Y and acknowledges the same to X.
    Z  will send a copy of delivery acknowledgement and invoice to X.
    After receiving the delivery confirmation and invoice from Z, X has to verify the invoice and this process is known as invoice verification and is done in SAP through Tcode MIRO.
    The next step for X  is to create an invoice and submit to Y
    Only after the invoice verification document is posted  then only X can create an invoice for Y.
    This is the business flow that is followed for third party order configuration.
    There are few steps that have to be configured to enable the system to function as mentioned above.
    Step1)
    If you are always followwing a third party process for a material then you have to create the material using item category group BANS.
    The procument type should be marked as External procurement (F) in MRP 2 view of the material master record.
    if you are not always allowing third party order processing then u can create a material master record with item category group as NORM and the procurement type should be marked as ( X) meaning both types of procurment ( in house manufacturing and external procurement).
    step 2)
    the item category in the order should be manually changed as TAS.
    For that you need to confugure the item category determination
    ord type + item cat grp + usge + Hiv level = Item cat + Manual item cat
    OR + NORM +      +       = TAN . + TAS
    OR + BANS +       +       = TAS
    Step 3)
    make sure that during the item category configuration for TAS  you need to mark relevnat for billing indicator as F
    step 4)
    The schedule line cateogry for this type should be CS.
    make sure that you mark  subsequent type as NB - purchase requisition  in this schedule line category as this will trigger the purchase requision order immediately after the creation of the sales order and the PO to vendor is created against this purchase requiesion.

  • Third-party networking card in 17" PowerBook?

    I have a 1.67MHz 17" G4 with Airport connection problems. I want to test it by installing a third-party wireless card to see if it's the built-in Airport or the network.
    What will happen if I insert this card? Will it override the built-in Airport? Will it cause problems? The card is a BuffaloTech g54 and I am using it in my 867MHz G4 since Apple didn't make an Airport Extreme card for my model [boo hiss].

    When testing third party wireless cards then you should disable built in airport as some devices can be damaged if they are in too closer proximity to another wireless device.
    The card is a BuffaloTech g54 and I am using it in my 867MHz G4 since Apple didn't make an Airport Extreme card for my model [boo hiss].
    Apple's extreme cards are mini agp cards and there is no physical way they could be fitted to your 867mhz G4 anyway.

  • Third-Party Widget Security Concerns

    I don't understand much about the function of Muse widgets, but I have found a widget that I really like, but it is from a third party developer. Is it possible for the developer to make the widget inject malicious code into the site? I would like some input in the security of third-party Muse widgets. If they can inject malicious code, is there any way to verify if they are secure? Thanks!

    Suggest checking the widgets' developer's web pages for information on compatibility.  My quick glance at the Festive Lights homepage suggests it hasn't been updated since the version produced for compatibility with Tiger.  I don't know how they work, but they may need updating for compatibility with Lion.

  • Third party sales related question

    I am trying to analyze my client SAP system and came across a scenario like this.
    1) A 3rd party sales order is created without any subsequent documents like Purchase order etc as in a standard 3rd party flow. A new sales document type (for example ZABC(not the real names)) is configured for it and a normal item category is used in the Sales order.The schedule line category doesn't create any Purchase Requisitions and henceforth any subsequent documents.An IDOC is created though.Also the SP is a marked as a third party customer.
    Why we dont have he subsequent documents generated in this case.I am not able to understand this process with business point of view.Is it that they just creat a 3rd party SO in the system for there reporting purposes or anything else.? Is this kind of situation used for any other client then please let me know the reason behind it.
    2) I also have a customized 3rd party order type  (for example Z3AB (not the real names)) which follows all the standard 3rd party sales flow.But in this case the customer is not marked as a third party relevant but the item category is ZTAS (Third Party Item) because of which we get the complete flow of a standard third party sales.
    So please let me know the difference between the 2 scenarios.I was thinkin that the customer should always be marked as a third part relevant but thats not the case in the second option.
    Let me know in case of any other information required.

    Hi,
    General third party sales.
    two types of process we can follow.
    1. Third party scenario in which vendor sent the item to the customer and the company will bill the customer.
    2. The third party scenario where vendor send the material and the company delivery the stock to the customer and bill.
    As per the your CASE1:it refer to the second process above.
    created a sales order. and generated a IDOC. will hit the customer.
    Documentation is need, say if the idoc has wrong picked the quantity , or if the proof of delivery should be received. then with what reference you will change are no that the order is completed.
    Example : statiscal invoice will be done based on the vendor delivered material and Proof of delivery.
    as the second CASE 2: the process which clearly explains what we have done .
    Example : say if you have 200 materials , 100 materials will be send by vendor 1 and another 100 send by vendor 2. so this process  be clear where , what we are doing.
    thanks
    Kuntla

  • Third party network software to connect SnowLeopard Mac Pro to OS 9 G4?

    Since Apple pulled AppleTalk from Snow Leopard, I'm wondering if there is a third party bit of software out there that would allow me to connect a MacPro running Snow Leopard to a G4 running OS 9.
    In the meantime I will be going back to 10.5, but I'd much prefer to have my MacPro running the latest greatest...

    It doesn't work. From what I can gather, Snow Leopard requires AFP 3.0 to connect. Mac OS 9 only went to AFP 2.2. This has nothing to to with AppleTalk, which hasn't been used for file sharing in some time. It's just an incompatible version of AFP.
    Message was edited by: napabar

  • Virus Barrier X4 question and a Top 10 Network/Security question

    I am currently running Norton AV/Mac. It runs fine, no problems, no slow down, am happy! However, I know that there are some very experienced Mac users who are very down on Norton AV as far as causing problems/hogging resources/slowing things down...again, I don't have any problem, but I am still a newbie. I see however that one of the top 10 Network/Security downloads is Virus Barrier X4. If I want to run an AV program, could someone shed some light on wht this would be a better application? Also the number 1 download in this category is Mac Scan. I am confused, Forget virus's, I thought there was no Spyware/Malware? Why would so many people make this such a popular download..Curious! Thanks, Bill

    Bostonfan49,
    Spyware is a self-inflicted injury.
    To prevent drive-bys, remember to uncheck the Open "safe" files after downloading box in the Safari>Preferences>General tab and make sure that you're blocking pop-up windows.
    Configure your firewall correctly (turn off ALL unused services) and stealth it.
    Don't use P2P (Limewire and the like) or visit "dodgy" (unknown, copyright infringing, skanky, pr0n, etc.) Web sites.
    Never, ever install any program or give any installer your admin password unless you are certain that you know and trust the source.
    Create a separate administrator account for installing software and updates and make your normal user account an ordinary, nonadminstrative user.
    OS X is not immune to spyware: The spyware would still have to be coded to run in OS X. Requiring an administrator account and click-the-"Yes"-box user permission to install and run didn't prevent KaZaa (and its bundled nasties) from being downloaded and installed by millions, so this OS X "barrier" to malware is subject to the same vulnerability. That said, I'm not aware of much of anything in the way of spyware for Macs.
    -Wayne

  • Quick network security question

    a bit of history...
    i have two macs. Mac1 is connected to my DSL modem for internet. Mac2 is connected to the Mac1 via airport. I share the internet connection on mac1 so that mac2 has access to the internet ( i do this because i don't have a wireless router)
    My question is that at the moment anybody can connect in the wireless network and use the internet connection on Mac1. How can i add a WEP password to make it secure?
    Thanks
    J

    Someone answered whilst I was writing this. But here is a screen shot just incase.
    Goto your System Preferences->Sharing. Then select the <Internet</b> if Internet Sharing is on turn it off. Then select Airport Options
    However you can add a WEP password if you like but WEP is not secure . It can be cracked very easily with tools available on the net. WPA is the only protection worth using at the moment.
    As you can pick up a wireless router that supports WPA very cheaply that would be your most secure solution.
    iBookG4 1.33ghz. 20inch iMacG5, 1.2ghz Mac Mini, ipod photo, iSight Mac OS X (10.4.3) Linksys WRT54gs+1.05 Talisman Firmware, Telewest 10mb/384k
    Message was edited by: Tim Haigh

  • Airport Express 802.11n on third party network

    Hi,
    I've got an 802.11g wireless network with one older Airport Express 802.11g Base Station and a newly purchased Airport Express 802.11n Base Station. For some reason the new Base Station won't work properly on the 802.11g network. I can configure it from factory settings and it will connect to the network but as soon as I try to get it up and running with the older Base Station it disconnects and can't reconnect to the network. Is there anyway to configure the newer 802.11n (default) Base Station to boot with 802.11g as its default protocol?

    Did you set up the new AX in "Join a wireless network" mode? After you restart the AX, is there a steady green light on it? Can you see the AX on Airport Utility.
    If you are still having problem, try disable the security temporarily see if that is causing the problem.

Maybe you are looking for

  • Performance is bad wile using qaaws in xcelsius - tips to improve?

    Post Author: RMS CA Forum: Xcelsius and Live Office Hi,      Im using qaaws as the source for my xceslsius dashboard. I am able to create and fetch data using the web services and also display it in components in my model. However, the performace is

  • CAL Instance missing all the times I login (region EU)

    I've created the instance and all seemed fine. I suspended and logged off. I logged in again and the instance was missing. Created again, logged out automatically by the system after some time. Logged again and the instance is missing again !!! Any i

  • CS5.5 | ProRes 4444 - Interpret Footage does NOT see Alpha Channel

    I thought this problem would have been taken care of by now. Guess the bug fixes in CS5.5 are few if at all 1) Export any movie to ProRes 4444 and set to export alpha channel straight. 2) re-import to AE 3) Open Interpret Footage Dialog.... One gets

  • Having an iPad problem I don't see anywhere else. PLEASE HELP!!!

    Starting about a week ago when I charge my ipad the screen stays on and flashes a battery icon with the % charged. It charges but VERY slowly because the screen is on all the time. Even if I hit the power button on top it flashes back on in a second

  • Miro and F-43

    Hi all Invoice vetification will be done in MIRO (this is MM side) it post the entry also Then again the fi guys why they neet to go for f-43 Plz give me the answer