How do you know if someone else is attempting access to your wireless network? (WRT54G)

I searched adn tried the Linksys FAQ to no avail to get an answer to the subject question.
Is there any way to verify who is actually using or trying to attempt use of your wireless network, if so, where do I locate and view this information?
I just set up a wireless system so my wife could get access from her wireless equipped laptop, but I really see no area to verify who is actually using the wireless network or if some other outside source/person is attempting to get access.
Any info on where, how and what to do to view this type of info would be greatly appreciated and if it can't be, shouldn't there be something added to the system that would allow one to view all users accessing their wireless system?
Thank you,
Clay Fugitte

Tracking down who is using your wireless system is usually difficult or impossible.  The router only knows the MAC address of the connecting computer.  MAC addresses can be faked.  Even if you knew the MAC address of the person connecting, what can you do with that info?  Go around the neighborhood asking people "Is this your MAC address?"
Instead of worrying about who is connecting to your wireless, you should simply set up wireless security.  This will keep intruders off your wireless network.  Then you don't need to worry about who is connecting.
It sounds like you are running an unsecured wireless router.  When you run an unsecured wireless router, anyone within range can login and use your Internet connection. At a minumum, this means that they will be using your bandwidth. At worst, they could be uploading copyrighted music, sending spam email, distributing viruses, or downloading child pornography --- all from an account with your name on it!   So my advice is --- secure your wireless network.
To set up wireless security, do the following:
First of all, to setup wireless security,  you must use a computer that is wired to the router.
Where to find the router settings: The router's login password is usually on one of the "Administration" pages. The other settings are all found in the "Wireless" section of the router's setup pages, located at 192.168.1.1
First, give your router a unique SSID. Don't use "linksys".
Make sure "SSID Broadcast" is set to "enabled".
Next, leave the router at its default settings (except for the unique SSID), and then use your pc to connect wirelessly to the router. Test your wireless Internet connection and make sure it is working correctly. You must have a properly working wireless connection before setting up wireless security.
To implement wireless security, you need to do one step at a time, then verify that you can still connect your wireless computer to the router.
Next, encrypt your wireless system using the highest level of encryption that all of your wireless devices will support. Common encryption methods are:
WEP - poor (see note below)
WPA (sometimes called PSK, or WPA with TKIP) - good
WPA2 (sometimes called PSK2, or WPA with AES) - best
WPA and WPA2 sometimes come in versions of "personal" and "enterprise". Most home users should use "personal". Also, if you have a choice between AES and TKIP, and your wireless equipment is capable of both, choose AES. With any encryption method, you will need to supply a key (sometimes called a "password" ).
The wireless devices (computers, printers, etc.) that you have will need to be set up with the SSID, encryption method, and key that matches what you entered in the router.
Retest your system and verify that your wireless Internet connection is still working correctly.
And don't forget to give your router a new login password.
Picking Passwords (keys): You should never use a dictionary word as a password. If you use a dictionary word as a password, even WPA2 can be cracked in a few minutes. When you pick your login password and encryption key (or password or passphrase) you should use a random combination of capital letters, small letters, and numbers, but no spaces. A login password, should be 12 characters or more. WPA and WPA2 passwords should be at least 24 characters. Note: Your key, password, or passphrase must not have any spaces in it.
Most home users should have their routers set so that "remote management" of the router is disabled. If you must have this option enabled, then your login password must be increased to a minumum of 24 random characters.
One additional issue is that Windows XP requires a patch to run WPA2. Go to Microsoft Knowledge base, article ID=893357 and it will direct you to the patch.
Sadly, the patch is not part of the automatic Windows XP updates, so lots of people are missing the patch.
Note:
WEP is no longer recommended. The FBI has demonstrated that WEP can be cracked in just a few minutes using software tools that are readily available over the Internet. Even a long random character password will not protect you with WEP. You should be using WPA or preferably WPA2 encryption.

Similar Messages

  • How will you know if someone is using video chat?

    How will you know if someone is using video chat? Does the green camera indicator turns red?

    Hi,
    You Buddy List will show two types of AV icons.
    "Single" type which indicates the person can only do 1-1 Chats.
    "Stacked" icons indicating they can do Multi-way chats.
    Example pic
    If they appear feint or "greyed out",  so to speak, then they are Busy to someone else.
    (if they are chatting with you they will appear dark again once connected)
    9:01 PM      Tuesday; November 15, 2011
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb( 10.6.8)
     Mac OS X (10.6.8),
    "Limit the Logs to the Bits above Binary Images."  No, Seriously

  • How to get music from someone else's itunes library onto your

    How to get music from someone else's itunes library onto your

    I have a different problem, perhaps someone can help.
    My friends music library is on a hard drive, I can move songs to my library, they play fine on my computer.....However, when I try to move them to my i-phone, they turn to a light grey color and will not play on my phone.  They also have a circle with dots in front of the song.
    Some security limitation apparently, just trying to over-ride.
    Song format is .m4a

  • How do you fix this error?  Can't access photos Your photo library is either in use by another application or has become unreadable

    How do you fix this error?  Can't access photos----" Your photo library is either in use by another application or has become unreadable"

    Try this:  launch iPhoto with the Option key held down and create a new, test library.  Import some photos and check to see if the same problem persists. If you can create and use a new library then your current library is damaged.
    If that's the case make a temporary, backup copy (if you don't already have a backup copy) of the library and apply the two fixes below in order as needed:
    Fix #1
    Launch iPhoto with the Command+Option keys held down and rebuild the library.
    Select the options identified in the screenshot. 
    Fix #2
    Using iPhoto Library Manager  to Rebuild Your iPhoto Library
    Download iPhoto Library Manager and launch.
    Click on the Add Library button, navigate to your Home/Pictures folder and select your iPhoto Library folder.
    Now that the library is listed in the left hand pane of iPLM, click on your library and go to the File ➙ Rebuild Library menu option
    In the next  window name the new library and select the location you want it to be placed.
    Click on the Create button.
    Note: This creates a new library based on the LIbraryData.xml file in the library and will recover Events, Albums, keywords, titles and comments but not books, calendars or slideshows. The original library will be left untouched for further attempts at fixing the problem or in case the rebuilt library is not satisfactory.
    OT

  • How do I use Airport Extreme to create wired access point on wireless network?

    Bit of an odd situation. I just went from cable to DSL at home and the modem moved from right by my computer to upstairs.
    Trouble is, there's no real easy way to get a cable from the modem upstairs to my X-box (sans wireless connector) downstairs.
    I could buy the wireless adaptor for the X-Box, but I was hoping I wouldn't have to spend any more money.
    I have my airport extreme, and I was hoping I could use it to create a wired access point on the network, recieving the signal from the wireless modem upstairs and allowing me to plug in the X-Box.
    Is this possible? If so, how? I've been through the config panel about a dozen times, but can't figure out what combination to set up.
    Thanks.

    Will it work if I use the express to create the network?
    Yes, providing that you have an 802.11n version of the AirPort Express and the Express has been configured to "Allow this network to be extended".
    Then, the AirPort Extreme can be configured to "extend" the Express network. When you do this, the AirPort Extreme will provide more wireless coverage and the LAN Ethernet ports are enabled, so you can connect an Ethernet device.
    This will not be a "normal" Ethernet connection. It will only work as well as the wireless "hop" between the Express and Extreme allow.
    For best results and performance, a wired connection through the hole in the wall is always best. If you decide to do this, you will need the "new" AirPort Express with both a WAN and LAN port on the device. But, you could try wireless first to see if it will meet your goals before you reach for the tools.

  • How do you know if someone who has stolen your ipod has restored it

    I recently left my iPod at work, and my manager who found it looked after it and kept it in the office. When I asked another manager the next day where my iPod was she couldn't find it in the office. After a week of waiting both the original Manager who found my iPod didn't know where it was and they said it was misplaced somewhere in the office.
    Today (over a month since I lost it) they said that someone could've possibly stolen it because they couldn't find it in the office.
    For the first week or so my friends have tried iMessaging me and the messages haven't delivered, which was normal. It was as if I still had my iPod but not in wifi range.
    Over a month later, I asked them to iMessage me again and see what it says and they were then prompted that it says "Message Delivery Failed"
    Does this mean someone has restored my iPod? Or is this normal when an iPod hasn't been charged and used for over a month?

    If you have already configured the iCloud Find My iPhone service on your iPhone, iPad, iPod touch, or Mac you can use it to locate your missing device, display a message on its screen, make it play a sound at full volume (even if on mute), remotely lock it, or remotely wipe (erase) it to protect your privacy. Requries iOS 6 to be trackable.
    You can use the Find My iPhone app on a different iOS device (running iOS 5 or better)
    You can use the Find My iPhone app on icloud.com
    You device may NOT be tracked if:
    Offline or Disconnectd
    Location Service Turned Off
    Restored by person who stolen it.
    Battery Dead
    Running below iOS 6 (ei. iOS 5.1.1)
    Change passwords used on that iDevice. Report to the police.
    Apple will do nothing without a court order.
    Reporting a lost or stolen Apple product
    iOS: How to find the serial number, IMEI, MEID, CDN, and ICCID number

  • HT204380 how do you know if someone is online

    I just want to know how someone will know that I'm online and available to talk using Facetime please

    You can't see if a contact can use FaceTime because you don't need to login in FaceTime to call her/him. An iPhone, iPad, iPod touch or Mac is permanently logged in, so you can call it without issues

  • How do you know if someone sent as family and friends or services and goods??

    Someone sent me 0.75 CENTS and i need to vertify if he sent as family and friends because he can chargeback if he sent as goods

    gringoguitarista wrote:
    I was on a public network and may have logged into some websites using user/password.  I also left my machine unattended for a short time.
    There's a person that's very suspicious hanging around, but I managed to take a picture of them. 
    How do I go about finding out if they managed to snag my passwords and/or install some sort of key logger on my machine?
    Sorry but I think the suspicious person in your scenario is the person taking pictures of strangers.
    Change your passwords if you are concerned.

  • How do you know if someone is hacking into your internet services

    I found several websites that I have never been to under settings in safari advanced settings. How did these get here and what can I do to stop it.

    Answered in the other thread you posted in.

  • How do you know if someone blocked you?

    Ok so my friend and I have been texting and then we just stopped and it wouldn't let me send a iMessage it always says message failed but when i iMessage my other friends it works and i think he blocked me did he? And how do i tell because when i text him it sends help me!

    Green simply means that the message was sent as an SMS, not iMessage. It has nothing to do with being blocked. Either the recipient has turned off iMessage or one or both of you does not have an active data connection.
    There is no way to tell if you have been blocked, short of asking the person.

  • How can you know if there is a change made to your mac?

    I'm not even sure how to ask this and I didn't know how to phrase the question.  I was using Firefox 10.0.2 and had been to a variety of my usual websites.  Nothing any different at all.  Signed into my credit union and when I had finished what I needed to do, I closed the browser as is my habit.  There were a few tabs open.  For a very brief moment a screen appeared that I did not recognize and all I could see was the word "Results",  and then it disappeared.  It briefly looked like a page of either a survey or the results of a survey.  None of which I remember agreeing to do.  I think if I had closed the tabs or minimized them before quitting Firefox, I would have been able to see what it was rather than just getting a glimpse. I have no idea if this is something to be concerned about. it seems to me that anything nefarious would not have let me see it at all. I have gone back and reviewed the history of everything I did today in Firefox and in Safari and there is nothing unusual.  I have been to no websites that I have not been to often.  There is nothing downloaded and the best I can tell by checking Finder is that there is nothing new, different or modified.  The only new thing I have added is AdbIock Plus in the last month. I have no anitivirus or spyware programs and would prefer not to.  The Web of Trust is my only other add on.  I checked Thomas Reed’s website to find out if there are any new things to be cautious about and just in case have disabled Java (though I have kept it updated) in both Firefox and Safari.  I guess my question is would installing ClamXV be over reacting and if not, is it better to do it from their website or the app store.  Is there anywhere that I can look to see if somehow something has gotten to my computer or just assume I had something opened that I completely forgot about.
    sorry this is so long but I haven’t had one of these semi panics in a while.  I hate when something I haven't had happen before, happens and I can't figure it out.  I thought providing as much information as I could think of would help ya'll know if I have something to be concerned about. 
    thank you.

    Thank you both so very much for your quick replies.  that is what I thought but the your assurances  help me ease my anxiety.  And yes the credit union has made a change because now it no longer recognizes my computer as a personal computer when I am using Firefox after the latest Firefox update, and requires me to answer a security question to log in, which is why I had been using Safari, but as I was in Firefox I was lazy and didn't switch browsers.

  • How do you know when your MacBook is infected?

    Hey All. Well my question is how do you know when your MacBook is infected with a virus? I came off windows and i have norton antivirus so i have something to tell me there. But on the Mac OS you rarely get viruses and i dont have a anitvirus program, so how do you know when you have one? And what does it do?
    Thanks!

    Since no ones got one that I know of it is hard to say. I figure that when the day comes that someone writes a Mac virus you will know real quick what happens. If your concerned you could use ClamXav. I use it if I download something for my wife's PC but have never found anything yet.

  • Dumb question but How do you know what generation iPad you have?

    Dumb question but how do you know what generation iPad you have?  I got mine as a gift on Xmas day 2012 but don't know how to find out what version/generation it is.  Can someone help me find that info?  I have looked within settings & elsewhere and I cannot find it.  Thanks in advance!

    Append the last three characters of its serial number to http://www.everymac.com/ultimate-mac-lookup/?search_keywords= and load the page.
    (83797)

  • How do I know if someone has submitted a form?

    How do I know if someone has submited a form, Do I get e-mailed?

    Hi;
    You can get emailed if you have a "Paid" level account, there is an "Email Notifications" feature that you enable on the "Options" tab for email notifications.  If you are using a Free account there is no notification and you would have to sign into your FormsCentral account to see when there are new responses, the existing/new response count is shown for each form on the My Forms tab as well as of course in the "View Responses" tab of the form.
    Thanks,
    Josh

  • How do you know which fields are mandatory while uploading PO using BAPI.

    How do you know which fields are mandatory while uploading PO data using BAPI. in a structure how do you know which fields are mandatory.
    and also, where how do you check that, the BAPI function module is executed.
    Thanks in Advance.
    Naveen.

    hi
    hope it will help you.
    Reward if help.
    REPORT zpo_bapi_purchord_tej.
    DATA DECLARATIONS *
    TYPE-POOLS slis.
    TYPES: BEGIN OF ty_table,
    v_legacy(8),
    vendor TYPE bapimepoheader-vendor,
    purch_org TYPE bapimepoheader-purch_org,
    pur_group TYPE bapimepoheader-pur_group,
    material TYPE bapimepoitem-material,
    quantity(13),
    delivery_date TYPE bapimeposchedule-delivery_date,
    net_price(23),
    plant TYPE bapimepoitem-plant,
    END OF ty_table.
    TYPES: BEGIN OF ty_alv,
    v_legs(8),
    success(10),
    v_legf(8),
    END OF ty_alv.
    TYPES: BEGIN OF ty_alv1,
    v_legf1(8),
    v_msg(500),
    END OF ty_alv1.
    *-----Work area declarations.
    DATA: x_table TYPE ty_table,
    x_header TYPE bapimepoheader,
    x_headerx TYPE bapimepoheaderx,
    x_item TYPE bapimepoitem,
    x_itemx TYPE bapimepoitemx,
    x_sched TYPE bapimeposchedule,
    x_schedx TYPE bapimeposchedulx,
    x_commatable(255),
    x_alv TYPE ty_alv,
    x_alv1 TYPE ty_alv1,
    x_alv2 TYPE ty_alv1.
    *-----Internal table declarations.
    DATA: it_table TYPE TABLE OF ty_table,
    it_commatable LIKE TABLE OF x_commatable,
    it_item TYPE TABLE OF bapimepoitem,
    it_itemx TYPE TABLE OF bapimepoitemx,
    it_sched TYPE TABLE OF bapimeposchedule,
    it_schedx TYPE TABLE OF bapimeposchedulx,
    it_alv TYPE TABLE OF ty_alv,
    it_alv1 TYPE TABLE OF ty_alv1,
    it_alv2 TYPE TABLE OF ty_alv1.
    DATA: po_number TYPE bapimepoheader-po_number,
    x_return TYPE bapiret2,
    it_return TYPE TABLE OF bapiret2,
    v_file TYPE string,
    v_temp(8),
    v_succsount TYPE i VALUE 0,
    v_failcount TYPE i VALUE 0,
    v_total TYPE i.
    DATA: v_temp1(5) TYPE n VALUE 0.
    DATA: x_event TYPE slis_t_event,
    x_fieldcat TYPE slis_t_fieldcat_alv,
    x_list_header TYPE slis_t_listheader,
    x_event1 LIKE LINE OF x_event,
    x_layout1 TYPE slis_layout_alv,
    x_variant1 TYPE disvariant,
    x_repid2 LIKE sy-repid.
    DATA : it_fieldcat TYPE TABLE OF slis_t_fieldcat_alv.
    SELECTION-SCREEN *
    SELECTION-SCREEN BEGIN OF BLOCK v_b1 WITH FRAME.
    *-----To fetch the flat file.
    PARAMETERS: p_file TYPE rlgrap-filename.
    SELECTION-SCREEN END OF BLOCK v_b1.
    AT SELECTION-SCREEN *
    AT SELECTION-SCREEN.
    IF p_file IS INITIAL.
    MESSAGE text-001 TYPE 'E'.
    ENDIF.
    AT SELECTION-SCREEN ON VALUE-REQUEST FOR p_file.
    *-----To use F4 help to find file path.
    CALL FUNCTION 'F4_FILENAME'
    EXPORTING
    program_name = syst-cprog
    dynpro_number = syst-dynnr
    IMPORTING
    file_name = p_file.
    v_file = p_file.
    START-OF-SELECTION *
    START-OF-SELECTION.
    PERFORM gui_upload.
    LOOP AT it_table INTO x_table.
    PERFORM header_details.
    v_temp = x_table-v_legacy.
    LOOP AT it_table INTO x_table WHERE v_legacy = v_temp.
    PERFORM lineitem.
    PERFORM schedule.
    ENDLOOP.
    DELETE it_table WHERE v_legacy = v_temp.
    PERFORM bapicall.
    MOVE po_number TO x_alv-success.
    APPEND x_alv TO it_alv.
    CLEAR x_alv.
    *-----To clear the item details in internal table after the operation for a header.
    REFRESH: it_item,
    it_itemx,
    it_sched,
    it_schedx.
    CLEAR: v_temp1.
    ENDLOOP.
    v_total = v_succsount + v_failcount.
    PERFORM display_alv.
    FORM GUI_UPLOAD *
    FORM gui_upload .
    CALL FUNCTION 'GUI_UPLOAD'
    EXPORTING
    filename = v_file
    filetype = 'ASC'
    TABLES
    data_tab = it_commatable
    EXCEPTIONS
    file_open_error = 1
    file_read_error = 2
    no_batch = 3
    gui_refuse_filetransfer = 4
    invalid_type = 5
    no_authority = 6
    unknown_error = 7
    bad_data_format = 8
    header_not_allowed = 9
    separator_not_allowed = 10
    header_too_long = 11
    unknown_dp_error = 12
    access_denied = 13
    dp_out_of_memory = 14
    disk_full = 15
    dp_timeout = 16
    OTHERS = 17
    IF sy-subrc = 0.
    *-----To fetch the comma seperated flat file into an internal table.
    LOOP AT it_commatable INTO x_commatable.
    IF x_commatable IS NOT INITIAL.
    SPLIT x_commatable AT ',' INTO
    x_table-v_legacy
    x_table-vendor
    x_table-purch_org
    x_table-pur_group
    x_table-material
    x_table-quantity
    x_table-delivery_date
    x_table-net_price
    x_table-plant.
    APPEND x_table TO it_table.
    ENDIF.
    CLEAR x_table.
    ENDLOOP.
    ENDIF.
    ENDFORM. " gui_upload
    FORM HEADER_DETAILS *
    FORM header_details .
    MOVE 'NB' TO x_header-doc_type.
    CALL FUNCTION 'CONVERSION_EXIT_ALPHA_INPUT'
    EXPORTING
    input = x_table-vendor
    IMPORTING
    output = x_table-vendor
    MOVE x_table-vendor TO x_header-vendor.
    MOVE x_table-purch_org TO x_header-purch_org.
    MOVE x_table-pur_group TO x_header-pur_group.
    x_headerx-doc_type = 'X'.
    x_headerx-vendor = 'X'.
    x_headerx-purch_org = 'X'.
    x_headerx-pur_group = 'X'.
    ENDFORM. " header_details
    FORM LINEITEM *
    FORM lineitem .
    v_temp1 = v_temp1 + 10.
    CALL FUNCTION 'CONVERSION_EXIT_ALPHA_INPUT'
    EXPORTING
    input = v_temp1
    IMPORTING
    output = v_temp1.
    MOVE v_temp1 TO x_item-po_item.
    CALL FUNCTION 'CONVERSION_EXIT_ALPHA_INPUT'
    EXPORTING
    input = x_table-material
    IMPORTING
    output = x_table-material.
    MOVE x_table-material TO x_item-material.
    MOVE x_table-quantity TO x_item-quantity.
    MOVE x_table-net_price TO x_item-net_price.
    MOVE x_table-plant TO x_item-plant.
    x_itemx-po_item = v_temp1.
    x_itemx-material = 'X'.
    x_itemx-quantity = 'X'.
    x_itemx-net_price = 'X'.
    x_itemx-plant = 'X'.
    APPEND x_item TO it_item.
    APPEND x_itemx TO it_itemx.
    CLEAR: x_item, x_itemx.
    ENDFORM. " lineitem1
    FORM SCHEDULE *
    FORM schedule .
    MOVE x_table-delivery_date TO x_sched-delivery_date.
    MOVE v_temp1 TO x_sched-po_item.
    x_schedx-delivery_date = 'X'.
    x_schedx-po_item = v_temp1.
    APPEND x_sched TO it_sched.
    APPEND x_schedx TO it_schedx.
    CLEAR: x_sched, x_schedx.
    ENDFORM. " schedule
    FORM BAPICALL *
    FORM bapicall .
    CALL FUNCTION 'BAPI_PO_CREATE1'
    EXPORTING
    poheader = x_header
    poheaderx = x_headerx
    IMPORTING
    exppurchaseorder = po_number
    TABLES
    return = it_return
    poitem = it_item
    poitemx = it_itemx
    poschedule = it_sched
    poschedulex = it_schedx.
    IF po_number IS NOT INITIAL.
    v_succsount = v_succsount + 1.
    MOVE x_table-v_legacy TO x_alv-v_legs.
    CALL FUNCTION 'BAPI_TRANSACTION_COMMIT'.
    ELSE.
    v_failcount = v_failcount + 1.
    MOVE x_table-v_legacy TO x_alv-v_legf.
    MOVE x_table-v_legacy TO x_alv1-v_legf1.
    LOOP AT it_return INTO x_return.
    IF x_alv1-v_msg IS INITIAL.
    MOVE x_return-message TO x_alv1-v_msg.
    ELSE.
    CONCATENATE x_alv1-v_msg x_return-message INTO x_alv1-v_msg SEPARATED BY space.
    ENDIF.
    ENDLOOP.
    APPEND x_alv1 TO it_alv1.
    CLEAR x_alv1.
    ENDIF.
    ENDFORM. " bapicall
    FORM DISPLAY_ALV *
    FORM display_alv .
    PERFORM x_list_header.
    PERFORM build_fieldcat CHANGING x_fieldcat.
    x_repid2 = sy-repid.
    x_event1-name = 'TOP_OF_PAGE'.
    x_event1-form = 'TOP_OF_PAGE'.
    APPEND x_event1 TO x_event.
    CALL FUNCTION 'REUSE_ALV_GRID_DISPLAY'
    EXPORTING
    i_callback_program = x_repid2
    is_layout = x_layout1
    it_fieldcat = x_fieldcat
    i_callback_user_command = 'USER_COMMAND'
    i_callback_top_of_page = 'TOP_OF_PAGE'
    i_save = 'A'
    is_variant = x_variant1
    it_events = x_event
    TABLES
    t_outtab = it_alv
    EXCEPTIONS
    program_error = 1
    OTHERS = 2.
    IF sy-subrc <> 0.
    MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
    WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4.
    ENDIF.
    ENDFORM. " display_master_data
    FORM USER_COMMAND *
    FORM user_command USING ucomm LIKE sy-ucomm selfield
    TYPE slis_selfield.
    READ TABLE it_alv INTO x_alv INDEX selfield-tabindex.
    CLEAR : x_alv2,it_alv2[].
    LOOP AT it_alv1 INTO x_alv1 WHERE v_legf1 = x_alv-v_legf.
    x_alv2 = x_alv1.
    APPEND x_alv2 TO it_alv2 .
    ENDLOOP.
    DATA : it_fieldcat TYPE slis_t_fieldcat_alv.
    DATA : x3_fieldcat LIKE LINE OF it_fieldcat.
    CLEAR : x3_fieldcat,it_fieldcat[].
    CLEAR x3_fieldcat.
    x3_fieldcat-col_pos = '1'.
    x3_fieldcat-fieldname = 'V_LEGF1'.
    x3_fieldcat-reptext_ddic = text-111.
    x3_fieldcat-ref_tabname = 'IT_ALV2'.
    APPEND x3_fieldcat TO it_fieldcat.
    CLEAR x3_fieldcat.
    CLEAR x3_fieldcat.
    x3_fieldcat-col_pos = '1'.
    x3_fieldcat-fieldname = 'V_MSG'.
    x3_fieldcat-reptext_ddic = text-112.
    x3_fieldcat-ref_tabname = 'IT_ALV2'.
    APPEND x3_fieldcat TO it_fieldcat.
    CLEAR x3_fieldcat.
    x_layout1-colwidth_optimize = 'X'.
    x_layout1-zebra = 'X'.
    IF it_alv2[] IS NOT INITIAL.
    CALL FUNCTION 'REUSE_ALV_GRID_DISPLAY'
    EXPORTING
    i_callback_program = x_repid2
    is_layout = x_layout1
    it_fieldcat = it_fieldcat
    i_save = 'A'
    i_callback_top_of_page = 'TOP'
    is_variant = x_variant1
    it_events = x_event
    TABLES
    t_outtab = it_alv2
    EXCEPTIONS
    program_error = 1
    OTHERS = 2.
    ENDIF.
    ENDFORM.
    FORM USER_COMMAND *
    FORM top.
    CALL FUNCTION 'REUSE_ALV_COMMENTARY_WRITE'
    EXPORTING
    it_list_commentary = 'Commentry'.
    ENDFORM.
    FORM BUILD_FIELDCAT *
    FORM build_fieldcat CHANGING et_fieldcat TYPE slis_t_fieldcat_alv.
    DATA: x1_fieldcat TYPE slis_fieldcat_alv.
    CLEAR x1_fieldcat.
    x1_fieldcat-col_pos = '1'.
    x1_fieldcat-fieldname = 'V_LEGS'.
    x1_fieldcat-reptext_ddic = text-108.
    x1_fieldcat-ref_tabname = 'IT_ALV'.
    APPEND x1_fieldcat TO et_fieldcat.
    CLEAR x1_fieldcat.
    x1_fieldcat-col_pos = '2'.
    x1_fieldcat-fieldname = 'SUCCESS'.
    x1_fieldcat-key = 'X'.
    x1_fieldcat-reptext_ddic = text-109.
    x1_fieldcat-ref_tabname = 'IT_ALV'.
    APPEND x1_fieldcat TO et_fieldcat.
    CLEAR x1_fieldcat.
    x1_fieldcat-col_pos = '3'.
    x1_fieldcat-fieldname = 'V_LEGF'.
    x1_fieldcat-key = 'X'.
    x1_fieldcat-reptext_ddic = text-110.
    x1_fieldcat-ref_tabname = 'IT_ALV'.
    APPEND x1_fieldcat TO et_fieldcat.
    CLEAR x1_fieldcat.
    ENDFORM. " build_fieldcat
    FORM BUILD_LIST_HEADER *
    FORM x_list_header.
    DATA: x_list_header1 TYPE slis_listheader.
    *-----List Header: type H
    CLEAR x_list_header1 .
    x_list_header1-typ = 'H'.
    x_list_header1-info = text-105.
    APPEND x_list_header1 TO x_list_header.
    *-----List Key: type S
    x_list_header1-typ = 'S'.
    x_list_header1-key = text-106.
    x_list_header1-info = v_total.
    APPEND x_list_header1 TO x_list_header.
    *-----List Key: Type S
    CLEAR x_list_header1 .
    x_list_header1-typ = 'S'.
    x_list_header1-key = text-107.
    x_list_header1-info = v_succsount.
    APPEND x_list_header1 TO x_list_header.
    ENDFORM. " build_list_header
    FORM TOP_OF_PAGE *
    FORM top_of_page.
    CALL FUNCTION 'REUSE_ALV_COMMENTARY_WRITE'
    EXPORTING
    it_list_commentary = x_list_header.
    ENDFORM. " TOP_OF_PAGE

Maybe you are looking for