Question about wireless security and setup.

Ok, I have a pretty long house and my router is in the garage and I want wireless access in my bedroom. Here's the deal. Coming from the wall I have cable modem plugged into a WRT54g. That feeds 5 or 6 different WIRED PC's on that side of the house, but the other side isnt wired. So 1/2 way across I have a WRE54G setup as a range extender to reach the bedroom. I just bought a WUSB11 because the pc in the bedroom has no open PCI slots, and doesnt need the speed of G so a B connection should be fine. If I turn off all security everything is ok, everybody gets connected, including the neighb's. So I turned on WEP in the router WRT54G, it generates 6 keys I setup the WRE54G from my laptop sitting right next to it, and I enabled WEP in that as well, so I enabled WEP there and entered key #2 from the list supplied by the WRT54G, key#1 went into my laptop, which connects just fine. HOWEVER in the bedroom the WUSB11 sees the network just fine, but no matter WHAT key I enter into the WUSB11 it will NOT connect in anyway. anyone have ANY ideas? I would REALLY love to have this working and I would HATE to have top turn off my security, I really dont like o tust ny neighbors. thanks j

thanks wizzard, now I had a chat going with linksys tech support and they suggested that the WEP keys in all THREE devices be the same. now I may have left out of my original message the fact that key #1 that was generated by the router, is currently being used in an ACER laptop that has a NON linksys G device, and it connects just fine. so should EVERYTHING on the wireless be using the same key? and oobviously the same transmit id (1) thanks for your help j

Similar Messages

  • Question about Wireless Design and Controller

    Hi Everyone,
    Although I am not new to Cisco, I have somewhat limited experience with Wireless in general.  I was hoping to get your help with the following:
    We currently have a total of 8 1130AG, 4 on each floor.  They were configured a few years ago, and now we are looking to update the design a bit.  Each AP has its own SSID, and just provide internet access.  Looking at the configuration, I noticed that they are not configured to use proper channels, just random channels (9, 10, 11, instead of 1, 6, 11, etc.).  I noticed that when I roam between one AP to another, I lose about 4-8 pings before I re-establish connectivity again.
    Here are my questions:
    1.  Do I need a controller in order to use just one SSID for the whole setup instead of the 8 seprate ones we currently have?
    2.  Will the controller helps in providing seamless transition when a client roams between AP's?
    3.  Is it normal to loose connectivity roaming around?
    4.  Can I reconfigure the current setup to use just one SSID and provide better transition between AP without the use of a controller?
    5.  Which controller would you recommend?
    We don't have a need to anything fancy ,I am aware that I can enable multiple SSID, VLAN's, etc.  Just trying to keep it as simple as possible, yet reliable.
    Your input is appreciate.
    Thanks

    1.  With 8 AP's only, a WLC would be nice-to-have but not necessary. You can configure WLSE and it will do some limited functions.
    2.  This depends on the signal strengths, wireless coverage and configuration.  If you enable WLSE, for instance, and you have no wireless black spots, then roaming should be no issues.
    3.  See #2.
    4.  You can configure multiple SSID (up to 16 are broadcasted) but if one AP doesn't have the SSID you use for roaming, the association will drop when the client tries to join that particular AP.  It's like mobile phone towers.  If your carrier is not in the area, you sure won't be able to use your mobile phone in that area.
    5.  For 8 1130 APs, I'd recommend the smallest of the lot:  2106 with either 6, 12 or 25 AP licenses.  I'd recommend you the 25 AP licenses.  If your finances allow you something bigger, then consider either the 4402 (25 AP licenses) or the 5508.
    Cisco 2100 Series Wireless LAN Controllers
    http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps8322/ps7206/ps7221/product_data_sheet0900aecd805aaab9.html
    Cisco 4400 Series Wireless LAN Controllers
    http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps8322/ps6307/product_data_sheet0900aecd802570b0_ps6366_Products_Data_Sheet.html
    Cisco 5500 Series Wireless Controllers Data Sheet
    http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps8322/ps10315/data_sheet_c78-521631.html

  • Question about Wireless Controller and LAG.

    I have a Wireless Controller 4400.
    When I configure the controller with LAG, I have to connect the controller to a L3 switch?
    If I connect the controller to a L2 switch the LAG works?
    Some one can tell me something about this?
    Thanks in advance,
    Rui

    Copper? so you are using rj-45 Gb SFPs on the controller. If that is the case, what is the speed of the switchports on the 2960?
    I use the rj-45 Gb SFPs on our 4402s and they work fine connected to Gb rj-45 ports on the switches.
    Also, check out the following:
    http://www.cisco.com/en/US/docs/wireless/controller/4.2/configuration/guide/c42mint.html#wp1116136
    "Using the CLI to Verify Link Aggregation Settings
    To verify your LAG settings, enter this command:
    show lag summary
    Information similar to the following appears:
    LAG Enabled
    Configuring Neighbor Devices to Support LAG
    The controller's neighbor devices must also be properly configured to support LAG.
    •Each neighbor port to which the controller is connected should be configured as follows:
    interface GigabitEthernet
    switchport
    channel-group mode on
    no shutdown
    •The port channel on the neighbor switch should be configured as follows:
    interface port-channel
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk native vlan
    switchport trunk allowed vlan
    switchport mode trunk
    no shutdown

  • Followup question about wireless scanning (and many thanks to PaHu)

    Hi,
    Got my Canon MP980 communicating properly with my macs AND our linux machine now!
    I'm having no luck using the bundled MP Navigator EX to scan documents and photos.. everything appears to be turned on and initialized correctly, the printer is on and idle on the home screen. but when I hit the scan button I see the error message:
    cannot communicate with scanner. cable may be disconnected or device may be turned off. and an error code of 1.0.0
    Is it possible the scanner (or this app) won't do it wirelessly? I can't use a cable without re-arranging a lot of furniture, lol.
    Best regards,
    Chris

    Hello Chris. I believe the MP Navigator software should work across the network, however it may have to be configured to do so. (Personally, I don't use the application - I've never found it to be that reliable. I prefer to scan directly into Acrobat using the Create PDF > From Scanner).
    I would think that in order to get Navigator working, you need to ensure that the network scanning utility is working and correctly configured. When you installed the IJ Network Tool, it should have also installed the Canon IJ Network Scan Utility. Often it will add an icon to your menubar that looks like an art-deco desk lamp. If it hasn't or you aren't sure which icon this is, you can open the application by navigating to Mac HD > Library > Printers > Canon > BJPrinter > Utilities and opening Canon IJ Network Scan Utility. This will display a pane that lets you set the MP980 as a network scanner. Once you have the MP980 you can then start scanning from an application to test.
    You can use Preview, but you will need to register the scanner first via Image Capture, located in Applications. When you first open Image Capture, you may see a message stating that no image capture device is connected. To register the scanner, click on Devices > Browse Devices. This pane will show 'Canon MP980 series Network'. Click on the 'Use TWAIN UI'. Another pane will now appear asking where you want to scan the file to, what name to call it and the format to save it as. Enter/select your desired settings and click Scan. The ScanGear window should now appear letting you preview the image and select a variety of other settings. Select Preview, highlight the section of the image you want, and press Scan to finish the scan.
    Once you get the above working, then you can try and get Navigator working, but as I have said, I don't think you need it unless you want to initiate the scan from the machine.
    HTH
    PaHu

  • Several questions about Application Security

    Hello,
    I have several questions about Application Security and perhaps I need a few tips...
    I have a lot of users in a few groups which have access to my application! And the different groups should have only access to their pages.
    In my application I use trees to navigate through the application.
    So my idea is that i display different trees for the different user groups and restrict the user to access the URL....so the user can only see and contact "their" pages.
    I know how to create the logic behind the trees, but how can I create the restricted URL access...
    The "No URL Access" in the Session State Protection can not be used, because I use a lot of links in reports and HTML regions.
    Is there another way to solve that?
    But I am unsure if that is a "good" solution for my problem!
    What do you think about that?
    Am I going to do that too complicated?
    Could that be done by authentication or authorization?
    (By the way, I do not understand the differences between authentication and authorization. Can anyone help?)
    I would be glad for any reply!
    Thank you,
    Tim

    Hey Arie and Scott,
    thank you for your quick reply!
    Now I understand the context around authorization and authentication...
    I try the Access Control List and I think that is a very nice feature! Really good!
    But now I am wondering, how I can create more privileges?
    So that I have a few "end-user-roles" and then I can choose who have access to a page and who not!
    Does anybody know how to do that?
    Thank you,
    Tim

  • Question About Color's and Gradients

    Hi all,
    I have a question about color swatches and gradients.
    I am curious to know, if I have 2 color swatches that I make into a gradient color, is it posible to change the tint of each indivdual color in that gradient and have that applied to the gradient without having to adjust the gradients opacity.
    The reason that I'm asking this is because in creating a project I found that the colors that I chose for to make my gradient from my swatches were to dark, and while I can adjust each one's tint to my liking (if the object they were applied to was going to be a solid color) but that doesn't seem to apply to the overall gradient.
    I hope that makes sense, I know that this was something that was able to be accomplished in quark and was wondering if I can do something similar.

    If you double click your gradient swatch (after adding it to the swatches)
    Then click a colour stop in the gradient, and then change the drop down menu to CMYK (or rgb)
    And you can alter the percentages there. It's not much use for spot colours but it's a start.
    But making tint swatches would be a good start anyway.
    At least then when you double click the gradient (in the swatches) to edit it you can choose from CMYK, RGB, LAB, or Swatches and adjust each colour stop to your liking.

  • Question about clear page and reset pagination

    Hi,
    I have a question about clear pages and the reset pagination in an URL. What is the reason why a clear page doesn't also trigger a reset pagination on the pages which are cleared?
    I can't really imagine a business case where it makes sense to clear all data of page items on a page and don't reset the pagination of reports on that page which probably use a page item in there where clause...
    The drawback of this behavior is that a developer always has to set the reset pagination checkbox when he clears the target page and the even bigger drawback is that if you specify other pages to clear, you can't reset pagination for them, because reset pagination only works for the target page.
    Thanks for your input.
    Patrick
    *** New *** Oracle APEX Essentials *** http://essentials.oracleapex.info/
    My Blog, APEX Builder Plugin, ApexLib Framework: http://www.oracleapex.info/

    Enhancement request filed, thanks,
    Scott

  • The question about portlet customization and synchronization

    I have a question about portlet customization and synchronization.
    When I call
    NameValuePersonalizationObject data = (NameValuePersonalizationObject) PortletRendererUtil.getEditData(portletRenderRequest);
    portletRenderRequest.setPortletTitle(str);
    portletRenderRequest.putString(aKey, aValue);
    PortletRendererUtil.submitEditData(portletRenderRequest, data);
    Should I make any synchronization myself (use "synchronized" blocks or something else) or this procedure is made thread-safe on the level of the Portal API?

    HI Dimitry,
    I dont think you have to synchronize the block. i guess the code is synchronized internally.
    regards,
    Harsha

  • A question about item "type and release" of  source system creation

    Hello expert,
    I have a question about item "type and release" of  source system creation.
    As we know,when we create a web servie source system,there will display a pop-up which includes three items as "logical system","source system"and "type and release".
    About the item "type and release",when we push "F4" button,there will be three default selections as below:
    "ORA 115     Oracle Applications 11i
    TLF 205     Tealeaf 2.05B
    XPD 020     SAP xPD".
    Who can tell me when and how should I use the three selections.
    And also I attempted to input the item by some optional letters except the default three selections and it seems that I can input it freely.
    Thank you and Best Regards,
    Maggie

    Hello DMK,
    Thank you very much for your answer.It is very helpful for me.
    Can I ask you further about it?
    I got that it is a semantic description item.
    You said the default selections are set by our basis people.Would you like to tell me how should we creat a new value except the default ones for item "type and release"?Only by inputing the value in the item directly?But you see we canot see the new value item we created by ourself when we push "F4" button next time ,is that ok?Or do we have to ask basis people to define one new value item just like the default seletions before we use it.
    Also if possible would you like to describe detail about "This becomes important when you are troubleshooting certain issues especially when RFC connection problems."
    Thank you and Best Regards,
    Maggie
    Message was edited by: Maggie

  • My friends has found he has, since 2006, accumulated multiple apple ids. he's very concerned about icloud security and security in general, having his pc hacked repeatedly. how can he permanently delete the extra, apple ids, please?

    my friend has found he has, since 2006, accumulated multiple apple ids. he's very concerned about icloud security – and security in general, having had his pc hacked repeatedly. how can he permanently delete the extra, apple ids, please? Thanks.

    Hello, windypinesands.  
    Thank you for visiting Apple Support Communities.  
    If your friend is concerned with the security of his Apple ID or iCloud account, I would recommend reaching out to our Apple ID Account Security team to assist him with this issue. 
    Apple ID: Contacting Apple for help with Apple ID account security
    http://support.apple.com/kb/HT5699
    Cheers,
    Jason H.

  • A few questions about the ka790gx and dka790gx

    i have a few questions about the ka790gx and dka790gx , how much better is the dka790gx compaired to the ka790gx ? . how much difference does the ACC function make to overclocking etc , i plan on getting a phenom II 940BE or 720BE . i already have the ka790gx so would it be worth building another system using the dka790gx mobo , or should i keep what i already have and just change the cpu ?

    It's largely irrelevant what other boards had VRM issues other than the KA790GX - the fact is it died at stock settings. Since there is little cost difference between the more robust DKA790GX (or Platinum if you really need 1394) why bother with the proven weakling? There are other examples around of the KA not having a robust power section.  There's no way I would use even a 95W TDP CPU in the KA and absolutely not O/C.....!
    As for the credentials of Custom PC, I have generally found their reviews accurate and balanced, and echo my own findings where applicable. If a little too infrequent.
    The fact that the KA has such a huge VRM heatsink leads me to my other comments on the Forum, particularly regarding the "fudge" aspect:
    """Henry is spot on - the notion that adding a heatsink to the top of the D2PAK or whatever MOSFETS is effective is virtually worthless. The device's die thermal junction is the tab on the device back - which is always against the PCB pad. The majority of heat is therefore dissipated in to the board, and the fact that the epoxy plastic encapsulation gets hot is simply due to the inability of the heat to be conducted away from the device die via the tab. Not sure when Epoxy become an effective conductor of heat.... Good practice is to increase the size of the PCB pad (or "land" in American) such that the enlarged PCB copper area acts as an adequate heatsink. This is still not as effective as clamping a power device tab to an actual piece of ali or copper, but since the devices used are SMD devices, this is not possible. However, the surface area required to provide sufficient PCB copper area to act as a heatsink for several devices isn't available in the current motherboard layouts. Where industrial SBC designs differ in this respect is to place the VRM MOSFETs on the back of the PCB on very enlarged PCB pads - where real estate for components is not an issue.
    Gigabyte's UD3 2oz copper mainboards sound like a good idea, on the face of it. However, without knowing how they have connected the device tabs to where and what remains a mystery. I suspect it is more hype than solution, although there will be some positive effect. From an electrical perspective, having lower resistance connecting whatever to whatever (probably just a 0V plane) is no bad thing.
    The way the likes of ASUS sort of get round the problem is to increase the sheer number of MOSFET devices and effectively spread the heat dissipation over a larger physical area. This works to a degree, there is the same amount of heat being dissipated, but over several more square inches. The other advantage of this is that each leg of the VRM circuit passes less current and therefore localised heat is reduced. Remember that as well as absolute peak operating temperature causing reduced component life, thermal cycling stresses the mechanical aspects of components (die wire bonds for example) as well as the solder joints on the board. Keeping components at a relatively constant temperature, even if this is high (but within operating temperature limits), is a means of promoting longevity.
    For myself, the first thing I do with a seperate VRM heatsink is take it off and use a quiet fan to blow air on to the VRM area of the PCB - this is where the heat is. This has the added benefit of actively cooling the inductors and capacitors too....
    Cooling the epoxy component body is a fudge. If the epoxy (and thus any heatsink plonked on top of it) is running at 60C, the component die is way above that.....
    It's better than nothing, but only just."""

  • Question about Airpor Extreme and wireless draft N

    Hello there. I have an Airpor extreme router. I have it for about a year now, but there's a doubt i could never get proper answer, and i'm looking for some help.
    So, my desktop has an pci-e wireless N board, and all my devices support N draft (airport extreme, iphone 4, ipad 2, apple tv 2G and a macbook pro)
    Under the router settings, i have two option to setup wireless networks.
    Normal wireless network (no guest network set), airport > wireless tab, is setup as default, i set a name, allow this network to be extended, Radio mode automatic, radio channel automatic, security and pass, and under network options i have enabled 5GHz network, with the same name of my other network, with the 5GHz in front of it, multi cast rates set to medium, transmit power 100% and selected wise channels.
    My doubt is, if i wanna take advantage of the N draft specific speed, i have to connect my devices on the 5Ghz network named specific, or no matter if i connect on the 5GHz or "normal" network (not the 5GHz one) it'll will recognize my devices on N draft automatic, and use the max speed available, or to use all the speed that the router can provide, i have to connect to the 5GHz one ?
    Apreciate any help.
    thank you

    802.11n can operate on both the 2.4 and 5 GHz radio bands with the higher frequency band offering greater overall bandwidth over the lower band. The only real drawback of the 5 GHz band is that is has less range than the 2.4 GHz band. Basically, a 5 GHz wireless network is only useable in the same room as the router, with the 2.4 GHz network covering a number of rooms.
    So for your network clients to gain "N draft specific speeds" they can connect to either band.

  • Question about internet security...please help!

    Hi everyone,
    I have a question about the macbook's internet security.
    A few days ago I became aware that my sibling was using a laptop for internet use at my house which he got from a person that I do not trust. He is very computer-savy and we're worried that he may have installed some form of spy ware on that laptop and in turn, may have tried (or succeeded) in accessing my Macbook through some form of spyware. My house is hooked up with a D-Link wireless router, and at the time, it had no internet/access-password.
    So my question is, could this person have accessed my computer and personal information remotely by and through the laptop that my sibling got from him. I was under the impression that Mac's have very strong firewalls, but I have also heard that as long as he knew what he was doing, he could have accessed my computer. I don't have a wireless "network" set up at my house, I just simply use the router for internet. But my sibling told me that this guy was his "network administrator" which leads me to believe that he must have had remote access to the laptop.
    Can anyone with knowledge on this problem please weigh in and let me know what I need to do to confirm that no one has accessed anything from my macbook.
    Thanks!

    One option if you want to be extra safe is turning on FileVault (System Preferences -> Security), which will encrypt everything on your computer so that if somehow someone does gain access to your computer they will have a next to zero chance of being able to read anything they get from your computer. You have to have a lot of extra hard drive space on your computer to turn it on though.
    Also, a "network" is just a connection between computers, regardless of the internet is involved or not. So when you connect your computer to the router which gives you the internet, you are putting your computer on a network. Now I believe that in order for this person whom you don't trust to gain remote access to your computer, they would have to have more information such as an IP address for your computer, through the router in order to get to it.
    One thing I think is very important to consider that isn't on the technical side of things is something called "Social Engineering" which is a form of cracking, or hacking. You can do your own research, but in a nutshell Social Engineering is getting people that have access to something I'm trying to hack to give me information. For instance, this person you don't trust could be giving your brother the computer in the hopes that he will download something through your router to that laptop which could give him IP addresses and other information. And then when he gets that laptop back he could scan it for useful information and your brother wouldn't know he did anything wrong at all. The best way to avoid this is purely education and communication. Even if your brother doesn't share the same suspicions about this person, surely he will understand the need to be careful and smart when it comes to sharing personal information in the digital world.

  • Wireless equipment and setup for Mac Book Pros

    I've recently bought a Mac Book Pro after having used PC's since the 80's. Like it so much, I ordered a second machine for my wife.
    Question: Using my Linksys wireless router used originally with our PC's, I've made several attempts to wireless network the two Macs using our same DSL connection but have failed each time.
    Can someone tell me what I need in terms of equipment and also where to find the instructions to set up both Macs via the wireless mode.
    Apparently, I'm clueless.
    Thank you.
    Mac Book Pro Mac OS X (10.4.9)

    Your Macs should work with the same wireless equipment as your Windows PCs.
    But, in my experience, there have been some problems with some versions of OS X and some versions wireless router firmware - specifically in the area of WPA wireless security.
    The first thing I would try is reconfiguring the Linksys to run an open network, with no security. If the MacBook Pro is able to connect correctly, reconfigure the Linksys with a new SSID (wireless network name) and enable WEP security. If that works correctly, reconfigure the Linksys with a new SSID and WPA2 security.
    I suggest using different SSID's for these tests because the Mac saves information about the wireless connections based on the SSID; using different SSID's for the different security settings reduces the chance the Mac will get confused by the security changes.
    Quad G5, PB 15" 1.5Ghz,MacBook 2.0GhzCore2Duo   Mac OS X (10.4.8)   MacBookPro 2.33Ghz C2Duo/120G/2G RAM, Logic Pro 7.2.3, Focusrite Saffire...

  • Question about Time Capsule and Spotlight

    I have a simple question about using Time Capsule and Spotlight. Is everything that goes on to Time Capsule indexed into Spotlight? It would appear so but when I search for something (that is still on my hard drive and also backed up to Spotlight) only the local copy appears. Would it be that it finds the closest copy and if that were not there it would point to the Time Capsule copy? Thanks in advance for clarifying this for me.

    The automatic setup in the airport utility has changed something.
    Is the line down to the TC from the express dotted.. in other words is wireless??
    Funny stuff happens.
    Please post the screenshots of the 3 pages from the airport utility setup for both airport express and TC..
    Make sure wireless is set to off in the express.
    Both should be set to dhcp on the internet tab and both set to off bridge mode on the network tab.
    So for example the bridge on the network tab.
    The summary page can also be a help.
    There is a half summary page when you click the item in the airport utility.
    There is also a fully summary page, when you hold option key and double click the TC icon for example.

Maybe you are looking for

  • Using WS-Security with Web Service Controls in WLI 8.1 SP3

    We have a process that calls a web service hosted on a .NET environment. The technique we have used is to generate a service control from the web service WSDL and call that control from a process. The web service is protected using a WS-Security user

  • Mail's Replied To icon no longer works. Is there a fix?

    A few months back I switched from Entourage to Mail. Most has gone well, but when I first began using Mail, I could click on the little icon that shows I replied to a message and it would show me my reply. This stopped working. Any fix for this? I wi

  • How to get a note to carry over to the next measure?

    I want to know how to "slide" into the one beat from the 15/16 beat of the previous measure. In other words, how can I get a note to cross over from one measure to the next? Thanks-

  • How to get the last executed SQL Statemnt of my session

    Hello, I am trying to log my SQL-Statements that I use in a PL/SQL Procedure or Package iinto a text file. How can I log my SQL-Statement without repeating the Statement? Here is an example: INSERT INTO people (id, name) SELECT people.nextval, name f

  • Business Intelligence BlockMixedArchitectureInstall Error

    Hi, when installing the SSDTBIVS2012 Business Intelligence Studio I always get a very useless "BlockMixedArchitectureInstall" error that tells me I should add some functionality to my SQL-Server instance, but does not tell me at all what functions an