The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 4



Ok, so now I had to add the new D-Link’s MAC address to the list of authorized MAC’s in the Linksys WAP11 (v. 1.1) For this, I call on wap11gui. Used to (since I use linux), I would have to suffer through a Windows boot on the laptop and balance the laptop on the edge of the bed and connect through usb to the linksys… now I can just administer it from my desk. Nice… Anyway, I log into that and Visit the “security” tab and “Authorized Mac”, and add the d-Link DWL-800AP+ to the list.


The MAC address for the d-link is on the bottom of the box, or an arping could find it as well. Once that was done I reset the linksys and everything started working. It was very smooth. However there are now concerns that I need to deal with. It doesn’t look as though the D-Link has support for restricting access by MAC address. I’ve looked several times through the web configuration and can’t seem to find that. So, it would seem to me that my MAC filtering may be easily bypassed…

IF an unauthorized MAC address used the D-link as it’s wireless access point, the linksys would approve access because it would see the D-Link’s MAC address. So it’s time to encrypt… The most compatible at this point across all my hardware is still WEP. (WPA would be nice, but WEP will work.) WEP encryption can be broken in about 5 minutes for someone that’s interested in breaking it, but for most purposes WEP should be enough of a discouragement to encourage someone to move along to lower hanging fruit.

Related Posts

Blog Traffic Exchange Related Posts
  • Is the firmware current? The other day I was struggling with something that should have worked "out of the box". It was a little wireless bridge (Linksys WET54G Wireless-G Ethernet Bridge). The idea was to just connect it to the pc and it would just work. Well.... in a word NO. It "sort of......
  • Network Security guide for the home or small business network - Part 7 - Wireless Networking OK - the last couple of entries got into some heavy lifting and some real learning on your part. Learning about what software needs to run, what services are running, updating them to keep current on security patches. We even talked about securing services listening for outside connections and limiting......
  • More information on Titan Rain ("Hack attacks") Earlier this year there was an article or two about a rumored "hack attack" that was ongoing against US Government (and contractor) computer systems. The stories claimed that the attacks seemed to be coming from China. Today I'm seeing a couple of articles on the topic. First up is an......
Blog Traffic Exchange Related Websites
  • AT&T Linking iPhone to U-verse The Mac News Network is reporting that AT&T is working on linking the iPhone to U-verse.  I think a really cool feature is the ability to use the iPhone as a remote control for the cable box.  Another feature is the ability to control DVR functionality via the phone's Internet......
  • The Blogger Proof Workout, Vol. 1 A Simple Workout for Fat Ass Bloggers You Know You Need to Read This! There aren’t many of us bloggers that take good care of ourselves. For the select few who do, congrats. This isn't only for bloggers, but for folks that spend way too much time in front of......
  • Learn How to Get Traffic to Blog When it comes to writing in a blog, simply writing and assuming that traffic will come is not exactly the right way to go about things. If you want to learn how to get traffic to blog, then you need to be willing to take some extra steps to make......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site