The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 4



Ok, so now I had to add the new D-Link’s MAC address to the list of authorized MAC’s in the Linksys WAP11 (v. 1.1) For this, I call on wap11gui. Used to (since I use linux), I would have to suffer through a Windows boot on the laptop and balance the laptop on the edge of the bed and connect through usb to the linksys… now I can just administer it from my desk. Nice… Anyway, I log into that and Visit the “security” tab and “Authorized Mac”, and add the d-Link DWL-800AP+ to the list.


The MAC address for the d-link is on the bottom of the box, or an arping could find it as well. Once that was done I reset the linksys and everything started working. It was very smooth. However there are now concerns that I need to deal with. It doesn’t look as though the D-Link has support for restricting access by MAC address. I’ve looked several times through the web configuration and can’t seem to find that. So, it would seem to me that my MAC filtering may be easily bypassed…

IF an unauthorized MAC address used the D-link as it’s wireless access point, the linksys would approve access because it would see the D-Link’s MAC address. So it’s time to encrypt… The most compatible at this point across all my hardware is still WEP. (WPA would be nice, but WEP will work.) WEP encryption can be broken in about 5 minutes for someone that’s interested in breaking it, but for most purposes WEP should be enough of a discouragement to encourage someone to move along to lower hanging fruit.

Related Posts

Blog Traffic Exchange Related Posts
  • The D-Link DWL-800AP+ as a wireless repeater to extend wireless range - Part 2 For starters, I hooked the D-link DWL-800AP+ up and connected it through a crossover cable to my usb network card. That way I could access it exclusively on one adapter and look online for information with the other adapter, which came in quite handy. The first thing I found was......
  • The D-Link DWL-800AP+ as a wireless repeater to extend wireless range - Part 1 I've got a single access point for my wireless network layer at the house and unfortunately have at least one real "dead spot" in the house. As luck would have it that dead spot is at the couch... so for some time I've looked at ways to extend the wireless......
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
Blog Traffic Exchange Related Websites
  • The Blogger Proof Workout, Vol. 1 A Simple Workout for Fat Ass Bloggers You Know You Need to Read This! There aren’t many of us bloggers that take good care of ourselves. For the select few who do, congrats. This isn't only for bloggers, but for folks that spend way too much time in front of......
  • Learn How to Get Traffic to Blog When it comes to writing in a blog, simply writing and assuming that traffic will come is not exactly the right way to go about things. If you want to learn how to get traffic to blog, then you need to be willing to take some extra steps to make......
  • Hidden IP Address Easy Information When connecting on the Internet, your property computer is assigned a public Ip. As you visit Websites or other Internet servers, that public Ip is transmitted and recorded in log files kept on those servers. Access logs leave behind a trail of one's Internet activity. When it were possible to......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site