The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 4



Ok, so now I had to add the new D-Link’s MAC address to the list of authorized MAC’s in the Linksys WAP11 (v. 1.1) For this, I call on wap11gui. Used to (since I use linux), I would have to suffer through a Windows boot on the laptop and balance the laptop on the edge of the bed and connect through usb to the linksys… now I can just administer it from my desk. Nice… Anyway, I log into that and Visit the “security” tab and “Authorized Mac”, and add the d-Link DWL-800AP+ to the list.


The MAC address for the d-link is on the bottom of the box, or an arping could find it as well. Once that was done I reset the linksys and everything started working. It was very smooth. However there are now concerns that I need to deal with. It doesn’t look as though the D-Link has support for restricting access by MAC address. I’ve looked several times through the web configuration and can’t seem to find that. So, it would seem to me that my MAC filtering may be easily bypassed…

IF an unauthorized MAC address used the D-link as it’s wireless access point, the linksys would approve access because it would see the D-Link’s MAC address. So it’s time to encrypt… The most compatible at this point across all my hardware is still WEP. (WPA would be nice, but WEP will work.) WEP encryption can be broken in about 5 minutes for someone that’s interested in breaking it, but for most purposes WEP should be enough of a discouragement to encourage someone to move along to lower hanging fruit.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
  • Network Security guide for the home or small business network - Part 7 - Wireless Networking OK - the last couple of entries got into some heavy lifting and some real learning on your part. Learning about what software needs to run, what services are running, updating them to keep current on security patches. We even talked about securing services listening for outside connections and limiting......
Blog Traffic Exchange Related Websites
  • Learn How to Get Traffic to Blog When it comes to writing in a blog, simply writing and assuming that traffic will come is not exactly the right way to go about things. If you want to learn how to get traffic to blog, then you need to be willing to take some extra steps to make......
  • The Blogger Proof Workout, Vol. 1 A Simple Workout for Fat Ass Bloggers You Know You Need to Read This! There aren’t many of us bloggers that take good care of ourselves. For the select few who do, congrats. This isn't only for bloggers, but for folks that spend way too much time in front of......
  • AT&T Linking iPhone to U-verse The Mac News Network is reporting that AT&T is working on linking the iPhone to U-verse.  I think a really cool feature is the ability to use the iPhone as a remote control for the cable box.  Another feature is the ability to control DVR functionality via the phone's Internet......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site