The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 4



Ok, so now I had to add the new D-Link’s MAC address to the list of authorized MAC’s in the Linksys WAP11 (v. 1.1) For this, I call on wap11gui. Used to (since I use linux), I would have to suffer through a Windows boot on the laptop and balance the laptop on the edge of the bed and connect through usb to the linksys… now I can just administer it from my desk. Nice… Anyway, I log into that and Visit the “security” tab and “Authorized Mac”, and add the d-Link DWL-800AP+ to the list.


The MAC address for the d-link is on the bottom of the box, or an arping could find it as well. Once that was done I reset the linksys and everything started working. It was very smooth. However there are now concerns that I need to deal with. It doesn’t look as though the D-Link has support for restricting access by MAC address. I’ve looked several times through the web configuration and can’t seem to find that. So, it would seem to me that my MAC filtering may be easily bypassed…

IF an unauthorized MAC address used the D-link as it’s wireless access point, the linksys would approve access because it would see the D-Link’s MAC address. So it’s time to encrypt… The most compatible at this point across all my hardware is still WEP. (WPA would be nice, but WEP will work.) WEP encryption can be broken in about 5 minutes for someone that’s interested in breaking it, but for most purposes WEP should be enough of a discouragement to encourage someone to move along to lower hanging fruit.

Related Posts

Blog Traffic Exchange Related Posts
  • SSH, Proxies (Proxy's?), Tor and Web Browsing For quite some time I've been making use of a dd-wrt modified linksys box on my home network as an openvpn endpoint so that when I'm out and about in the world, I connect the vpn, switch firefox to route through a squid proxy server on the home network and......
  • More information on Titan Rain ("Hack attacks") Earlier this year there was an article or two about a rumored "hack attack" that was ongoing against US Government (and contractor) computer systems. The stories claimed that the attacks seemed to be coming from China. Today I'm seeing a couple of articles on the topic. First up is an......
  • The D-Link DWL-800AP+ as a wireless repeater to extend wireless range - Part 3 So, now that I was "in" the DWL-800AP+ it was time to see if I could set it up as a repeater. I visited the "wireless" tab of the web based configuration and chose Repeater mode instead of AP mode and saw that I would need the Mac address of......
Blog Traffic Exchange Related Websites
  • How To Protect your Wi-Fi network from unauthorized access Wireless security is of major concern at this time. Terrorists might use your unprotected Wireless network for sending e-mails and/or Cyber Terrorists can use it for hacking into Government websites/networks. Your IP address will be traced by the Cyber Police and you'll be in unnecessary trouble. Very less people actually......
  • D-Link Announced 2 new 2-Bay Network Storage Devices Two new Network Storage Devices from D-Link D-Link today announced that its ShareCenter® 2-Bay Network Storage devices, the DNS-320 and DNS-325, are now available. Building off of the successful DNS-321 and DNS-323, the new DNS-320 and DNS-325 provide centralized storage, enabling consumers to easily share documents, files and digital media......
  • 11 Tips to Get More Traffic to Your Corporate Blog Now that you have your blog set up, and you're beginning to post your useful and relevant content, you may be wondering why you are not driving incredible amounts of traffic to your site. You are already publishing, and days are going by, so why is no one stopping to......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site