The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 6



Ok, so here’s the synopsis… I’ve spent the last few articles setting up a D-link DWL-800AP+ as a repeater for a linksys WAP11 (v. 1.1) As of the end of the last entry I had a bit of a problem with WEP but that seems to have been resolved now and here I am to fill you in on what went wrong. It was really a simple mistake. When I copied and pasted over from the linksys….


What happened was, the linksys has it’s key information in pairs…. 00 00 00 for the hexidecimal numbers. When I copied that to the d-link all looked fine and I copied that information over to the pocket pc… nothing really worked after that. When I revisited the D-link configuration page I noticed that it had added 00000000 to the end of the key. On checking the first part it matched what was in the linksys. But, the last part (before the 00000000) did not match the end of the key.

The D-link wanted the information without spaces and truncated the overflow. I’m now able to ping the network again with the pocket pc, so encryption is working fine between the pocket pc and old linksys. Unfortunately…. the repeater is now not visible, so I’m doing a hard reset (pull the plug and plug back in.) That didn’t work and so now it’s on to plan b.

Related Posts

Blog Traffic Exchange Related Posts
  • Daylight Savings Changes on linux systems Might should have typed this up sooner, but... a while back I did an article on the daylight savings changes with regards to Windows 98 and how timezone editor tzedit could be used to make sure these OS's kept the correct time. Well, on the linux side of things there's......
  • Network Security - Arp spoofing So.... what is arp spoofing (poisoning).... and what are it's implications? ARP spoofing involves tricking a machine into thinking that you're machine is, yet another. Let's put this in IP address terms. Let's say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are......
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
Blog Traffic Exchange Related Websites
  • Internet Network Marketing - Creating Trust in Just Three Steps Getting traffic to your website is only half the battle, and actually it is the easiest part of your Internet Network Marketing business. First you must understand that there are 2 types of people on your list. What I like to call Window Shoppers Buyers // The main point to......
  • Getting a Better Corporate Blog Ranking pt 2 Ask a dozen different bloggers for strategies on getting a better corporate blog ranking, and you will get a different opinion for everyone that you ask. There are a number of ways to increase your blog's search engine rankings in the top search engines like Google, Yahoo and MSN, as......
  • iPhone Reveals Passwords in under 6 Minutes with this Attack German Researchers have been able to attack and hack the iPhone in under 6 minutes. The attack reveals passwords stored in a locked iPhone. The attackers have able to retrieve the data even without getting past the Passcode screen. The hack works on latest iOS 4.2.1. The attack requires possession......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site