Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Aug 3, 2013

How to speed up your internet connection



Does your broadband seem a bit sluggish? If so, there may just be a simple solution.

You'll need:


    A computer connected to the internet.

Follow these step-by-step instructions to find out how to speed up your internet connection

Step 1: Read our guide on How to check your internet speed and discover what speed your broad connection is actually producing.

Step 2: Find out what speed you’re paying your internet provider (ISP) for. You may have to phone them to get the answer to this. If you’ve had your broadband for some time, it may be time to upgrade.

Step 3: Check what speed is achievable in your area. This is also covered in our guide on checking your internet speed. A number of ISP’s are starting to use Optical fibres instead of copper telephone cables to offer superfast broadband and this may be available through your ISP. But it is not yet available across the whole of the UK. This type of connection can offer up to 100mb as it claims to be able to transfer data at the speed of light. However, this can still be dependent upon your phone line, so check first what speeds you can realistically expect.

Step 4: Now that you know what speed you’re paying for and what your hardware is capable of producing, there are a number of things you can do that are likely to make your internet run faster:


    Check that you haven’t exceeded your monthly download allowance. Some ISPs cap internet speeds as a penalty for doing this.
    If possible, always use the master telephone socket for your broadband router.
    Don’t use a telephone extension lead with your router. If it’s unavoidable, use the shortest one you can.
    Make sure that all other telephone sockets in use are fitted with microfilters (see right). Not doing this can result in loss of internet speed and interference on the line.Microfilters
    Is your computer running any unnecessary applications in the background? This can slow things down considerably, but finding out if it’s happening can be a bit complicated. It might be best to ask an expert for help.
    Make sure your antivirus software is kept up to date. Viruses and adware can slow down your computer and the internet a lot.
    If you’re using wifi (wireless internet), make sure it’s password protected. Otherwise you could be providing your neighbours with free wifi!
    If you’re using a laptop with a wireless connection, try using it in a different room or consider using a network cable to connect to the router instead.

- See more at: http://digitalunite.com/guides/using-internet-0/connecting-internet/how-speed-your-internet-connection#sthash.LPJBPX9R.dpuf

May 28, 2013

How to Block a Website Using a Firewall

A firewall is a program that can be used to manage incoming and outgoing connections from your computer to a network or the Internet. Though a firewall is mainly used to block (or allow) specific programs from connecting to the Internet, you can also use firewalls to block users from being able to access specific Internet pages. You just have to enter your firewall's "Settings" utility and manually add a rule disabling users from visiting a particular site

Instructions

  1. Open your firewall's configuration utility. Steps to do this will vary depending on your specific firewall. For example, if you use the Windows Firewall (a permanent fixture of Windows XP, Windows Vista and Windows 7), you would enter the Windows Control Panel and open the "Windows Firewall" icon. 
  2. Select the "Settings" option in your firewall configuration utility. Some firewalls may call this the "Options" or even "Configure" menu option. This will bring up a list of programs and sites that are currently blocked from access, as well as a list of programs and sites that are currently allowed access to your network connection.
  3. Select the "Add" button and add the URL of the website you don't want users of your computer to be able to access.
  4. Click "OK." The URL of the website will appear on the list on screen and that website will be blocked from access on your computer by the firewall.

How to Block Unwanted Site From Your Router

This tutorial takes you step by step on how to block unwanted websites from your family computers. Remember that to block a certain websites from your router, you must be the administrator of or have administrator access to that router.

  1. Login to your router by using 192.168.1.1 in the URL address.
  2. There are three areas on the homepage.
    • On the left panel there is content filtering.
    • Under the content filter there are, Log, Block sites, Block services, Schedule and Email. We are only interested on the block sites for now.
  3. Click on the block site and you should see a list of choices.
  4. Under Keyword Blocking, you can either chose: Never, Per schedule or Always, depends on how you want to block the websites.
  5. In the type Keyword, Domain Name here: Enter any Web address, or keyword that you want to block. Then click the add button.
  6. In Block Sites Containing these Keywords or Domain Names: You should see all the keyword and Websites names that you are blocking.
  7. Click on "apply" once done blocking all the websites and keywords.

How to Block Websites By Editing the HOSTS File in Windows

DNS, which stands for Domain Name System, can convert the elusive IPv4 or IPv6 addresses to meaningful names, and then translate the characters back to IP addresses. For example, when you want to visit a website, DNS will tell your web browser the real IP address of it, and then web browser will download the web page directly from that IP address.
As you may expect, the process of translating IP addresses to website names will consume some time, which could cause access delay. Particularly, if the DNS servers are down, you will not be able to visit most websites through their URL, which isn’t uncommon.
Hence, it is necessary to make a list for mapping hostnames to IP addresses. That is what Windows HOSTS file does. On most Windows systems, the HOSTS file content is used preferentially over other methods, such as the DNS.

With the proper use of Windows HOSTS file, you can accelerate the access speed of favorite websites, test a website locally and even selectively block certain websites
In fact, blocking websites through the HOSTS file is an effective way to do it because it blocks it across all the browsers (we’ve previously discussed methods to block sites in Internet explorer and Google Chrome).
This article has some tips to manage the HOSTS file and block websites with it. The two methods I’ll discuss here are:-
  1. How to manually edit the HOSTS file.
  2. How to use a tool called HostsMan editor to do it easily.

1. Edit HOSTS File Manually

Windows NT platform systems including Windows 2000, Windows XP and Windows 7 have their HOSTS file in the path %SystemRoot%\system32\drivers\etc\ (“%SystemRoot%” is relative path, which depends on the system-wide environment variable, it should be C:\Windows or C:\WINNT in most cases).
Basically, you just need to type the above mentioned path in Windows search bar (or run box) to get to the “etc” folder where you’ll find the HOSTS file.
You can use any text editor to open the file and edit it manually.

 Note: For Windows 7 users, there’s one more step. Type “Notepad” in Start Menu search bar, and then right click on the “Notepad” item, choose “Run as administrator”. Now you can open HOSTS file with “File -> Open” menu in notepad.

 The HOSTS file contains lines of text including an IP address and one or more hostnames. You can add the mapping relationship of each websites. The comment lines are indicated by a hash (#) character, which will be ignored by system.


To block a website, simply add a line like this:
127.0.0.1 example.com
127.0.0.1 (or Localhost) is the standard hostname given to the address of your computer. You mapped the website name to your PC, hence you can’t visit the site any more. So if you want to block Facebook, just add this line: 127.0.0.1 facebook.com

How to Stop Hackers from Invading Your Network

Unethical hackers (in bad sense of this word) are always looking for weaker points in a network system to hack the security system of your company and get hold of confidential and new information.
Some such "black-hat hackers" derive a vicarious pleasure from wreaking havoc on security systems and some hackers do it for money. Whatever may be the reason, malicious hackers are giving nightmares to companies and organizations of almost all sizes. Especially, large corporate houses, banks, financial institutions, security establishments are favorite targets for hackers. However, this menace can be prevented to a great extent if proper security measures are taken at the right time.

  1. Follow forums. It is always a good idea to follow hacking forums as you will be able to pick up on all the latest methods being used. A good ethical hacking forum can be found at http://zero-security.org 
  2. Change default password immediately. Some software has built-in password to allow the first log in after installation; it is extremely unwise to leave it unchanged.
  3. Identify entry points. Install proper scanning software programs to identify all entry points from the internet into the internal network of the company. Any attack to the network needs to start from these points. Identifying these entry points, however is not at all an easy task. It is better to take the help of skilled ethical hackers who have taken special network security training to perform this task successfully.
  4. Perform attack and penetration tests. By running the attack and penetration tests, you can identify those vulnerable points in the network that can be easily accessed from both external and internal users. After identifying these points, you would be able to thwart attacks from external sources and correct the pitfalls that could become the entry points for intruders to hack into your network. The test must be done from both the internal as well as external perspectives to detect all the vulnerable points.
  5. Make user-awareness campaigns. All possible steps must be taken to make all the users of the network aware of the pitfalls of security and the necessary security practices to minimize these risks. You can conduct the social-engineering tests to determine the user awareness. Until all the users are aware of certain factors related to the network, protection cannot be carried out in the true sense of the term.
  6. 6
    Configure firewalls. A firewall if not configured properly can act like an open door for any intruder. Hence it is vitally important to set the rules to allow traffic through the firewall that is important to the business. A firewall must have its own configurations depending upon the security aspect of your organization. From time to time proper analysis of the composition and nature of the traffic itself is also necessary to maintain security.
  7. Implement and use password policies. Use strong password policies by having passwords of seven characters which are of secure length and relatively easy to remember. Passwords must be changed in every 60 days. The password should also be made up of both alpha and numeric characters to make it more unique.
  8. Use paswordless authentication. Regardless of the policies above, passwords are less secure than SSH or VPN keys so think about using these or similar technologies instead. Where possible, use smart cards and other advanced methods.
  9. Delete comments in website source code. Comments used in source code may contain indirect information that can help to crack the site, sometimes even usernames and passwords. All the comments in source code that look inaccessible to external users should also be removed as there are some techniques to view the source code of nearly all web applications.
  10. Remove unnecessary services from devices. You will not be dependent on reliability of the modules you actually do not use.
  11. Remove default, test and example pages and applications that usually come with web server software. They may be a weak point to attack and as they are the same in many system the cracking experience can be easily reused.
  12. Install anti-virus software. Both intrusion detection systems and anti-virus software must be updated regularly and if possible on a daily basis. The updated version of anti-virus software is necessary as it helps in detecting even the latest virus.
  13. Ensure physical security. Apart from ensuring the internal security of the network, you need to think about the physical security of your organization. Until and unless your organization has full security, any intruder can simply walk in your office premises to gain whatever information he wants. Hence with technical security, you must also ensure that the physical security mechanisms of your organization are fully functional and effective.

How to Prevent DoS Attacks

Denial of Service (DoS) attacks are among the most feared threats in today's cybersecurity landscape. Difficult to defend against and potentially costly, DoS attacks can cause outages of web sites and network services for organizations large and small. DoS attacks can also be lucrative for criminals, some of whom use these attacks to shake down businesses for anywhere from thousands to millions of dollars.
Any deliberate effort to cut off your web site or network from its intended users qualifies as a DoS attack. Such attacks have been successfully deployed against major online businesses including Visa and Mastercard, Twitter, and WordPress. DoS attacks effectively knock the services offline, costing lost business and negative publicity. They also force IT staff to expend valuable resources defending against the attackers.
If there is a silver lining to DoS attacks, it's this: The objective of the typical DoS attack is not to steal or expose confidential data. Most DoS attacks do not actually breach a company's network, they simply overwhelm it with traffic. In many recent cases, DoS attacks have been used by Anonymous and other hacktivist groups as a form of online protest against corporate and governmental targets whose policies or actions are at odds with the demonstrators.
The exception to this is when a DoS attack is used as a distraction to funnel attention and resources away while a targeted breach attack is being launched. Sony claims that Anonymous used that technique against them in a major 2011 attack that ultimately led to the theft of over 12 million customers' credit card data.
DoS vs. DDoS
The most easily executed type of DoS attack is one that is launched from a single origin. In this attack, a single machine somewhere on the Internet issues a barrage of network requests against a targeted victim machine. The requests themselves can take a variety of forms – for example, an  attack might use ICMP flooding via ping requests, or HTTP requests against a web server.
Single-origin DoS attacks can be effective against undefended victims, but they have a few key limitations:
  • Victims can block the originating IP address, either at the firewall level (to kill HTTP requests) or further upstream at the ISP level (to kill network-level floods).
  • Security tools now exist to detect and prevent ICMP flood attacks. Web servers can be configured to detect and block HTTP request attacks.
  • Enterprise products can identify and block single origin attacks as soon as they begin.
These days, the more nefarious type of DoS is called the DDoS, or Distributed Denial of Service attack.
In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.
DDoS: The Rise of the Botnets
Where does an attacker even get thousands of machines to launch a DDoS? Distributed Denial of Service attacks are executed by a so-called botnet – a collection of computers around the world infected with an attacker's malware.
Malware infections can install silent software on a victim machine which places it under the control of a remote attacker. Successful botnets can be comprised of hundreds of thousands of infected machines, typically without the owners' knowledge. There big money in creating botnets – among other things, botnet creators rent out their creations to criminal enterprises who can use them to launch a DDoS.
Large-scale DDoS attacks are not random. The perpetrators choose their victim deliberately, either due to a grudge, revenge, or an attempt to bully them into meeting some demands – possibly including paying extortion. Renting a botnot to launch a DDoS can cost about $100 per day, so the duration of an attack is partially dependent on how well-funded the attacker.
Inside a DDoS
The specific mechanisms used by a DDoS to "drop" a web site or network can vary depending on the attacker's preferred strategy. One major difference between DDoS implementations is whether they target the computing resources of the victim's machine or the network resources.
An attack against a web server based on HTTP flooding – as many as 10,000 requests per second – can overwhelm the server software, eventually consuming the machine's memory, CPU time, and possibly even disk space (if the log files grow out of control).
An attack such as a SYN flood instead focuses on the TCP network, overloading it with unacknowledged packets. Depending on how an organization's network is managed, this kind of DDoS can not only overwhelm a server, it also can overload switches or other network resources, potentially impacing a victim's entire network, including casualties unrelated to the victim if they share network space with the same ISP.
HTTP and SYN floods are not the only weapons in a DDoS attacker's arsenal but they are among the most common. Other attack mechanisms may include UDP, ICMP and DNS floods, as well as mailbombs. A so-called "mixed DDoS" can incorporate several of these weapons into one attack.
Can a DDoS be stopped?
Let's start with the bad news: It is very difficult to defend against a sophisticated DDoS attack launched by a determined adversary.
Many organizations struck by a DDoS are left to scramble in an effort to stop the attack once it has already begun. Sometimes this requires coordination with the ISP that provides network access. This is especially true when an ISP is forced to "null route" a victim – meaning that to protect other customers, the ISP routes traffic intended for the victim into the trash. This of course effectively prevents all access, including from legitimate users.
One of the more well-known countermeasures against a SYN flood is the use of "SYN cookies" either in the server OS or, better yet for network efficiency, in a network security device at the network edge such as the Cisco Guard. SYN cookies provide a more efficient method for tracking incoming TCP connections lessening the chance for a typical SYN flood to overwhelm the stack.
An effective defense against an HTTP flood can be the deployment of a reverse proxy – in particular a collection of reverse proxies spread across multiple hosting locations. A reverse proxy is somewhat akin to a bouncer at a nightclub, deciding which guests are allowed into the party, where the real web server is. By deploying many bouncers in different locations, the crush of incoming traffic is split into fractions, lessening the possibility of the network becoming overwhelmed. Deploying this type of architecture can be done in the scramble after an attack has begun, or baked into the network architecture of a web site as a preventative defense.
The limitation with these DDoS defenses is that if the attacker can generate network traffic at a higher rate than your network's Internet connection can handle, it will be hard to avoid a meltdown. But what these defense strategies do accomplish is at least force the attacker to get a bigger gun.

May 4, 2013

How to configure MAC address Filtering on TP-LINK 11G Router

 54Mbps Wireless G Routers
If you would like to limit the Internet access on some specified computers through the router, you can set up MAC Filtering to achieve it.
Step 1
You should know the MAC addresses of the computers on which you would like to allow them to access the Internet. You can check them on the computers with command prompt.
(1)Click Start->Run, type cmd and press Enter.
(2) Type ipconfig/all at the prompt window, press Enter, it will show the MAC address and other address information of this computer.
Step 2
Open the web browser and type the IP address of the router (default is 192.168.1.1) into the address bar and then Press Enter.
Step 3
Type the username and password in the login page, the default username and password both are admin.
Step 4
Click the Security->Firewall on the left of the page.
Step 5
Select Enable Firewall(the feneral firewall switch), and select Enable MAC Filtering. If you just would like to allow some computers to access the Internet, please select Allow these PCs with enable rules to access the Internet. Then these computers whose MAC addresses are set in the rules will have the right to access the Internet. Otherwise please select Deny these PCs with enabled rules to access the Internet.
Step 6
Click Save to save the settings.
Step 7
Click Security->MAC Filtering on the left of the page.
Step 8
Click Add New to edit the rule.
Step 9
Type the MAC address of the computer which can be allowed to access the Internet in the MAC Address bar. Set the Status as Enable.
Step 10
Click Save to save the settings.
Then the Internet can be accessed via the router on this computer whose MAC Address filter rule has been set.
If you would like access the Internet on other computers, please click Add New to add new rules. Please note one rule can be set with one MAC address.

Apr 24, 2013

Chatwing Chat Box an Exciting Communication Tool For Websmasters

hatwing Chat Box an Exciting Communication Tool Offering Many Customization Options

The Online realm is really fun to explore and experiment with. I like testing out new things and I always try to incorporate my creativity in everything especially in my blog. My blog is my representation online so I want people to see my personality whenever they visit it. I am, they say, a very bubbly person and creative and I really enjoy interacting with other people so I asked around on what chat tool I can install in my blog. Most of my friends, who are also blogger, recommended Chatwing.

What I liked about Chatwing is its high level of modification. I can adjust the widget’s size and color or totally recreate it in my own terms. The chat app is easy to use.  Chatwing Chat Box an Exciting Communication Tool  For Websmasters

First step is to provide my email address and agree to the terms and conditions before the next step which what I really had fun doing, customization!
 Chatwing Chat Box an Exciting Communication Tool  For Websmasters
What I liked about Chatwing’s modification process is that you have a preview panel on how your widget will look like while mixing and matching colors and designs. You can change the name of the chatbox and give it your own title.
 Chatwing Chat Box an Exciting Communication Tool  For Websmasters
You can change the chatbox color depending on your blog’s theme and if you want the chatbox to blend in or stand out on your site.
 Chatwing Chat Box an Exciting Communication Tool  For Websmasters
 Chatwing Chat Box an Exciting Communication Tool  For Websmasters
There is a wide range of color for you to choose from, you just have to decide: blend in or stand out?
 Chatwing Chat Box an Exciting Communication Tool  For Websmasters
We can also choose the font size and font style that we want to appear on the chat widget. Make sure that it is readable to most web surfers. The style shouldn’t cause any difficulty to your web visitors if you want them to return.

Apr 2, 2013

Connecting an access point to a wired router

Connecting an access point to an existing wired router will turn your home network into a wireless hotspot.  This allows your wireless computers and devices to connect to the network securely.
NOTE:  Images may vary depending on the router and model number of the access point you are using.  In this example, the Linksys WAP54G Access Point is used.
The diagram below shows how your network should be connected at the end of the configuration process.
 
Setting up the wireless settings on an access point
Identify the IP address of the wired router
In this example, the router being used is the Linksys BEFSR41 with the default IP address of 192.168.1.1.  When you are certain about the IP address of your router, it is easy to setup your access point with the router.  To learn how to check your router’s IP address.
Connect the access point to the router
Connect the access point to one of the numbered Ethernet ports on the router.  To configure the access point initially, use a computer which is hardwired to the router.
Configure the access point’s wireless settings
To configure the access point’s wireless settings, follow the procedure below:
Step 1:
Open the access point’s web-based setup page.  For instructions.
NOTE:  To access the web-based setup page using a Mac computer.
Step 2:
On the setup page, click on Wireless.
Step 3:
Enter the Network Name (SSID).
NOTE:  The SSID Broadcast should be set to Enabled so that wireless devices will be able to detect the wireless network of your Linksys access point.
Step 4:
Click Wireless Security and select your desired Security Mode.
WPA-Personal
Enter your desired password in the Passphrase field.
WPA2-Personal
Enter your desired password in the Passphrase field.
WEP
Enter a 10-hex digit key to Key 1.
NOTE:  In this example 40/64-bit (10 hex digits) key is used.  To setup a longer key, choose 40/128-bit (26 hex digits).
QUICK TIP:  Hex digits contain the letters A-F only and the numbers 1-0 and is not case sensitive.
Your access point is now configured.

Setting-Up 128-Bit WEP Wireless Security on a Access Point

Wired Equivalent Privacy (WEP) is a security protocol designed for Wireless Local Area Networks (WLAN).  It can either be a 64-bit key with 10 hexadecimal digits, a 128-bit WEP key with 26 hexadecimal digits.  This encryption will prevent other users from connecting to your wireless network and protect your wireless transmissions/communications from being accessed or received by other users.

To setup WEP Wireless Security on your Linksys Access Point, perform the following steps:

Setting-Up the Linksys Access Point to use WEP
Step 1:
Go to the access point’s web-based setup page.  For instructions.
NOTE:  If you are using a Mac computer to access the access point’s web-based setup page.
Step 2:
In the Wireless Security field, click Enable.

NOTE: If the screen on your access point’s web-based setup page looks different.
Step 3:
Click Edit Security Settings.
Step 4:
On the Security Mode, select WEP.
Step 5:
On the Default Transmit Key and select any number to determine which key you’ll be using.  In this example, number 1 is selected.
Step 6:
Under the WEP Encryption drop down menu and select 128 bits 26 hex digits.
Step 7:
If you want the router to generate a Password, look for the Passphrase field and type in a unique word, then click Generate.  In this example MySecretKey was used.
Step 8:
The result will be a string of random characters.  Copy Key 1 correctly since it  was selected as the Default Transmit Key.
NOTE:  Do not give this key to anyone. This will be your wireless network key.
Step 9:
Click Save Settings.

Setting-Up 64-Bit WEP Wireless Security on a Access Point

Wired Equivalent Privacy (WEP) is either a 64-bit key with 10 hexadecimal digits or a 128-bit WEP key with 26 hexadecimal digits. This will prevent other users from connecting to your wireless network.  It will also protect your wireless transmissions/communications from being accessed or received by other users.
To setup 64- bit WEP Wireless Security on your Linksys Access Point follow the steps below.
Setting-Up the Linksys Access Point to use WEP
Step 1:
Access the access point’s web-based setup page.  For instructions.
NOTE:  If you are using a Mac computer to access the access point’s web-based setup page.
Step 2:
On the web-based setup page, click the Wireless then click the Wireless Security sub-tab.
Step 3:
Click the drop-down arrow for Security Mode and select WEP.
NOTE: If the screen on your router’s web-based setup page looks different.
Step 4:
Click the drop-down arrow for Encryption and select 40/64-bit.
Step 5:
In the Passphrase field enter a wireless network password of your choice, then click the Generate button.
NOTE: In this example “MySecretKey” is used.
Step 6:
On the TX Key and select any number to determine which key you’ll be using. In this example, we selected 1.
Step 7:
Take note of the string of characters on Key 1 since this will be your network key.
NOTE:  Keep your network key confidential.
Step 8:
Click Save Settings.

Setting up wireless MAC Filtering to permit users to connect to the wireless network on your Linksys access point

Wireless access can be filtered by using the Media Access Control (MAC) addresses of the wireless devices transmitting within your network’s radius.  You can either permit or prevent specific wireless computers access to your wireless network.
This article will guide you on how to set up Wireless MAC Filter to permit users to connect to your wireless network.  To learn how to prevent users from connecting to your wireless network.
IMPORTANT:  Before setting up MAC filtering, you need to ensure the following:
  • Make sure you’ve identified all MAC addresses you wish to filter.  To learn how to find the MAC address of your wireless device.
  • Make sure the wireless devices you want to allow are currently wirelessly connected to the access point and are able to access the network.
To do this, follow the steps below:
Step 1:
Access the access point’s web-based setup page.  For instructions.
NOTE:  If you are using Mac to access the access point’s web-based setup page.
Step 2:
Click on Wireless > Wireless MAC Filter.
                     
Step 3:
Set Filtered MAC Address to Enable and select Permit from the options.
NOTE Permit will allow wireless connectivity to the wireless computers whose MAC addresses appear on the MAC Filter ListPrevent will deny wireless connectivity to the wireless computers whose MAC addresses are listed on the MAC Filter List.
Step 4:
Enter the MAC addresses of the wireless computer that you want to allow access to your wireless network.
 
Step 5:
Click .

Configuring an Access Point as an Access Point

The Linksys Wireless-G Access Points can be configured as an Access Point, Access Point Client, Wireless Repeater, and Wireless Bridge.  Wireless-G Access Points by default are set to Access Point Mode.
NOTE:  The AP Mode options on the access point depend on its version number. 
Checking if the WAP54G v1.1 is set to Access Point Mode 
Step 1:
Log on to the access point's web-based setup page.  For instructions, click here.
NOTE:  If you are using Mac to access the access point’s web-based setup page, click here.
Step 2:
When the access point’s web-based setup page opens, click AP Mode and make sure Access Point (default) is selected.
                 
NOTE: If the WAP54G v1.1 is not set to Access Point, select Access Point (default) then click Apply.
Step 3:
Click Apply if you made any changes.
Checking if the WAP54G v3 is set to Access Point Mode
Step 1:
Connect the Linksys access point to one of the router's Ethernet (1, 2, 3 or 4) ports.
Step 2:
Access the web-based setup page.  For instructions, click here.
NOTE:  If you are using Mac to access the access point’s web-based setup page, click here.
Step 3:
When the access point’s web-based setup page appears, click AP Mode and make sure that Access Point (default) is selected.
QUICK TIP:  When configuring the access point in AP mode, make sure also its wireless settings are the same with the router.  To check the wireless settings of your Linksys access point, click here.
Step 4:
Click  if you made any changes.

Configuring an Access Point as a Wireless Bridge

Linksys Wireless-G Access Points can be configured as an Access Point, Access Point Client, Wireless Repeater, and Wireless Bridge. The Wireless Bridge mode will turn the access point into a wireless bridge. Wireless clients will not be able to connect to the access point in this mode.
NOTE: When an access point is configured as a wireless bridge, it will link a wireless network to a wired network allowing you to bridge two networks with different infrastructure.



NOTE: When the WAP54G access point is set to wireless bridge mode, it will only communicate with another Linksys Wireless-G Access Point (WAP54G). 
To configure an access point as a wireless bridge, you need to perform three steps:
  1. Checking the Wireless MAC Address of an Access Point
  2. Setting-Up Wireless Bridge Mode on the WAP54G
  3. Changing the LAN IP Address of the Wireless Bridge 
Checking the Wireless MAC Address of an Access Point
NOTE: The following steps will be performed on the main access point using a wired computer.
Step 1:Connect a computer to the access point.


Step 2:Assign a static IP address on the computer. For instructions, click here.
NOTE: To assign a static IP address on a wired Mac, click here.
Step 3:
Open the access point’s web-based setup page. For instructions, click here.
NOTE: If you are using Mac to access the access point’s web-based setup page, click here.
Step 4:When the access point’s web-based setup page opens, take note of the Wireless MAC Address.


NOTE: The Wireless MAC Address you took note of will be entered on the WAP54G set as wireless repeater.
Step 5:After obtaining the wireless MAC address of the access point, configure the other WAP54G as a wireless bridge. For instructions, follow the steps below.
Setting-Up Wireless Bridge Mode on the WAP54G
Step 1:Connect a computer to the access point you want to configure as a wireless bridge. 


Step 2:Assign a static IP address on the computer. For instructions, click here.
NOTE: To assign a static IP address on a wired Mac, click here.
Step 3:Open the access point’s web-based setup page. For instructions, click here.
NOTE: If you are using Mac to access the access point’s web-based setup page, click here.
Step 4:When the access point’s web-based setup page opens, click AP Mode.


NOTE: The access point’s web-based setup page may differ depending on the access point’s version number.
Step 5:Select Wireless Bridge and type the remote access point’s MAC address that you took note of earlier.  


NOTE: Remove the colons (:) when typing the MAC address on the Remote Access Point’s LAN MAC Address field.
Step 6:
Click .
Changing the LAN IP Address of the Wireless Bridge
After configuring the access point as a wireless bridge, change its LAN IP address to avoid IP address conflict.

Configuring an Access Point in Access Point Client Mode

Linksys Wireless-G Access Points can be configured as an Access Point, Access Point Client, Wireless Repeater and Wireless Bridge. The Access Point Client mode allows the WAP54G to act as a wireless client. 
NOTE: The WAP54G will only communicate with another WAP54G when set to Access Point Client.
To configure the access point as an access point client, you need to perform three steps:
  1. Checking the Wireless MAC Address of an Access Point
  2. Setting-Up Access Point Client Mode on the WAP54G
  3. Changing the LAN IP Address of the Access Point Client  
Checking the Wireless MAC Address of an Access Point
NOTE: The following steps will be performed on the main access point using a wired computer.
Step 1:Connect a computer to the access point.

Step 2:Assign a static IP address on the computer. For instructions, click here.
NOTE: To assign a static IP address on a wired Mac, click here.
Step 3:Open the access point’s web-based setup page. For instructions, click here.
NOTE: If you are using Mac to access the access point’s web-based setup page, click here.
Step 4:When the access point’s web-based setup page opens, click Status then click Wireless Network.

Step 5:Take note of the Wireless Network MAC Address.

NOTE: The Wireless MAC Address you took note of will be entered on the WAP54G set as access point client. 
Step 6:After obtaining the wireless MAC address of the access point, configure the other WAP54G in access point client mode. For instructions, follow the steps below.
Setting-Up Access Point Client Mode on the WAP54G
Step 1:Connect a computer to the access point you want to configure as an AP client. 

Step 2:Assign a static IP address on the computer. For instructions, click here.
NOTE: To assign a static IP address on a wired Mac, click here.
Step 3:Open the access point’s web-based setup page. For instructions, click here.
NOTE: If you are using Mac to access the access point’s web-based setup page, click here.
Step 4:When the access point’s web-based setup page opens, click AP Mode.

NOTE: The access point’s web-based setup page may differ depending on the access point’s version number.
Step 5:Select AP Client and type the remote access point’s MAC address that you took note of earlier.
NOTE: Remove the colons (:) when typing the MAC address on the Remote Access Point’s LAN MAC Address field.

NOTE: You may also click Site Survey and select the remote access point you want to connect to.
Step 6:
Click .
Changing the LAN IP Address of the Access Point Client
After configuring the access point as an AP client, change its LAN IP address to avoid IP address conflict.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Computer Tricks and Tips