Solved

How to connect a wireless router to a networked server

Posted on 2004-03-30
12
304 Views
Last Modified: 2010-03-18
I have a network that has a PIX router and firewall and 6 servers and 10 workstations.  Now, the boss want to have wireless access for his laptop and has ordered a Dell Wireless Router.  Where do I connect it?  All the servers have 2 NIC cards.  If I connect it to one of the Windows 2000 servers, do I use Routing and Remote Access?  I'm not sure where to start.  Anyone have suggestions or a step-by-step howto?

Laura
0
Comment
Question by:MusicloverLCH
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
  • 3
12 Comments
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 125 total points
ID: 10713981
If your using DHCP plug it in a network socket and turn it on, Wireless access points are a breeze to install and setup, just remember to turn WEP on when its running or anyone will be able to "jump" on your network :)
0
 

Author Comment

by:MusicloverLCH
ID: 10714009
He didn't get a Wireless Access Point, he got a router.  Is there a difference?
0
 
LVL 31

Accepted Solution

by:
Gareth Gudger earned 125 total points
ID: 10714354
Yeah the Wireless Router will likely cause a plethora of problems includuing its native ability to provide DNS and send out DHCP addresses to clients on your network. You can turn all these features off but your router also will be NATing and firewalling too.

My recommendations would be to return it and get a straight WAP device. Less headache and cheaper.

[Then break his fingers and tell him not to order anything without your permission. :)]
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 

Author Comment

by:MusicloverLCH
ID: 10714489
OK, so if I configure the router to turn off DHCP and DNS and open ports on the firewall and turn on WEP, I can just plug it into a network jack?

I hate returning things to Dell.  It takes like 4 hrs on the phone.
0
 
LVL 31

Expert Comment

by:Gareth Gudger
ID: 10714617
Yes that should work fine. You could also plug one of the numbered ports into the jack (if it has a built in switch) and simply use it as a WAP with a hub. That should bypass the NAT + firewall. But be sure to switch off DNS/DHCP.
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10714977
Your router should NOT be sending DHCP broadcasts out of its WAN interface? (i.e.) the one you plug in the wall)
0
 
LVL 31

Expert Comment

by:Gareth Gudger
ID: 10715000
Yes put you also segment the network if you hook in the WAN port to the network. And stick a firewall and NAT device between the boss and the network. I dont think he will be able to browse the network or access resources without additional configuration.
0
 

Author Comment

by:MusicloverLCH
ID: 10715483
OK, i'll get a WAP.  If I get one that says it has 802.1x/WPA security, is that the same this as WEP?
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10715510
WPA is better than WEP
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10715525
0
 
LVL 31

Expert Comment

by:Gareth Gudger
ID: 10715656
Yes  I think that will save you a LOT of headaches. :)
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10723654
ThanQ
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question