Solved

Monitoring Wireless Clients on a D-Link Router

Posted on 2004-09-27
5
558 Views
Last Modified: 2013-12-14
We just set up a wireless network using a D-Link DI-524 router. I am wondering, is there a way to constantly monitor the clients connecting to the router? I know you can go to the admin webpage and see who is currently connected, but I am looking for a program to put on my computer that will continuously monitor and possibly log that info for me.
0
Comment
Question by:debonair231
  • 2
5 Comments
 
LVL 1

Accepted Solution

by:
DeviceMangler earned 50 total points
Comment Utility
D-Link just isn't supported by software logging utilities the way Linksys is.

The DI-524 itself has built-in logging.  These logs are cleared if the router is rebooted, but they can be saved first by having them sent to an e-mail address.

The procedure for doing this is shown on page 37 of the DI-524's manual, which can be downloaded from here...

http://static.tigerdirect.ca/pdf/D-Link-DI-524-manual-D700-2284.pdf

But I'm not sure what kind of info the DI-524 logs.  I know that the logging on many routers keeps track of any outgoing traffic coming from local nodes if they access outside Websites.  So this type of logging is effective only if your computers are loading sites.

There is a utility called WallWatcher that works with certain D-Link routers, though the DI-524 is not listed as one of them...

http://www.sonic.net/wallwatcher

I currently don't have a DI-524 on hand, which is why I can only offer suggestions at this point.  Good luck!
0
 
LVL 1

Expert Comment

by:DeviceMangler
Comment Utility
Just to follow up, I got my hands on a DI-624, which seems to be almost exactly the same as the DI-524.  This router's logs do show when a DHCP lease has been issued to a specific computer.  So if the user starts up their computer & pulls an IP from the D-Link, or if the user does an Ipconfig release/renew, it will show up in the log.  But no further info about the clients' outgoing network activity seems to be logged.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

    Over the past few years, small business and home owners have become so dependent on internet that a need for redundancy has arisen.    What happens when your small business or home / home office loses its internet connection?  The results c…
Cable Modem Provisioning from DPoE compliant server  This Article is to support CMTS administrators to provide an overview of DOCSIS compliance configuration file, and to provision a cable modem located at customer place from a Back office serve…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now