Problem configuring VOIP phone in WEP enabled wireless network

Posted on 2006-04-25
Last Modified: 2008-02-01
The situation is that I have a VOIP phone by Packet8 (  The phone works fine when hooked directly to my Linksys router by ethernet cable.  The problem is that I am trying to figure out how to use the phone in an environement when I can't connect the phone by hardwire to a router.  I have been successful hooking the phone to my laptop via a crossover cable and that scenario works as well.  The problem with that one is that the phone will only work when the laptop is connected.  I am trying to come up with a configuration that will work without the necessity of a laptop or a hardwire connection.  I purchased and tested a DLink wireless pocket router/AP/Client and this will receive the wireless signal and give an ethernet connection in a non-WEP network.  The problem with this scenario in a WEP network is that the phone does not have WEP configuration capabilities so when it tries to independently connect to the wireless network, it fails due to the encryption.  

So, my question for the networking guru is how can I conquer this situaiton.  I need to be able to configure a VOIP phone into the network without an ethernet cable or a laptop with crossover cable.  I have no problem purchasing a device if that will do the trick.  Please help.

Question by:aetherly
    LVL 36

    Accepted Solution

    You could use the wireless router/ap but disable WEP encryption. Most wireless ap's allow you to restrict which devices can connect my their MAC address so you will still have reasonable security in so far as stopping others from accessing your network.
    LVL 3

    Assisted Solution

    Why don't you just use a wifi phone? or you can use a wireless bridge... You should explain exactly why you are in his situation... if it is for traveling in hotels than you need to use your laptop.  Public wifi sites can req' cookie based authentication also.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Although VoiceOver IP has been around for a while, internet connections have only recently become fast enough to provide good call quality. Now, VoIP has become a real option for businesses looking at ways to improve their business model. In this ar…
    Article by: user_n
    How Sip Phone (User Agent) works and communicates with sip servers 1.  There is a sip server and a sip registrar.  The sip server and sip registrar can be one server or two different servers. The sip registrar is the server on which it is record…
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now