Solved

Linksys router with only on connection

Posted on 2006-10-20
3
185 Views
Last Modified: 2013-11-09
I have a Linksys router and have Bellsouth DSL.   I have hooked up the router exactly as the instructions say, but then we don't have internet on our desktop computer.  When we have internet on the desktop, we don't have it on the wireless laptop, and when it's on the laptop, we don't have it on the desktop. The idea is to have both.
0
Comment
Question by:brianblang
3 Comments
 
LVL 54

Expert Comment

by:b0lsc0tt
ID: 17778521
brianblang,

Do you not have Internet because you are using an ethernet cable and only have one port?  If not are you using DHCP (i.e. the router is assigning ip address, etc and the computers are set to "obtain automatically")?  Let me know which it is and what details you need.

Let me know if you have any questions or need more information.

b0lsc0tt
0
 
LVL 14

Expert Comment

by:JohnnyCanuck
ID: 17779092
Your DSL modem should be set to bridge mode (you have to log on to the modem similar to the way you would log on to your router).  Log on to your router and set the connection type to PPPOE and enter the username and password you got from your ISP.  Enable DHCP on the router and save your settings.  Remove any PPPOE connections you may have set up on the computers, this is a straight ethernet connection.  Run cables from router to computers.  Reboot or run "ipconfig/renew".
0
 
LVL 32

Accepted Solution

by:
willcomp earned 500 total points
ID: 17779835
Modem is set to bridged ethernet and router PPPOE is correct or there would be no connection at all.

Ensure that router is set for DHCP and that both PCs are configured to obtain IP address automatically or that they have different static IP addresses within router range (192.168.1.xxx usually).

My first thought is an IP address conflict.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question