Solved

IP Conflict Detection Linksys Wireless Range Expanders

Posted on 2006-11-29
3
884 Views
Last Modified: 2008-01-09
Hello All,

I have a network that is set up with a Linksys WAP 54G Wireless Access Point and a couple of WRE54G Wireless-G Range expanders. When I now boot up my laptops I get a wireless connection but then receive and error message saying "An ip address conflict has been detected" The error message will pop up every so often. The DHCP server being used is a Sonicwall TZ170 and IP address conflict detection has been turned off on the sonicwall. I dont see any errors in the sonicwall and this only happens on the workstations. The ip addresses do not seem to conflict when I look at what is leased in the sonicwall's dhcp server.

Is there a possible way to stop this error message from showing in the event log and also from appearing in on the workstation when it boots up?  

Anyone have a clue why this would happen?
0
Comment
Question by:kwoznica
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 7

Accepted Solution

by:
knightrider2k2 earned 500 total points
ID: 18040494
Turn the conflict detection ON on the TZ170.
0
 
LVL 4

Expert Comment

by:Trilotech
ID: 18050595
Are you sure that both the Linksys AND the Sonicwall are NOT BOTH assigning out DHCP addresses?

Also make sure that you do not have any statically assigned addresses that would conflict.
0
 

Author Comment

by:kwoznica
ID: 18104652
Knightrider,

Your solutions seems to have worked so far. The points are yours.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question