Solved

Using 2 routers to provide wifi and protect my network

Posted on 2007-03-21
7
315 Views
Last Modified: 2013-11-12
Hello
I am using a standard router with a 192.168.1.X range. I would like to put a sub router on the system and allow people to connect wirelessly without compromising my network. If I use 192.168.11.X as a sub range and let the sub router pull internet through the WAN port will I achieve my goal? Or are there ways that someone with some knowledge could still rout through and connect to my .1 network?
Thanks Jim
0
Comment
Question by:cbspectre
  • 4
  • 3
7 Comments
 
LVL 87

Accepted Solution

by:
rindi earned 125 total points
ID: 18766441
How are the routers connected to the LAN? I'd connect the internet router's wan port to the internet modem, and there you can use any subnet you like. Then connect the network router to a LAN port of your wireless router (make sure you get one that has LAN ports additionally to the WAN port and the wireless). That way you can't connect on the LAN side via the wireless router's clients.
0
 

Author Comment

by:cbspectre
ID: 18766812
Connections are as follows
Internet --> Netgear WAN port| Lan Port of Netgear (192.168.1.X) --> WAN port of Buffalo router (192.168.11.X) Internet is accessible from the Buffalo but cannot see the Netgear LAN easily. I can type in 192.168.1.1 from my 192.168.11.2 PC and log into the Netgear. I just want to be sure that the Buffalo connected clients cannot get to the Netgear connected clients. I dont think they can but if so I would like to know how so I can shut it off.
thanks Jim
0
 
LVL 87

Expert Comment

by:rindi
ID: 18766950
Put it the other way round, first the router that should only see the internet, and then the other one. With your current configuration someone could change the ip settings of the networking interface to static, and use a netmask like 255.255.0.0 and may then be able to see everything of 192.168.x.x.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:cbspectre
ID: 18772721
If I password protect the Buffalo router (Assuming no hard reset, and they could not change the IP range) could someone still bypass it through the wireless?
0
 
LVL 87

Expert Comment

by:rindi
ID: 18772933
All they'd need to do is change the ip properties in their wireless card on the PC. They wouldn't have to do anything on the router, so if that is password protected or not wouldn't change anything. OF course you should still password protect it.
0
 

Author Comment

by:cbspectre
ID: 18783868
I tried what you said. I was able to set my Buffalo connected laptop with DHCP providing the 11.X Numbers to 1.X setting the Gateway and DNS to the 1.X router IP and could get to the internet. I couldnt get to the internal shared recources. I tried to access server shares and got messages about being inaccessable. Is that becaouse the router is handling the 1.X calls and not the PC? If this is true I am ok as is. But I do see your point on using the routers the other way. No one could back route in that case. Thank you for your assistance.
0
 
LVL 87

Expert Comment

by:rindi
ID: 18784477
your welcome.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
server can't ping default gateway 25 89
No internet 10 33
Wireless coverage 7 42
Connecting LAN to a new leased line 2 22
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now