Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Using 2 routers to provide wifi and protect my network

Posted on 2007-03-21
7
326 Views
Last Modified: 2013-11-12
Hello
I am using a standard router with a 192.168.1.X range. I would like to put a sub router on the system and allow people to connect wirelessly without compromising my network. If I use 192.168.11.X as a sub range and let the sub router pull internet through the WAN port will I achieve my goal? Or are there ways that someone with some knowledge could still rout through and connect to my .1 network?
Thanks Jim
0
Comment
Question by:cbspectre
  • 4
  • 3
7 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 125 total points
ID: 18766441
How are the routers connected to the LAN? I'd connect the internet router's wan port to the internet modem, and there you can use any subnet you like. Then connect the network router to a LAN port of your wireless router (make sure you get one that has LAN ports additionally to the WAN port and the wireless). That way you can't connect on the LAN side via the wireless router's clients.
0
 

Author Comment

by:cbspectre
ID: 18766812
Connections are as follows
Internet --> Netgear WAN port| Lan Port of Netgear (192.168.1.X) --> WAN port of Buffalo router (192.168.11.X) Internet is accessible from the Buffalo but cannot see the Netgear LAN easily. I can type in 192.168.1.1 from my 192.168.11.2 PC and log into the Netgear. I just want to be sure that the Buffalo connected clients cannot get to the Netgear connected clients. I dont think they can but if so I would like to know how so I can shut it off.
thanks Jim
0
 
LVL 88

Expert Comment

by:rindi
ID: 18766950
Put it the other way round, first the router that should only see the internet, and then the other one. With your current configuration someone could change the ip settings of the networking interface to static, and use a netmask like 255.255.0.0 and may then be able to see everything of 192.168.x.x.
0
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

 

Author Comment

by:cbspectre
ID: 18772721
If I password protect the Buffalo router (Assuming no hard reset, and they could not change the IP range) could someone still bypass it through the wireless?
0
 
LVL 88

Expert Comment

by:rindi
ID: 18772933
All they'd need to do is change the ip properties in their wireless card on the PC. They wouldn't have to do anything on the router, so if that is password protected or not wouldn't change anything. OF course you should still password protect it.
0
 

Author Comment

by:cbspectre
ID: 18783868
I tried what you said. I was able to set my Buffalo connected laptop with DHCP providing the 11.X Numbers to 1.X setting the Gateway and DNS to the 1.X router IP and could get to the internet. I couldnt get to the internal shared recources. I tried to access server shares and got messages about being inaccessable. Is that becaouse the router is handling the 1.X calls and not the PC? If this is true I am ok as is. But I do see your point on using the routers the other way. No one could back route in that case. Thank you for your assistance.
0
 
LVL 88

Expert Comment

by:rindi
ID: 18784477
your welcome.
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question