[Webinar] Learn how to a build a cloud-first strategyRegister Now


configuration with a second AP?

Posted on 2007-08-05
Medium Priority
Last Modified: 2013-11-09
I bought a wireless router that I'm using as an AP and a wireless audio adapter at the same time. I got the wireless router up and running as a AP in short order but am just now nearly 2 months later starting to setup the audio adapter. I realized as a started reading the product specs that the wireless audio adapter only supports WEP encryption and I used WPA2.

I don't want to just recycle the audio adapter as it's too late to return it. Would it make sense to setup a second AP with a cheap router using WEP and use that for the audio router? Is there a way to isolate this AP so that it doesn't compromise the security of my network?

I'm new to wireless thus my screwup and these newby questions. I welcome your insite.
Question by:eliwil
  • 2
LVL 88

Accepted Solution

rindi earned 2000 total points
ID: 19637138
I'm afraid that without WPA there is no way to properly secure your wireless network. The problem is that for the audio adapter to work it needs to have access to your PC where the music is stored. You'd only be safe to use it with less security and a separate AP if that separate LAN didn't have to connect to any of your other resources. Have you considered selling the adapter?

Author Comment

ID: 19638732
It just became a gift!
LVL 88

Expert Comment

ID: 19638768

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is split into background info to start and actual review at bottom: Some time ago I wanted to sell a system with both wired and wireless capability but at minimum expense.  Having visited my trusted online auction I was pleasantly su…
I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
Suggested Courses

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question