Solved

Linksys WRT54G secure setup in Windows 2003 network environment

Posted on 2009-05-11
1
407 Views
Last Modified: 2013-12-27
I'd like to check my thinking here, please.  I've read other posts but just got more confused!

Network DHCP uses 192.168.11.100-.200 range.

Linksys WRT54G would be assigned IP in the 192.168.11.xx range which is a necessary step, isn't it, to gain access to the network T1 via the usual network jack?  Static IP would help me track it.

I would then assign Linksys router its own DHCP pool away from that subnet, like 192.168.54.x.

Would this then give guests who log on to the Linksys their Internet access without them crossing into my business domain?  

Would it matter if they connected to that Linksys wirelessly or via an Ethernet port on the Linksys meaning I believe the Linksys assigns the non-network-range IP for both types of connection?

If set up properly, then in-company users would have to use VPN over that Internet connection to actually connect to the business domain, yes?

I'm changing Linksys admin name and password, using WPA with complex password.  Am I over-simplifying this?

Once done, I'd repeat this setup for two other LinkSys devices by establishing their own network IP then set those devices' DHCP pools away from the network subnet and the other Linksys devices.

0
Comment
Question by:ColdKathleen
1 Comment
 
LVL 87

Accepted Solution

by:
rindi earned 500 total points
ID: 24367609
If you connect the WAN port of the router to your LAN, and give the WAN port of the router it's static IP in the range you suggested, then used another subnet for the LAN side of the router, it's clients will only be able to connect to the internet and not to the rest of your LAN, unless the router has a special setting to enable such connections. Also most wireless routers include something usually called "Private" which will additionally keep it's clients from seeing each other.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now