Solved

Linksys WRT54G secure setup in Windows 2003 network environment

Posted on 2009-05-11
1
413 Views
Last Modified: 2013-12-27
I'd like to check my thinking here, please.  I've read other posts but just got more confused!

Network DHCP uses 192.168.11.100-.200 range.

Linksys WRT54G would be assigned IP in the 192.168.11.xx range which is a necessary step, isn't it, to gain access to the network T1 via the usual network jack?  Static IP would help me track it.

I would then assign Linksys router its own DHCP pool away from that subnet, like 192.168.54.x.

Would this then give guests who log on to the Linksys their Internet access without them crossing into my business domain?  

Would it matter if they connected to that Linksys wirelessly or via an Ethernet port on the Linksys meaning I believe the Linksys assigns the non-network-range IP for both types of connection?

If set up properly, then in-company users would have to use VPN over that Internet connection to actually connect to the business domain, yes?

I'm changing Linksys admin name and password, using WPA with complex password.  Am I over-simplifying this?

Once done, I'd repeat this setup for two other LinkSys devices by establishing their own network IP then set those devices' DHCP pools away from the network subnet and the other Linksys devices.

0
Comment
Question by:ColdKathleen
1 Comment
 
LVL 88

Accepted Solution

by:
rindi earned 500 total points
ID: 24367609
If you connect the WAN port of the router to your LAN, and give the WAN port of the router it's static IP in the range you suggested, then used another subnet for the LAN side of the router, it's clients will only be able to connect to the internet and not to the rest of your LAN, unless the router has a special setting to enable such connections. Also most wireless routers include something usually called "Private" which will additionally keep it's clients from seeing each other.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question