Solved

linksys befw11s4 router

Posted on 2009-06-30
6
813 Views
Last Modified: 2013-12-14
how to tell if a wireless computer is getting internet
using linksys settings page
0
Comment
Question by:ie7
  • 2
  • 2
  • 2
6 Comments
 
LVL 3

Expert Comment

by:biofishfreak
ID: 24749874
Are you trying to see if someone is using your wireless network? I'm a little unsure of what you're asking.
0
 
LVL 1

Author Comment

by:ie7
ID: 24749899
want to see all the mac addresses of the computers that are connected
if i can see their mac address, does that mean they have internet connection
0
 
LVL 3

Expert Comment

by:biofishfreak
ID: 24750284
Usually if you can see the MAC address, they are connected to the network.
If the address is a static one, then the MAC will most likely be shown regardless of the connection, but if not then those machines should be connected.

If you want me to double check attach a screen shot.
0
Save on storage to protect fatherhood memories

You're the dad who has everything. This Father's Day, make sure your family memories are protected. My Passport Ultra has automatic backup and password protection to keep your cherished photos and videos safe. With up to 3TB, you have plenty of room to hold the adventures ahead.

 
LVL 11

Expert Comment

by:emilgas
ID: 24756714
If you want to Restrict them from accessing your router then go under Wireless and use the Wireless MAC Filter option. Let me know if you need more help setting up Wireless MAC Filter
0
 
LVL 1

Author Comment

by:ie7
ID: 24820043
how to set up wireless mac filter
0
 
LVL 11

Accepted Solution

by:
emilgas earned 500 total points
ID: 24825400
Attached you'll find the picture of that page that will allow you to do all that.
MAC-Filter.jpg
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now