Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Linksys WRE54G extender with WRT54GS

Posted on 2010-09-03
1
Medium Priority
?
514 Views
Last Modified: 2012-05-10
I have successfully configured the WRE54G to connect to the WRT54GS.  Of course the security is disable on the WRT54GS.  And it those the job perfectly.

Then I apply the wireles security setting (WAP-personnal) on the WRT... I tried to configure the WRE but to no avail.  I said yes to "enable security" on the WRE... but the "Edit security setting" button  refuse to work.  I taught that maybe WAP-personnal was not supported so I tried WEP (this is the lowest we can get) and still the same problem.

Of course when the security is enable on the WRT and not on the WRE, there is not wireless connection that go trhru.

WRT54GS version 6
Firmware version 1.50.6

WRE54G version 3-US
Firmware version 3.01.01


Can somebody help me with this?

0
Comment
Question by:Alain_Henri
1 Comment
 
LVL 2

Accepted Solution

by:
TiredNetworkGuy earned 2000 total points
ID: 33596807
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=17831

Above is a nice compatibility comparison sheet for your Range Extender and Wireless Router.

My suggestion is to update the firmware on both to start with.

The WRE54G can be updated to 3.04 http://homesupport.cisco.com/en-us/wireless/lbc/WRE54G
The WRT54GS V 6 can be updated to 1.58 http://homesupport.cisco.com/en-us/wireless/lbc/WRT54GS

Update both firmware revisions and pay special attention to the sheet at the top about compatibility.
According to that sheet on a WRT54GS2 (closest model on the list to your WRT54GS) WPA Personal TKIP is the only encryption method supported above WEP.
My suggestion would be to use a strong WPA type 1 passphrase (think 15 or more characters, capitalization, spaces and special characters) and try again.
If you have issues still, try removing the spaces from the passphrase.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question