Solved

Connecting to Wireless pc

Posted on 2011-02-17
10
866 Views
Last Modified: 2012-05-11
All pc's in the company are on a wired network. I have 1 pc I want to use for a tc display but there is not network port at the location. I have a wireless network card in it. Is there anyway I can connect to this pc from a domain/wired pc???

Any ideas or work arounds appreciated.
0
Comment
Question by:j8547
  • 7
  • 3
10 Comments
 
LVL 1

Expert Comment

by:Kidwell_03
Comment Utility
Hello j8547,

Just to clarify, you said you have a wireless network card in the pc you want to us for the TC?

Do you already have a wireless network?  If not, you can install a wireless network that piggy backs off of your existing infrastructure.  You would just plug the wireless into your switch and run it off of there.  I would set a static address (withing your existing IP scope) to the Access Point then use the AP to distribute the IP (again, and address within your existing scope) for your TC machine.

Your TC machine would then essentially be on the same network as the rest of your machines.  You can use any number of viewers to get to the machine then, VNC viewer, RDP, LogMeIn, etc.
0
 

Author Comment

by:j8547
Comment Utility
Ok I will explain a bit more and then you can tell me if I can do this.

I have several wireless networks around the company. This pc connects tot he closest one and picks up a 192.168 address. The wireless router a WAN IP on our network. So I need to connect via a viewer or rdp to this PC. It has a wireless card in it and is working on the wireless network.
0
 

Author Comment

by:j8547
Comment Utility
I think the problem is the wireless address are 192.168.... and the network address are  different.........
0
 
LVL 1

Accepted Solution

by:
Kidwell_03 earned 500 total points
Comment Utility
Ok, i understand now.

You may still want to try a product like LogMeIn.  I haven't tried using it in a setup like you are describing however it installs a client on the destination machine (TC machine) to get access.  You just login to the LogMeIn website to access the destination pc:

 https://secure.logmein.com/

You can go to this site and set up an account.  They allow a trial version of the software to be used so you can see if that would work for you without having to buy anything up front. About the only thing you can't do with the trial version is push files to the machine.

0
 

Author Comment

by:j8547
Comment Utility
Brilliant. Thanks
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:j8547
Comment Utility
I still cannot connect tot he pc. I have given it a static ip and put a reservation on the router. The pc is owkring int hat it can access internet. But i cannot ping a network pc from it and i cannot ping it from a network pc.
0
 
LVL 1

Expert Comment

by:Kidwell_03
Comment Utility
Right, because they are on different IP schemes correct
0
 

Author Comment

by:j8547
Comment Utility
yea

It seems i also cannot ping from a wireless pc to another one. Not interest in this but I was just trying to test. Do I need to setup other stuff onthe router to allow access to this pc or out......I am totally lost now on how to get it working
0
 

Author Comment

by:j8547
Comment Utility
I have a laptop ont he wireless and I can remote back to my network pc and i don't know how I can do this. These are also on differnt IP schemes
0
 

Author Comment

by:j8547
Comment Utility
Ho do I chnage the wireless pc from a 192.168 address. Can I do this on the router???
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now