Solved

Guest wifi using rv082 DMV port

Posted on 2012-03-10
6
938 Views
Last Modified: 2012-06-22
Is it possible to use the dmz port on a rv082 linksys router for guest access to the Internet and protect business network.
0
Comment
Question by:jlspencer
  • 3
  • 3
6 Comments
 
LVL 90

Expert Comment

by:John Hurst
ID: 37705577
I don't think that is what the DMZ function in an RV082 is for. Here is an excerpt from the manual:

The DMZ (Demilitarized Zone) Host feature allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. Although Port Range Forwarding can only forward ten ranges of ports maximum, DMZ hosting
forwards all the ports to one computer at the same time.

That is different than providing guest wireless. For guest access, you would have to set up a VLAN. I think the RV082 is capable of that, but I have not set up a VLAN.

I have the DMZ function on my own RV042 but no VLAN, and my DMZ works as per the description above.

.... Thinkpads_User
0
 

Author Comment

by:jlspencer
ID: 37712407
Would I use the same subnet on vlan2 that is on vlan1?
0
 
LVL 90

Expert Comment

by:John Hurst
ID: 37712431
I think VLAN's have different subnets. You certainly do not want your guest on the same subnet as your office. They need to be separate. ... Thinkpads_User
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Accepted Solution

by:
jlspencer earned 0 total points
ID: 37767602
I solved this on my own by installing a HUB, obtaining second IP address from ISP and then configuring another router with new IP addresses and setting up different network for Guest router.

This method gave me the secruity I needed for the internal network.
0
 
LVL 90

Expert Comment

by:John Hurst
ID: 37767952
Thanks. I always use a separate router myself because it is separate and is easier to configure. I did not know you were planning on new (additional) IP. However my remarks about the one IP / RV082 above were generally correct. .... Thinkpads_User
0
 

Author Closing Comment

by:jlspencer
ID: 37790393
After doing additional research I realized that a HUB will not route traffic like a switch will.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now