Solved

Set Comcast TECHNICOLOR TC8305C All in one to bridge mode

Posted on 2013-05-24
4
14,014 Views
Last Modified: 2013-08-23
I have searched the web trying to find documentation on this ALL IN ONE modem from comcast - no luck.

I continue to experience errors when trying to vpn to my work. I can connect with other networks..but it seems like fix is to either set the all-in-one tc8305c to bridge mode or to get the emta / modem and get a router. I know that both solutions would require a router..

How can i set this ALL IN ONE to bridge mode?

In the past i usually disabled dhcp..but is this all that needs to be done? Or is comcast the one that needs to perform this task?

thx
0
Comment
Question by:tobe1424
  • 2
4 Comments
 

Author Comment

by:tobe1424
ID: 39194950
also forgot to ask if the firewall needs to be disabled in order to obtain "bridge" mode ?
0
 

Author Comment

by:tobe1424
ID: 39195479
i may end up simply requesting a different modem..but i really need this to work asap in order for me to work from home
0
 
LVL 20

Accepted Solution

by:
agonza07 earned 500 total points
ID: 39196168
Lately providers have been managing this set up for you.

I would try to call Comcast and see if they can do it for you. If they didnt provide you with user info, then most likely they control it. Same thing with Time Warner recently too.
0
 

Expert Comment

by:joatm
ID: 39434859
"If you would like to use your existing router instead of the routing functionality on your Wireless Gateway, the Bridge Mode on the Wireless Gateway will need to be enabled. A Comcast technician can do this during installation, or call 1.800.XFINITY to enable this functionality."

Reference: http://media2.comcast.net/anon.comcastonline2/support/userguides/Wireless_Gateway_User_Guide_030811.pdf  Page 14
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now