Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Limiting Wireless Access

Posted on 2013-06-06
Last Modified: 2013-06-18
I have recently configured Wireless router on the network and would like to give access to everyone. However, I am concerned if the actual bandwidth may get compromised because of the excessive usage if there were any.
Is there any software or something I can do to limit the bandwidth for the wireless access?
And may be block access to torrent etc?
Question by:arthur112
  • 2
LVL 24

Assisted Solution

aadih earned 250 total points
ID: 39226169
You may configure your router to deny access to certain applications such as torrent clients. Depending upon the router and its functionality you may be able to prioritize traffic also (thus limiting the access, effectively). Please consult your router manual.

Accepted Solution

EMJSR earned 250 total points
ID: 39226425
You can additionally configure QOS (Quality of Service) rules to certain IP ranges which would limit the use to a certain percentage of the total bandwidth at certain time frames.

Without knowing exactly which router you have, it's difficult to suggest further options.

Author Comment

ID: 39247039
I have looked on the router and it Thomson's 02 wireless box IV
LVL 24

Expert Comment

ID: 39247543
I am not sure this router has QoS options.  Sorry.

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question