Solved

Homegroup

Posted on 2013-12-23
2
284 Views
Last Modified: 2013-12-26
So we had a good homegroup going at our house.  But then we upgraded out Internet speed and got a different cable modem.  It still has 4 ports, just like the old one.

So we have 3 computers hooked to the modem through ethernet.  Then the last port goes to a wireless router.

The problem is that the computer connected to the wireless router can't see the computers directly connected to the modem.

Any ideas?
0
Comment
Question by:hrolsons
2 Comments
 

Author Comment

by:hrolsons
ID: 39736450
Oh, I changed the wireless router out as well.  I think I need to disable DHCP and put it in bridge mode.  I'll try that now.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 500 total points
ID: 39736513
Connect the wireless router to the main router from LAN port to LAN port (i.e. instead of the new wireless router's WAN/Internet port)...  change the default LAN IP on the new wireless router to an address outside the scope of the DHCP server so duplicate IPs don't get assigned... the LAN IP is used only for accessing the setup menus, typically; not for any routing (as long as the WAN port is unused), so if the DHCP server uses the entire available subnet range and you can't alter it, make the new wireless router's LAN IP an address outside the subnet (you'll then typically have to connect directly to one of its LAN ports with a static IP set on your NIC to access its setup menus like that, though).

Oh, and disable the new wireless router's DHCP server (typically in the Basic Setup section of the menus).
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question