Solved

Restricting WiFi

Posted on 2013-12-28
6
348 Views
Last Modified: 2014-01-03
Hello,
I don't know if these kinds of questions qualify for this service.  I hope.  Here we go:
I would like to set up a wireless home network (LAN I supposed it is called)  with a main server and printers.  (with the ability to use the AirPrint also with iPhone or tablet.)   I would like however to be selective with the Internet Access to the peripheral devices.  I suppose that this is possible.  Can anyone give me a lead.
Thank you.
0
Comment
Question by:rjlillis
6 Comments
 
LVL 6

Assisted Solution

by:Brad Held
Brad Held earned 100 total points
ID: 39744394
Set up a shared secret via WPA2 Enterprise, the wireless router should also have the ability to block internet access based on mac address or IP address. I use this on my kids where my wireless router stops them from accessing the internet after 9:00PM Sunday through Thursday. Capabilities vary based on the wireless router and could probably give better details if I knew what model router and firmware you had. I have a Linksys Wireless N router.
0
 
LVL 17

Expert Comment

by:lruiz52
ID: 39744398
Most wifi routers have the capability to restricted devices by Ip or MAC address.

What model wifi router do you have.
0
 

Author Comment

by:rjlillis
ID: 39744956
It is Cisco DPC3825
Thank you so far.
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 17

Accepted Solution

by:
lruiz52 earned 300 total points
ID: 39744991
Your router does support restrictions, below is the link to your user guide' check page 60,

https://www.cisco.com/web/consumer/support/userguides2/4021196_B.pdf

It supports both mac and IP address filtering as well as time of day.
0
 
LVL 44

Assisted Solution

by:Darr247
Darr247 earned 100 total points
ID: 39745227
Just not setting up any Port Forwarding should limit access to the peripherals from the Internet.
0
 

Author Closing Comment

by:rjlillis
ID: 39754740
Your service is much appreciated.  Every bit of knowledge helps.  Specific Links are great. Especially through long PDF manuals.  They really cut to the chase! Many thanks! please keep up the your helpful work. I am new to these ratings, I hope that they do justice.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Learn about cloud computing and its benefits for small business owners.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now