Solved

Manage Access Points

Posted on 2014-01-16
10
248 Views
Last Modified: 2014-03-21
Hi all,

We use a variety of Linksys WAP54 in combination with a WRT54. This network runs outside the corporate network and is used only for guests. Many colleagues use this network to bypass the proxy server and then connect through a VPN connection to the corporate network. This way being able to access everything ICT is blocking. We want to try to avoid this because it is not the intention, of course. Within the WRT it is possible to prohibit access to some mac addresses, but only up to 40.

Is there known software the WRT can be replaced by we can block multiple systems connecting and where any other brands of access points can connect to? Our preference is obviously open source software.

Thank in advance.
Hans
0
Comment
Question by:djaycee
  • 5
  • 3
  • 2
10 Comments
 
LVL 6

Accepted Solution

by:
Jordan Medlen earned 250 total points
ID: 39785287
I would recommend looking at DD-WRT, which can be flashed onto your current systems.

http://www.dd-wrt.com/site/index

That would be my best suggestion for your situation and requirements.
0
 

Author Comment

by:djaycee
ID: 39785377
Hi Jordan,

If I'm not mistaken, DD-WRT is mainly a firmware to be used to replace the firmware of the WRT, correct? Maybe less limitations but equally dedicated to the device. What I'm looking for is a software based solution to replace the WRT in total.

Regards,
Hans
0
 
LVL 6

Expert Comment

by:Jordan Medlen
ID: 39785716
Yes, the DD-WRT is a firmware replacement. It's linux based, so should be much more flexible than what is provided now on the WRT. If you're looking to have just a software based firewall, then try Vyatta or PFSense. Either of those could be run as a virtual machine.
0
 
LVL 45

Expert Comment

by:Craig Beck
ID: 39787045
If your users are using corporate assets why not just lock down their wireless settings so they can only connect to the corporate SSID.  This is easily done via Group Policy.
0
 

Author Comment

by:djaycee
ID: 39787112
@ Jordan: thx, I'm gonna check out those 2!

@ craigbeck: Interesting, never thought of it... but doesn't this prevent them from using wireless at home?

Regards,
Hans
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 
LVL 45

Expert Comment

by:Craig Beck
ID: 39787129
No not at all.  You can explicitly deny a WLAN based on the name, so while users can see your 'Guest' network while they're in the office they can't connect to it.  When they go home though their own home wifi will probably not be called 'Guest' so it'll be fine.
0
 

Author Comment

by:djaycee
ID: 39787138
Super, this I've got to try! Thx! Any ideas how to prevent them using their phones?
0
 
LVL 45

Assisted Solution

by:Craig Beck
Craig Beck earned 250 total points
ID: 39787152
Use a captive portal, as Jordan suggested.  That way you'd need to give your staff a guest user account as and when they wanted to use the guest wifi... to which you just say no! ;-)
0
 

Author Comment

by:djaycee
ID: 39787271
Ok, craigbeck and Jordan, thx for the advice, gonna test this next week and get back to you!
0
 

Author Comment

by:djaycee
ID: 39944810
Thanks for all the help but we're going to replace the old AP's with new ones. Thanks anyway.
0

Featured Post

Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
URL to download Intel WiDi for Win 10 8 67
Brother MFC-J6720DW Scan to Email 5 73
Nanostation M5 loco blocked by Window? 4 47
Auto channel for WiFi (Access Point) 3 76
MAC Filtering: MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this. This means that if someone menti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now