Solved

How to share internet from phone to more than one wired device?

Posted on 2014-10-15
2
277 Views
Last Modified: 2014-10-19
Can this be done - I have an access point in the middle of no where that I need to briefly connect to the Internet. Can I do this - 1. turn on my hotspot on my iphone  2. Pick up internet on a windows 8 laptop thru wifi 3. Connect Ethernet cable to laptop adapter and to small switch. 4. Connect access point to switch, where it picks up dhcp and access to Internet automatically ..... Can this be done and if so, how do I configure windows 8 laptop for this? I have tried 'bridging" and "sharing" but no go,  probably missing a few steps... Any help is appreciated. If can't do this, will have to bring down those radios off the 26' poles...
0
Comment
Question by:xav1963
2 Comments
 
LVL 18

Accepted Solution

by:
Akinsd earned 500 total points
ID: 40383301
I don't quite understand your logic. Are you trying to setup a connection from your access point through your hotspot?

1. turn on my hotspot on my iphone  
Yes

2. Pick up internet on a windows 8 laptop thru wifi
Yes

3. Connect Ethernet cable to laptop adapter and to small switch.
Yes

4. Connect access point to switch, where it picks up dhcp and access to Internet automatically
DHCP from the phone?
The phone can only assign IP to devices connected to it's wifi.

Option is to configure your laptop as a DHCP server and hopefully have it assign an IP to the Access Point. You can then connect to your access point as desired.

For your logic, you will need your laptop to function as a router somehow for that to work. I'm not sure if Windows 8 has RRAS functionality. If it does, then it's your lucky day

..... Can this be done and if so, how do I configure windows 8 laptop for this? I have tried 'bridging" and "sharing" but no go,  probably missing a few steps... Any help is appreciated. If can't do this, will have to bring down those radios off the 26' poles...
0
 

Author Closing Comment

by:xav1963
ID: 40390954
never mind....
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now