WiFi is a layer 1 and 2 networking protocol for wireless communication between devices. It is typically used in local networks for client access, but can also be used in point-to-point network links. WPA is used to encrypt traffic.
Questions tagged [wifi]
1286 questions
3
votes
1 answer
Wireless Network Issue, Disconnecting Randomly From Network
I'm having an odd problem with my wireless network. Here is the background information:
Server (Windows Server 2008)
1 to 10 end user machines connecting to the network
Layer 3 Access Point (Asus WL-330 gE) connected to ethernet of Server and all…

Thomas Stringer
- 282
- 2
- 5
- 15
3
votes
3 answers
Number of routers in small community lock up and require reboot
I live in a small town which has one primary ISP. Lately I have noticed that a number of wireless routers have been locking up and requiring a reboot before allowing any connections. This has affected two of my routers, my work router, and a few…

Anthony Hiscox
- 295
- 1
- 8
3
votes
3 answers
Existing open source software for wireless mesh networking?
My goal:
Build a wireless mesh network with some ALIX 2D2 (500 MHz AMD Geode LX800 x86 CPU, 256MB RAM, Atheros wireless card)
Aside from working like a normal wireless mesh network users should be able to read/write data from/to the ALIX Boxes and…

cnandreu
- 175
- 2
- 6
3
votes
1 answer
Default page for a router
I wast to redirect a computers browser to a page on my server when they first connect, smiler to a hotel. I have a DLINK DIR-615 WIRELESS N 300 ROUTER.

giodamelio
- 169
- 4
3
votes
4 answers
Continuous Bandwidth / Throughput Meter
I am building a wireless link between two points using Wireless-N standard. To determine the best position of the antennas, there is a signal strength indicator on the antennas. The problem is the link strength doesn't always correspond to link…

Adrian Godong
- 577
- 4
- 9
- 20
3
votes
2 answers
Intermittent "no route to host" error on Linux
I have 2 computers on the same network:
10.0.0.4
10.0.0.5
If I leave things idle for about 10 minutes or so, when I attempt to connect between them, I get:
$ ssh user@10.0.0.4
$ ssh: connect to host 10.0.0.4 port 22: No route to host
But if I retry…

Hollister
- 159
- 2
- 10
3
votes
3 answers
Why slow (500-4500ms) ping times to google.com over Wi-Fi?
I regularly get ping times (to google.com) on my netbook over wireless (802.11) of:
500-4500ms for about half the time
100-150ms for the rest of the time.
It seems to switch back and forth on the order of minutes.
Regression:
It doesn't seem to…

BCS
- 1,065
- 2
- 15
- 24
3
votes
5 answers
Setting up a transparent proxy
I am looking at setting up some kind of visitor wireless access for our company however our internet connections all run through a external proxy.
After many wasted hours explaining to visitors how to enter the proxy settings before they can…

Chuffzilla
- 41
- 1
- 4
3
votes
1 answer
Installing WAP 2 for student access with Wireless laptops
I want students that have domain user accounts to be able to bring their laptops to school. I have setup a radius IAS and created a self signed cert. I have chosen to allow domain users to have access. Does this mean that the student laptops must…

user50691
- 31
- 1
3
votes
2 answers
Is there a self-contained, easy-to-use and secure WLAN hotspot solution?
I'm looking for something that accomplishes (as much as possible of) the following:
provides a WLAN access point for public use (for example, in a bar)
serves as a transparent proxy forcing users to get their own login before they can begin…

Tomalak
- 1,605
- 4
- 17
- 32
3
votes
2 answers
How to set up a wireless AP with a linux box and SOCKS proxy
I've got:
(1) Linux box (Arch linux to be precise, but that doesn't really matter)
(2) Ethernet connection on it (say, eth0)
(3) Socks proxy on a remote site (say, remote :port), which can be accessed through (2)
(4) Wireless card on local linux box…

user50455
- 131
- 1
3
votes
1 answer
Can a WPA key be shorter than 8 characters?
I was helping a person with his computer today, and he was convinced that his router's WPA key was 7 characters (with some brand of consumer router). He has been able to connect with this on a number of computers, but when stepping him through it…

Dylan McCall
- 133
- 1
- 1
- 4
3
votes
1 answer
Radius Certificate Based (eap) Authentication
We are currently putting in place a freeradius server that uses certificates to authenticate via a wireless connection. We have this working for 802.1x but Novell's client for Windows 7 breaks the 802.1x protocol. So we have to have the certificate…

lilott8
- 496
- 5
- 14
3
votes
6 answers
Simple Wifi Authentication System for small non profit
I am working (volunteering) with a small non profit that currently has 7 desktop computers and 4 laptops. I am facing a new problem and not sure how to proceed.
This non profit has a number of guest users/visitors, which would like to connect to…

Everette Mills
- 175
- 1
- 5
3
votes
4 answers
How can one perform a man-in-the-middle attack over a wireless connection?
I have recently setup a wireless network for a friend's business, and he asked me if there was any way someone could "hack" it. I assured him it would be extremely difficult once I setup a WPA2 key.
This got me thinking, how can I really be sure…

John Rasch
- 163
- 4
- 10