Questions tagged [wifi]

WiFi is a layer 1 and 2 networking protocol for wireless communication between devices. It is typically used in local networks for client access, but can also be used in point-to-point network links. WPA is used to encrypt traffic.

1286 questions
3
votes
1 answer

Wireless Network Issue, Disconnecting Randomly From Network

I'm having an odd problem with my wireless network. Here is the background information: Server (Windows Server 2008) 1 to 10 end user machines connecting to the network Layer 3 Access Point (Asus WL-330 gE) connected to ethernet of Server and all…
3
votes
3 answers

Number of routers in small community lock up and require reboot

I live in a small town which has one primary ISP. Lately I have noticed that a number of wireless routers have been locking up and requiring a reboot before allowing any connections. This has affected two of my routers, my work router, and a few…
Anthony Hiscox
  • 295
  • 1
  • 8
3
votes
3 answers

Existing open source software for wireless mesh networking?

My goal: Build a wireless mesh network with some ALIX 2D2 (500 MHz AMD Geode LX800 x86 CPU, 256MB RAM, Atheros wireless card) Aside from working like a normal wireless mesh network users should be able to read/write data from/to the ALIX Boxes and…
cnandreu
  • 175
  • 2
  • 6
3
votes
1 answer

Default page for a router

I wast to redirect a computers browser to a page on my server when they first connect, smiler to a hotel. I have a DLINK DIR-615 WIRELESS N 300 ROUTER.
giodamelio
  • 169
  • 4
3
votes
4 answers

Continuous Bandwidth / Throughput Meter

I am building a wireless link between two points using Wireless-N standard. To determine the best position of the antennas, there is a signal strength indicator on the antennas. The problem is the link strength doesn't always correspond to link…
Adrian Godong
  • 577
  • 4
  • 9
  • 20
3
votes
2 answers

Intermittent "no route to host" error on Linux

I have 2 computers on the same network: 10.0.0.4 10.0.0.5 If I leave things idle for about 10 minutes or so, when I attempt to connect between them, I get: $ ssh user@10.0.0.4 $ ssh: connect to host 10.0.0.4 port 22: No route to host But if I retry…
Hollister
  • 159
  • 2
  • 10
3
votes
3 answers

Why slow (500-4500ms) ping times to google.com over Wi-Fi?

I regularly get ping times (to google.com) on my netbook over wireless (802.11) of: 500-4500ms for about half the time 100-150ms for the rest of the time. It seems to switch back and forth on the order of minutes. Regression: It doesn't seem to…
BCS
  • 1,065
  • 2
  • 15
  • 24
3
votes
5 answers

Setting up a transparent proxy

I am looking at setting up some kind of visitor wireless access for our company however our internet connections all run through a external proxy. After many wasted hours explaining to visitors how to enter the proxy settings before they can…
Chuffzilla
  • 41
  • 1
  • 4
3
votes
1 answer

Installing WAP 2 for student access with Wireless laptops

I want students that have domain user accounts to be able to bring their laptops to school. I have setup a radius IAS and created a self signed cert. I have chosen to allow domain users to have access. Does this mean that the student laptops must…
user50691
  • 31
  • 1
3
votes
2 answers

Is there a self-contained, easy-to-use and secure WLAN hotspot solution?

I'm looking for something that accomplishes (as much as possible of) the following: provides a WLAN access point for public use (for example, in a bar) serves as a transparent proxy forcing users to get their own login before they can begin…
Tomalak
  • 1,605
  • 4
  • 17
  • 32
3
votes
2 answers

How to set up a wireless AP with a linux box and SOCKS proxy

I've got: (1) Linux box (Arch linux to be precise, but that doesn't really matter) (2) Ethernet connection on it (say, eth0) (3) Socks proxy on a remote site (say, remote :port), which can be accessed through (2) (4) Wireless card on local linux box…
user50455
  • 131
  • 1
3
votes
1 answer

Can a WPA key be shorter than 8 characters?

I was helping a person with his computer today, and he was convinced that his router's WPA key was 7 characters (with some brand of consumer router). He has been able to connect with this on a number of computers, but when stepping him through it…
Dylan McCall
  • 133
  • 1
  • 1
  • 4
3
votes
1 answer

Radius Certificate Based (eap) Authentication

We are currently putting in place a freeradius server that uses certificates to authenticate via a wireless connection. We have this working for 802.1x but Novell's client for Windows 7 breaks the 802.1x protocol. So we have to have the certificate…
lilott8
  • 496
  • 5
  • 14
3
votes
6 answers

Simple Wifi Authentication System for small non profit

I am working (volunteering) with a small non profit that currently has 7 desktop computers and 4 laptops. I am facing a new problem and not sure how to proceed. This non profit has a number of guest users/visitors, which would like to connect to…
Everette Mills
  • 175
  • 1
  • 5
3
votes
4 answers

How can one perform a man-in-the-middle attack over a wireless connection?

I have recently setup a wireless network for a friend's business, and he asked me if there was any way someone could "hack" it. I assured him it would be extremely difficult once I setup a WPA2 key. This got me thinking, how can I really be sure…
John Rasch
  • 163
  • 4
  • 10