Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 


88 posts

Master Geek
+1 received by user: 1


  Reply # 426087 11-Jan-2011 12:31
Send private message

Damo-K: I just tested this on the TG789vn and I am able to use the connection from one LAN port to another.  As we are talking about different models and we're now seeing different behavior I probably won't be much more use.  The only other suggestion I can make is to rummage around in the toolbox and see whether the Intrusion Detection or, more likely, the firewall sections have anything about isolating the LAN ports.

Good luck and just for our curiosity please post what you end up going with :)


Ok i dont know what happened, maybe it needed a hard reset or something but all is working now. I haven't changed any other settings apart from your original instructions. Thanks so much.

67 posts

Master Geek


  Reply # 426106 11-Jan-2011 13:17
Send private message

Great to hear!  And as kyhwana2 said earlier, make sure you set up WPA2.

 
 
 
 




88 posts

Master Geek
+1 received by user: 1


  Reply # 426114 11-Jan-2011 13:42
Send private message

Damo-K: Great to hear!  And as kyhwana2 said earlier, make sure you set up WPA2.


One thing about this modem is it is already set up with WPA2 out of the box. The pass code printed on a separate sticker which makes it very user friendly. Im also guessing its good for telecom so customers cant complain about all their data being used because someone is stealing their wifi.

2332 posts

Uber Geek
+1 received by user: 80


  Reply # 426117 11-Jan-2011 13:48
Send private message

Philica:
One thing about this modem is it is already set up with WPA2 out of the box. The pass code printed on a separate sticker which makes it very user friendly. Im also guessing its good for telecom so customers cant complain about all their data being used because someone is stealing their wifi.


No! You need to change that passcode straight away. As for why, see http://underdev.org/penetrate/ and http://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/

(Long story short, they use an algorithm to generate those keys based on the SSID/serial number.)




88 posts

Master Geek
+1 received by user: 1


  Reply # 426126 11-Jan-2011 14:20
Send private message

kyhwana2:
Philica:
One thing about this modem is it is already set up with WPA2 out of the box. The pass code printed on a separate sticker which makes it very user friendly. Im also guessing its good for telecom so customers cant complain about all their data being used because someone is stealing their wifi.


No! You need to change that passcode straight away. As for why, see http://underdev.org/penetrate/ and http://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/

(Long story short, they use an algorithm to generate those keys based on the SSID/serial number.)



The first thing i did was change it. I need something that isnt impossible to remember.

1889 posts

Uber Geek
+1 received by user: 119

Trusted

  Reply # 426213 11-Jan-2011 17:11
Send private message

There are several previous threads about using a wifi router as a bridge/switch. Basically you should be able to do it if you can turn of the LAN DHCP function. If your Thompson makes this difficult, then most other wifi routers should have that option.




Qualified in business, certified in fibre, stuck in copper, have to keep going  ^_^

2332 posts

Uber Geek
+1 received by user: 80


  Reply # 426230 11-Jan-2011 18:11
Send private message

Philica:

The first thing i did was change it. I need something that isnt impossible to remember.


Easy, write it down and hide it under the AP. :)

1 | 2 
View this topic in a long page with up to 500 replies per page Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Security concerns reach new peak, Unisys Security Index
Posted 27-Jun-2017 14:11


Behind Spark’s slow-burn 4.5G plan
Posted 26-Jun-2017 16:23


Red Hat unveils production-ready open source hyperconverged infrastructure
Posted 23-Jun-2017 22:10


Whatever ailed Vodafone broadband … seems to be fixed
Posted 23-Jun-2017 14:10


VMware NSX Meets Stringent Government Security Standards with Common Criteria Certification
Posted 22-Jun-2017 19:05


Brother launches next-generation colour laser printers and all-in- ones for business
Posted 22-Jun-2017 18:56


Intel and IOC announce partnership
Posted 22-Jun-2017 18:50


Samsung Galaxy Tab S3: Best Android tablet
Posted 21-Jun-2017 12:05


Wellington-based company helping secure Microsoft browsers
Posted 20-Jun-2017 20:51


Endace delivers high performance with new 1/10/40 Gbps packet capture card
Posted 20-Jun-2017 20:50


You can now integrate SMX security into Microsoft Office 365, Google and other cloud email platforms
Posted 20-Jun-2017 20:47


Ravensdown launches new decision-making tool HawkEye
Posted 19-Jun-2017 15:38


Spark planning to take on direct management of all consumer stores
Posted 19-Jun-2017 10:03


Qrious acquires Ubiquity
Posted 14-Jun-2017 12:21


Spark New Zealand prepares for 5G with Nokia
Posted 14-Jun-2017 12:16



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.