• April 24, 2024, 09:37:35 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: DWL-710 Repeater in Secure Network with WBR-2310 -- Repeater Treated as Spoof  (Read 4934 times)

nlitell

  • Level 1 Member
  • *
  • Posts: 7

I am running a small network using a WBR-2310 Wireless Router to connect several laptops, a desktop and a printer.  All the computers and printer use wireless connections to the router. 

The network is encrypted and I use MAC ID filtering to allow only the registered devices to connect to the router.  I have the DHCP Server enabled in the router, but I also have assigned specific IP addresses in the DHCP Reservations List to each of the devices in my network.

I am now trying to add a DWL-G710 (Rev B) Wireless Range Extender to the network to increase the area of the house in which I can use our laptops.  However, I am having problems with the configuration. 

Both the router and the G710B have the latest firmware upgrades.  I have assigned a specific IP address (192.168.0.105) for the G710 in the DHCP Reservations List on my router and added the G710 MAC ID to my router’s filter list.  The G710 has been configured with the same fixed IP address (…105);  the router’s IP address is in the G710 configuration, and the proper network encryption key has been added to the G710.

I am able to successfully connect to both the router and repeater from my laptop.  However, after connecting to the repeater, I am unable to access anything on the network. 

Here is what I see when I connect to the router:
-- the router log file shows a proper lease of the designated IP address to the G710
-- the router’s status tab shows the G710 as connected
-- the router’s log file then shows a rapid succession of what it considers spoof attacks coming from the repeater (…105) attempting to spoof my laptop (192.168.0.113) -- see the sample below:
---------------------------
Mar/16/2009 16:58:01 Target IP(192.168.0.1), Target Port(80) Packet Dropped
Mar/16/2009 16:58:01 Spoof IP(192.168.0.113), Spoof Port(1683)
Mar/16/2009 16:58:01 Spoof Attack fromd MAC(00-1b-11-70-71-ac) Detect,
Mar/16/2009 16:57:58 Target IP(192.168.0.1), Target Port(80) Packet Dropped
Mar/16/2009 16:57:58 Spoof IP(192.168.0.113), Spoof Port(1681)
Mar/16/2009 16:57:58 Spoof Attack fromd MAC(00-1b-11-70-71-ac) Detect,
Mar/16/2009 16:57:58 Target IP(192.168.0.1), Target Port(80) Packet Dropped
Mar/16/2009 16:57:58 Spoof IP(192.168.0.113), Spoof Port(1679)
Mar/16/2009 16:57:58 Spoof Attack fromd MAC(00-1b-11-70-71-ac) Detect,
Mar/16/2009 16:57:58 Target IP(192.168.0.1), Target Port(80) Packet Dropped
Mar/16/2009 16:57:58 Spoof IP(192.168.0.113), Spoof Port(1681)
Mar/16/2009 16:57:58 Spoof Attack fromd MAC(00-1b-11-70-71-ac) Detect,
---------------------------

In other words, it appears that the router thinks the repeater is trying to attack the network and is dropping any packets the repeater sends, which makes it impossible to use the network if one is connected to the repeater instead of the router.

I have previously set up a DWL-G710 with a WBR-2310 to provide extended access in another network, so I know the two can work together.  The other network was encrypted, but had no MAC ID filtering – anyone with the WEP key could access the network.

Any ideas.???


« Last Edit: March 22, 2009, 07:12:36 PM by nlitell »
Logged