G
Guest
Guest
Archived from groups: comp.sys.ibm.pc.hardware.chips (More info?)
On Sun, 25 Sep 2005 11:30:25 +0200, DEMAINE Benoit-Pierre
<nntp_pipex@demaine.info> wrote:
>learn abit about the french product called 'freebox':
>it natively support wireless routing, and it is REALLY A ROUTER:
>software conf can activate (or not) routing to wireless; by default it is off and
>you can only access wired part.
You still aren't getting my point. 802.11 wireless is bridging.
Where you attach a router and what it does is not part of 802.11.
There's not one word that even mentions routeing or IP addresses in
the IEEE 802.11 specifications.
http://standards.ieee.org/getieee802/802.11.html
Download any of 802.11a/b/g specs and find me where it says "router".
>I mean that in this device, the wireless card is not briged.
All 802.11 wireless cards are bridged. You can attach a router at
both ends and hide the bridging from the client, but the basic
protocol is bridging.
>> Wanna bet? If you ignore the router part of the puzzle and just play
>> with an access point, the IP address of the access point can be
>> literally anything. In fact, that's exactly what I do on wireless
>> systems that I don't want the users to tinker with the access points.
>> I set the management IP address of the access point to something
>> that's out of the usual 192.168.1.0/24 block.
>
>what is your point in this part ?
That with bridging, it's not important that the IP address of the
wireless device be in the same subnet as the wireless LAN.
>>>what happens is that for simplicity, and dummy compliance, all manifacturers do
>>>brige wireless to wired ... BUT on all firewalling tutos, you will find that this
>>>kind of briging DO require to be activated ... aka is NOT available before you
>>>explicitely ask for it.
>>
>> Sorry. I don't understand what you're asking or saying.
>
>hmmm, did you ever try to activate WDS ?
I don't understand your terms "dummy compliance", "tutos", and what
needs to be "activated". What does WPA have to do with anything in
bridging and routeing. WPA encryption is totally transparent to both.
>did you read routing table of a WRT54g ?
> ~ # netstat -r
> Kernel IP routing table
> Destination Gateway Genmask Flags MSS Window irtt Iface
> 192.168.111.0 * 255.255.255.0 U 40 0 0 br0
> 63.198.98.0 * 255.255.255.0 U 40 0 0 vlan1
> 127.0.0.0 * 255.0.0.0 U 40 0 0 lo
> default adsl-63-198-98- 0.0.0.0 UG 40 0 0 vlan1
What should I read in there? That's the router part of the WRT54G.
>if yes, read me again ...
Done. I still don't understand what you're asking or suggesting.
>question is: can ahardware router do it for me ?
Do you want everything in one box? If so, I've listed 3 possible
wireless VPN routers. If you can live with everything in seperate
boxes, then it can be done with a much wider and cheaper variety of
boxes.
>> Good luck. IPsec is no fun to setup. Lots of settings. Lots of
>> potential incompatibilities between servers and clients. Lots of
>> things to go wrong. To the best of my knowledge, nobody has a
>> non-manual IPSec VPN setup.
>
>that why I ask hardware device
Hardware IPSec is about the same complexity as software (FreeSWAN)
especially when dealing with poorly defined features such as replay
protection. I've seen compatibility issues that were not fun to
troubleshoot.
>I have been customer in a network you describe: it was deadly slow and unstable:
>breaking the root switch shotdown whole the network ... for example when you unplug
>the switch the leads to the DHCP server room ...
I'm not suggesting you build a complex network for your home wireless.
I'm simply suggesting that you seperate the modem, VPN router, and
wireless access point into three seperate boxes. I can list the
benifits when you're ready to listen.
--
Jeff Liebermann jeffl@comix.santa-cruz.ca.us
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
On Sun, 25 Sep 2005 11:30:25 +0200, DEMAINE Benoit-Pierre
<nntp_pipex@demaine.info> wrote:
>learn abit about the french product called 'freebox':
>it natively support wireless routing, and it is REALLY A ROUTER:
>software conf can activate (or not) routing to wireless; by default it is off and
>you can only access wired part.
You still aren't getting my point. 802.11 wireless is bridging.
Where you attach a router and what it does is not part of 802.11.
There's not one word that even mentions routeing or IP addresses in
the IEEE 802.11 specifications.
http://standards.ieee.org/getieee802/802.11.html
Download any of 802.11a/b/g specs and find me where it says "router".
>I mean that in this device, the wireless card is not briged.
All 802.11 wireless cards are bridged. You can attach a router at
both ends and hide the bridging from the client, but the basic
protocol is bridging.
>> Wanna bet? If you ignore the router part of the puzzle and just play
>> with an access point, the IP address of the access point can be
>> literally anything. In fact, that's exactly what I do on wireless
>> systems that I don't want the users to tinker with the access points.
>> I set the management IP address of the access point to something
>> that's out of the usual 192.168.1.0/24 block.
>
>what is your point in this part ?
That with bridging, it's not important that the IP address of the
wireless device be in the same subnet as the wireless LAN.
>>>what happens is that for simplicity, and dummy compliance, all manifacturers do
>>>brige wireless to wired ... BUT on all firewalling tutos, you will find that this
>>>kind of briging DO require to be activated ... aka is NOT available before you
>>>explicitely ask for it.
>>
>> Sorry. I don't understand what you're asking or saying.
>
>hmmm, did you ever try to activate WDS ?
I don't understand your terms "dummy compliance", "tutos", and what
needs to be "activated". What does WPA have to do with anything in
bridging and routeing. WPA encryption is totally transparent to both.
>did you read routing table of a WRT54g ?
> ~ # netstat -r
> Kernel IP routing table
> Destination Gateway Genmask Flags MSS Window irtt Iface
> 192.168.111.0 * 255.255.255.0 U 40 0 0 br0
> 63.198.98.0 * 255.255.255.0 U 40 0 0 vlan1
> 127.0.0.0 * 255.0.0.0 U 40 0 0 lo
> default adsl-63-198-98- 0.0.0.0 UG 40 0 0 vlan1
What should I read in there? That's the router part of the WRT54G.
>if yes, read me again ...
Done. I still don't understand what you're asking or suggesting.
>question is: can ahardware router do it for me ?
Do you want everything in one box? If so, I've listed 3 possible
wireless VPN routers. If you can live with everything in seperate
boxes, then it can be done with a much wider and cheaper variety of
boxes.
>> Good luck. IPsec is no fun to setup. Lots of settings. Lots of
>> potential incompatibilities between servers and clients. Lots of
>> things to go wrong. To the best of my knowledge, nobody has a
>> non-manual IPSec VPN setup.
>
>that why I ask hardware device
Hardware IPSec is about the same complexity as software (FreeSWAN)
especially when dealing with poorly defined features such as replay
protection. I've seen compatibility issues that were not fun to
troubleshoot.
>I have been customer in a network you describe: it was deadly slow and unstable:
>breaking the root switch shotdown whole the network ... for example when you unplug
>the switch the leads to the DHCP server room ...
I'm not suggesting you build a complex network for your home wireless.
I'm simply suggesting that you seperate the modem, VPN router, and
wireless access point into three seperate boxes. I can list the
benifits when you're ready to listen.
--
Jeff Liebermann jeffl@comix.santa-cruz.ca.us
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558