The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Networking on a DD-WRT Repeater

    Discussion in 'Networking and Wireless' started by hlesley, Sep 4, 2008.

  1. hlesley

    hlesley Notebook Enthusiast

    Reputations:
    0
    Messages:
    37
    Likes Received:
    0
    Trophy Points:
    15
    I setup a WRT54GL as a Universal Wireless Repeater so a friend of mine could use wireless from his uncle's DSL next door. His uncle has a WRT54GL and both are running DD-WRT v24. The repeater was setup using the DD-WRT Wiki for Universal Wireless Repeater. This is the first time I have tried using a repeater.

    My friend has a laptop and a desktop, both running XP home. I ran Network Setup Wizard on the desktop and laptop, but they don't see each other. He wants to share a printer with the laptop.

    I have never had any trouble networking with a router. Is there something different when using a (repeater) router?

    Thanks

    Herman
     
  2. chemistry

    chemistry Notebook Consultant

    Reputations:
    9
    Messages:
    203
    Likes Received:
    0
    Trophy Points:
    30
    I'm assuming both machines have Internet as confirmation they are setup properly with the router/repeater.

    I'd then check to see if both machine are connected to the same wireless network, just in case one is accidently connecting to some unsecured wireless network in your neighbourhood.

    Also check their IP addresses to be sure they are on the same subnet as machines on different subnets will not be visible to one another.

    Then, make sure Windows firewall (or some other 3rd-party software firewall) is not blocking access to the other computer.

    Those are generally the likely suspects.