Use Wwrt-Gl as a Router Bridge

Log in / cre ate  account


Main Page Donations

Community portal

Current events

Recent changes

Random page


Wireless Bridge
You are here: DD-WRT wiki mainpage / Linking Routers / Wireless Bridge This is an older page on how to set up a client bridge. It is being kept as there might be info that some find useful, but ***THESE INSTRUCTIONS SHOULD NOT BE USED*** Use the more complete and up to date guide to do the same thing that can be found here: http://www.dd­ lient_Bridged

Wireless Bridging is used to connect two LAN segments via a wireless link. The two segments will be in the same subnet and look like two Ethernet switches connected by a cable to all computers on the subnet. Since the computers are on the same subnet, broadcasts will reach all machines, allowing DHC P clients in one segment to get their addresses from a DHC P server in a different segment. You could use a Wireless Bridge to transparently connect computer(s) in one room to computer(s) in a different room when you could not, or did not want to run an Ethernet cable between the rooms. C ontrast this with C lient Mode Wireless, where the local wireless device running DD­WRT connects to the remote router as a client, creating two separate subnets. Since the computers within the different subnets cannot see each other directly, this requires the enabling of NAT between the wireless and the wired ports, and setting up port forwarding for the computers behind the local wireless device. Segments connected via C lient Mode Wireless cannot share a DHC P server. In the case in which we are interested, a wireless device running DD­WRT such as a WRT54G is configured as a Wireless Bridge between a remote wireless router (of any make/brand) and the Ethernet ports on the WRT54G.

Contents  [hide ]
1 Instructions

open in browser PRO version

Are you a developer? Try out the HTML to PDF API

2 Instruction for dd­wrt v24 sp1...
  • Project Report Detailed
    called units) responsible for undertaking e-Governance initiatives in the country use the template provided in this document for preparing their respective detailed...
  • All About Routers
    Using SSH for Remote Administration Security .........................................................227 Using a Cisco Router...
  • Ids Using Data Mining
    mining techniques. In secton 8, we give our own proposal on how data mining can be used to aid IDSs, while in section 9 we conclude our work. II. IDS TAXONOMY The...
  • Routers
    is always seen and directed to the correct location by the router. The router accomplishes this by using headers and forwarding tables to determine the best path for...
  • Ccna 2 Router And Routing Protocols Study Guide
    Router Exercise 6 Label the Internal Components of a Router Exercise 7 Describe the Internal Components of a Router Exercise 8 Router ... of this information. Use of a...