From: "Ed Durrant" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.1.16) with ESMTP id 2222270 for os2-wireless_users@2rosenthals.com; Mon, 15 Feb 2010 15:05:24 -0500 Received: from secmgr-va.2rosenthals.com ([162.83.95.194] helo=mail2.2rosenthals.com) by secmgr-ny.randr with esmtps (TLSv1:AES256-SHA:256) (Exim 4.43) id 1Nh7C5-0001lo-0X for os2-wireless_users@2rosenthals.com; Mon, 15 Feb 2010 15:05:23 -0500 Received: from nschwmtas04p.mx.bigpond.com ([61.9.189.146]:44168) by mail2.2rosenthals.com with esmtp (Exim 4.69) (envelope-from ) id 1Nh7Bz-0007Zi-2x for os2-wireless_users@2rosenthals.com; Mon, 15 Feb 2010 15:05:16 -0500 Received: from nschwotgx01p.mx.bigpond.com ([121.217.5.136]) by nschwmtas04p.mx.bigpond.com with ESMTP id <20100215200512.MKAK1835.nschwmtas04p.mx.bigpond.com@nschwotgx01p.mx.bigpond.com> for ; Mon, 15 Feb 2010 20:05:12 +0000 Received: from [192.168.100.2] (really [121.217.5.136]) by nschwotgx01p.mx.bigpond.com with ESMTP id <20100215200509.RNUD1743.nschwotgx01p.mx.bigpond.com@[192.168.100.2]> for ; Mon, 15 Feb 2010 20:05:09 +0000 X-CTCH-RefID: str=0001.0A020209.4B79A8FC.0080,ss=1,fgs=0 Message-ID: <4B79A930.3010204@durrant.mine.nu> Date: Tue, 16 Feb 2010 07:06:08 +1100 User-Agent: Thunderbird 2.0.0.23 (OS/2/20090822) MIME-Version: 1.0 To: OS/2 Wireless Users Mailing List Subject: Re: [OS2Wireless] [Fwd: [OS2Wireless] LinkSys firmware emulators] References: In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Authentication-Info: Submitted using SMTP AUTH PLAIN at nschwotgx01p.mx.bigpond.com from [121.217.5.136] using ID edward.durrant@bigpond.com at Mon, 15 Feb 2010 20:05:09 +0000 X-RPD-ScanID: Class unknown; VirusThreatLevel unknown, RefID str=0001.0A150202.4B79A8F6.000E,ss=1,fgs=0 X-Spam-Score: 0.0 (/) X-Spam-Report: _SUMMARY_ Lewis G Rosenthal wrote: > Thanks, Ed! > > On 02/15/10 02:09 am, Ed Durrant thus wrote : >> Hi Lewis, >> I have a Linksys WRT54G running factory firmware if I can help in >> some way. >> > As it turns out, it was relatively simple: my clients' son wanted to > connect his X-box to the router. Unfortunately, the instructions they > (both parents and the kid) followed had them bridging the connection > through a connected workstation(!) via the ethernet port (the > "workstation" was a ThinkPad SL400, connected wirelessly), and > assigning a static IP (on a completely different subnet with no > routing information). When this didn't work (obviously), they tried > all manner of reconnection for the ThinkPad, the configuration of > which was totally hosed at that point, including hitting the > "reset" button on the "front of the little blue box." Naturally, this > "reset" button was none other than the one-step security button, which > blew away all of the Wi-Fi config I had in the box... > > Once I got "the rest of the story," and had a look at the WRT54G > emulater, it was a simple fix to walk them through the configuration > to get things back to normal. :-) > > Note to self: Don't ever assume things are as easy for anyone else as > they may appear to be to me. The next time someone asks if he can > "plug in his X-box," say, "you'd better leave that to me!" > > Cheers/2 > I wonder if its possible to disable that one-step security button (which I don't have on my WRT54G, being one of the original models) in the setup, to stop them doing the same again ? -- Cheers/2 Ed eComStationAustralia podcast http://eComStationAustralia.podbean.com or iTunes