use old router as repeater without cable

Most Relevant Content

  • How to Use Old Router as Range Extender to Boost WiFi Signal

    WiFi is a technology to turn wired internet into WiFi internet and used in every home and office. Wireless internet gives you the freedom to use the internet without sitting in a single place. It is also true that speed performance drop in Wi-fi due to weak signal or interference. Sometimes laying a physical wired connection in every room is not possible. So Wi-Fi range extender setup helps you to boost signal strength. Instead of buying a new range extender device use old wifi router as range extender mode to boost Wifi signal. The easy method to boost Wi-fi signal coverage without using a range extender device is make wifi router as repeater mode which will extend signal. This post will help you turn old router as a range extender mode to improve wireless signals in the low signal areas. Setup WiFi Router as Range extender Mode To use the router as repeater mode need to access the settings page. To access the router login page use default IP Address router or Make factory reset if forget IP address. Connect Router LAN port to Desktop or Laptop LAN port. Use Static IP Address of the same series in LAN settings [...]

    READ MORE »

  • You May Also Like

  • »

    ISP Bandwidth Management with MikroTik PCQ |   June 25, 2016

    MikroTik is an excellent router for managing ISP Bandwidth. For this, most of the ISPs are now using MikroTik Router for managing client bandwidth. The service used to manage bandwidth in MikroTik RouterOS is QUEUE. There are various types of queue services in MikroTik Router for managing internet bandwidth. Among these, PCQ can specially be used for maintaining ISP bandwidth. In this article, we will see how to manage ISP Bandwidth with MikroTik PCQ. MikroTik PCQ Service PCQ stands for [...]

    READ MORE »

  • »

    How to Prevent Simultaneous User Login in MikroTik Hotspot |   November 10, 2020

    MikroTik Hotspot is a user based internet access system. Most of the user authentication and authorization can be controlled with MikroTik Hotspot. But sometimes some users misuse user based authentication system. Misusing simultaneous login is one of them. Usually we provide one username and password for a user and we expect he/she will use this username and password from only one device at a time. But it is also possible to use same username and password in multiple devices at [...]

    READ MORE »

  • »

    How to Recover MikroTik User Password |   August 9, 2018

    MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]

    READ MORE »

  • »

    MikroTik Radius Configuration with FreeRADIUS |   December 7, 2018

    FreeRADIUS is a high performance RADIUS suite that provides authentication, authorization and accounting facility for a large number of network devices including MikroTik Router. Although MikroTik has user manager RADIUS service to provide authentication, authorization and accounting facility but it is not free for customization and not suitable for medium to large organization. On the other hand, freeRADIUS is free for customization according to your organization requirements. But freeRADIUS has to be customized by you. In my previous article, I [...]

    READ MORE »

  • »

    Red Hat/CentOS Network Configuration |   August 4, 2017

    Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]

    READ MORE »

  • »

    How to Block WiFi Access although Password is Known |   April 23, 2024

    We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]

    READ MORE »

  • »

    Boost Network Performance with MikroTik FastTrack in RouterOS 7 |   October 27, 2025

    Network administrators often face the challenge of balancing speed and stability. MikroTik’s FastTrack feature, introduced in earlier RouterOS versions and optimized in RouterOS 7, is a game-changing solution that dramatically enhances performance by reducing CPU load and improving packet handling efficiency. 🚀 What Is MikroTik FastTrack? FastTrack is a special processing method in RouterOS that allows packets from established and related connections to bypass the standard connection tracking process. In simple terms, once a connection is identified as safe and [...]

    READ MORE »

  • »

    MikroTik IPIP Tunnel with IPsec (Site to Site VPN) |   March 18, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]

    READ MORE »

  • »

    What Are the 7 Layers of OSI Model and How Do They Work |   October 5, 2021

    The OSI Model stands for Open Systems Interconnection Model, a conceptualized framework used to describe the seven layers of a telecommunication system or network. It was established as an international standard in the year 1984 by the International Organization for Standardization. This model helps visualize how networks operate and is still used today to figure out and solve network problems, such as by a web development company. In this article, we will talk about the 7 layers of the OSI [...]

    READ MORE »