Feeds
75%
Solwise Mobile Server Router

Solwise 3.5G plus WLAN Mobile Server Router

DIY networks, wherever you go

  • alert
  • submit to reddit

High performance access to file storage

As we say, all this is largely what you'd expect a well-featured router to provide, either up front or tucked away under an Advanced Settings tab. But it's surprising to find all this stuff on a travel router. Incidentally, it'll also operate as a plain wireless access point or as a wireless pick-up for one Ethernet-connected device - just flip a switch on the side to set the mode you want.

Solwise Mobile Server Router

The web UI's basic but comprehensive

Could you use it as your main router at home? Possibly, but we found that its Wi-Fi signal wasn't as strong as the one in our own wireless router. It's hotel-room usable, we'd say, but it doesn't have the quite range of a regular router.

It seemed to operate more effectively with the unit set to Access Point mode, in which it simply acts as pipe connecting wireless and wired clients to a network's main router.

Solwise Mobile Server Router

Create a WLAN or extend an existing one

HSDPA connectivity worked, but you should check with the Solwise website that the dongle you use is supported by the MSR, though every firmware update adds more to the list. Officially unsupported modems may work, but it's not guaranteed. Our Huawei E176 isn't listed, for example, but we could connect, and the MSR handed over to the modem when we yanked the cable connecting it to our broadband box. That said, it did have a habit of dropping the connection, but we can't, hand on heart, state that was certainly the MSR and not the 3G network.

We've already mentioned the positioning of the MSR ports as a niggle - others include the poor build quality of the mains plug mechanism and the fact the unit only comes with a UK plug. Solwise will sell you a European plug for two quid, but you're up the spout if you want a US or Australian one, say. Bit mean, that.

Solwise Mobile Server Router

Enter your carrier's 3G dial-up details here

We also think the MSR's designer could have spaced out the USB ports a bit. You can get two standard USB plugs top to bottom, but anything thicker and you'll have to resort to extension cables.

High performance access to file storage

Next page: Verdict

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.