Block Wired MAC addresses?

WRT54g Version 5.0
Firmware 1.02.8
I have been able to figure out how to block Wireless MAC addresses, and that has been VERY helpful.
( Wireless Tab -> Wireless MAC filter -> Permit Only -> and so on.... )
But I am cannot find out how to block certain wired based MAC addresses.  Is this possible?
Solved!
Go to Solution.

Yes. With access restrictions.
Of course, as MAC addresses are easily changed, cloned and detected on wireless connections (as MAC addresses are always transferred unencrypted) the wireless mac filter is useless for wireless security. On the wireless, use WPA2 Personal with AES and a strong passphrase. The wireless MAC filter won't make a difference in regard to your WPA2 protected wireless network.
Same applies to wired devices and access restrictions. Of course, the difference with wired connections is that you have better control over you can plug into your router and who not...

Similar Messages

  • Is it easy to block a mac address on airport extreme?

    I have plans of changing my router to an apple airport extreme. Is it easy to block a mac address on apple's airport extreme?

    So you can just control the time that they're connected.
    You can set up daily time limits to allow a specific device to connect at the times that you specify. It is possible to set up different "rules" for each individual device......so your Mac could connect anytime, but other devices connect only at the times that you specify.
    It is also possible to set up a rule to not allow a device to connect at all at any time. That would be called the "No Access" rule.
    In order for the PS4 to connect automatically, a router needs to have UPnP service. The AirPorts do not have this. If you want to connect the PS4 to the AirPort, you will need to plan to set up the port mapping manually.

  • Blocking all MAC addresses except for the ones you allow

    I have a Cisco Aironet 1200 Access Point. I want to block all MAC addresses from accessing the access point, except for the ones I've allowed. First I went to the Address Filters page and clicked on Allowed, then listed all the MAC address I want to be able to access the access point. Then I went to the Ethernet Advanced page, and set the Default Multicast Address Filter to Disallowed, and the Default Unicast Address Filter to Disallowed. Then I went to the AP Radio: Internal Advanced page, clicked on the Advanced Primary SSID Setup link, and set the Default Unicast Address Filter to Disallowed. Accept Authentication Type is set to Open with Shared and Network-EAP cleared, and the Require EAP check boxes are all cleared.
    When using a computer whose MAC address is not listed on the Address Filters page, I am still able to connect to the network through the access point. I am also able to connect to the access point from any pc on my network by entering its IP address in Internet Explorer.
    What do I need to do to block any pc without a listed MAC address from connecting to the access point?
    Thanks, Jeff

    Here's the instructions and URL on how to create an MAC based filter:
    Follow these steps to create a MAC address filter:
    Step 1 Follow the link path to the Address Filters page.
    Step 2 Type a destination MAC address in the New MAC Address Filter: Dest
    MAC Address field. You can type the address with colons separating the character pairs
    (00:40:96:12:34:56, for example) or without any intervening characters (004096123456, for example).
    Note If you plan to disallow traffic to all MAC addresses except
    those you specify as allowed, put your own MAC address in the list of allowed MAC
    addresses. If you plan to disallow multicast traffic, add the broadcast MAC address
    (ffffffffffff) to the list of allowed addresses.
    Step 3 Click Allowed to pass traffic to the MAC address or click Disallowed
    to discard traffic to the MAC address.
    Step 4 Click Add. The MAC address appears in the Existing MAC Address
    Filters list. To remove the MAC address from the list, select it and click Remove.
    Step 5 Click OK. You return automatically to the Setup page.
    Step 6 Click Advanced in the AP Radio row of the Network Ports section at
    the bottom of the Setup page for the radio you want to configure. The AP Radio Advanced page appears.

  • SCCM 2012 Losing Wired Mac Address of Laptops

    When attempting to re-image a laptop I have found that SCCM replaced
    the wired MAC address in properties with the wireless MAC. This is only an issue when I go to image as it will not PXE, I get a no boot file received message.
    I have been deleting the laptops from SCCM completely and then re-importing them using the wired MAC.
    After re-adding the laptop with the wired MAC it is still holding a record of the last PXE Deployment (once deleted the
    system will PXE boot fine). 
    Is there a way to have SCCM actively hold both MAC addresses?

    I'm in the same boat as JLCARON401. Laptop devices in SCCM seem to forget the MAC address of the wired interface.
    Tim, they show up in the Hardware History section of Resource Explorer, but not in the current view. You can see the device listed, but the MAC field is empty.
    I just put this together to grab data from the database directly to confirm that the data exists.
    SELECT DISTINCT
    MACAddress00
    FROM
    [CM_PEN].[dbo].[Netcard_HIST] netcard
    INNER JOIN
    [CM_PEN].[dbo].[Computer_System_DATA] computer
    ON
    netcard.MachineID = computer.MachineID
    WHERE
    computer.Name00 like 'SMS-LIB-MD%'
    AND
    netcard.MACAddress00 IS NOT NULL
    AND
    netcard.AdapterType00 like '%802.3%'
    Not sure where to go with this next. I'm looking into it because we're having problems with laptops that charge in a cart are missing updates. I've rigged up a cart with power and a switch so each laptop can be powered up (WOL) during the night to have all
    the outstanding deployments installed.

  • Blocking Client MAC Addresses at Sup720/WLSM?

    I want to block client MAC addresses at the central 6500, where the WLSM is located. Is there any solution like "dot11 association mac-list" at the accesspoints? I tried an "access-expression" on the tunnelinterface, but it did not work. Any suggestions?

    Here is an example of config
    switch(config)# mac access-list extended ARP_Packet
    Switch(config-ext-nacl)# permit host 0000.861f.3745 host 0006.5bd8.8c2f 0x806 0x0
    Switch(config-ext-nacl)# end
    Issue the vlan access-map map_ name command and the action drop command, which is the action to perform.
    The vlan access-map map_ name command uses the MAC access list that you created to block ARP traffic from the hosts.
    Switch(config)# vlan access-map block_arp 10
    Switch (config-access-map)# action drop
    Switch (config-access-map)# match mac address ARP-Packet
    Add an additional line to the same VLAN access map to forward the rest of the traffic.
    Switch(config)# vlan access-map block_arp 20
    Switch (config-access-map)# action forward
    Choose a VLAN access map and apply it to a VLAN interface.
    Issue the VLAN filter vlan_access_map_name vlan-list vlan_number command.
    Switch(config)# vlan filter block_arp vlan-list 2

  • Blocking a MAC address with WCS

    I recently deployed a 4404 with WCS and want to block a MAC address from connecting to our wireless because of Deauth floods. We have around 40 APs. I am thinking it should be done through a template, but not sure. Can anyone lead me to right document that explains the process of blocking specific MAC addresses?
    thanks,
    Jonathan

    Hi Jonathan,
    Have you see this doc;
    Configuring a MAC Filter Template
    Cisco Wireless Control System Configuration Guide, Release 4.0
    http://www.cisco.com/en/US/products/ps6305/products_configuration_guide_chapter09186a00806b7273.html#wp1068145
    Hope this helps!
    Rob
    Please remember to rate helpful posts.....

  • Blocking a MAC address from Authentication to AIR-AP1230 12.3(8) JA

    Anyone know the CLI commands for blocking a single MAC address from Associating to an AIR-AP1230 running 12.3(8)?

    This link may help as well:
    http://www.cisco.com/en/US/products/hw/wireless/ps430/products_configuration_guide_chapter09186a0080184aa0.html#91655
    Change the Action to Block, make the Default Action Forward All, and make the mask 0.0.0.0. Apply this to the dotllradio interface (or sub-interface), filtering inbound packets. This should block the specified MAC address only.

  • Can iPhone 6 hotspot block unknown MAC addresses?

    i am somewhat concerned that someone can hack my iPhone 6 hotspot.
    is there a way to block devices with unknown MAC address from connecting to the hotspot?
    is such a feature available, feasible, desirable?
    anybody?
    regards

    Please anyone?

  • Block cloned MAC address in WCS

    Hi I would like to ask if I can block a user who connects to our network and generates high usage of internet.
    The problem is every time he clones his MAC address.
    PS ...( WITH OUT SETTING A PASSWORD ON THE APs AND WITH OUT SWITCHING THEM OFF)
    THX

    Chris
    Only way to prevent it is to do exactly what you mentioned you don't want to do and that's set a password or eap security. Layer 2 hacks have been around for ages. Very hard to defend unless you lift security requirements.
    Sent from Cisco Technical Support iPad App

  • Block curtain MAC-addresses on my WRT54GL

    Hello
    I use a Linksys WRT54GL for my wireless setup in my apartment. I have noticed that there sometimes are unknown MAC-addresses in "DHCP Clients Table". I guess it is my neighbours or someone on the street.
    Am I able to block a curtain MAC-address, so I precent them to connect to my network. And how?
    Best regards,
    MAthias

    Under the Wireless tab,click on the Wireless Mac Filter>>>>choose the option enable and click on the option "document.write("Prevent PCs listed below from accessing the wireless network.") Prevent PCs listed below from accessing the wireless network" and then,click on Edit Mac Filter List to enter the Mac Address which you want to prevent.

  • 'WIRED' MAC address control.

    Chaps, good day to you all.
    Now I know how to restrict access for any wireless device connecting to my Airport Basestation/Time Capsule, but what if someone wants to connect via cable?
    Anybody out there know if it's also possible to manage that at all, (whether from the Airport Utility interface or from terminal etc)?
    Thanks.

    I don't want the whole device hidden really tho.
    It wouldn't be.
    I was thinking of a common security type device that offices use to prevent unauthorized access and use of equipment. It's a device similar to a small bird cage, but stronger, with a mechanism to add a lock.
    The "bird cage" allows the wireless signal out, but prevents hands from reaching and changing anything on the device.
    Message was edited by: Bob Timmons

  • MAC address blocking

    Hi, need help on blocking a specific MAC address on an interface. On that interface it is cascaded to a hub.
    Config# mac-address-table permanent aaab.000f.ffef e0/2
    - is this the right command and can i list all the MAC address that is allowed to run? or there is a command to just block one MAC address and the rest is ok?
    OR
    Config# mac-address-table restricted static aaab.000f.ffef e0/2 e0/3
    -almost the same as above but more restrictive

    Which switch is this ?? What model number and the IOS version.
    What I can think of is using 2 ways :
    1 Configuring the MAC Acl and applying it to the same port but this block only non-ip traffic.
    2. Configure port security and secure you addresses as static and give the number of max-counts the same the as number of amc you want to allow which are connected to hub.
    regards,
    -amit singh

  • I need to change the MAC Address for Airport on MacBook

    I have a specific need to change my son's Airport MAC address as his school requires the use of USB network cards that aren't compatible with MACs. These cards are needed because the school's router uses MAC address filtering.
    Before we upgraded his Mac to Snow Leopard, we were able to change the MAC address to the MAC address of the useless dongal the school supplied. We basically created an AppleScript program that ran the "sudo ifconfig en1 ether xx:xx:xx:xx:xx:xx" and all was good.
    This command no longer works for changing the MAC address. We tried it as root user as well and by typing it into the terminal window as root. After running the command, we can run "ifconfig en1" and it does display the new mac address but when we turn the airport on and try to connect, it just hangs and won't connect.
    Our other non-Snow Leopard still works fine after running the commands so I'm guessing Apple disabled this functionality. It's hardly a security issue by being able to change your mac addres.
    Is there a new way to accomplish this? I've searched everywhere.
    Thanks!

    Would an easier solution be to provide the school's IT admin with your mac address and have it added? If they can add a block of mac addresses for the usb dongles, they can add more for machines that cannot use the dongle.
    Also: "It's hardly a security issue by being able to change your mac address."
    While it may not be a security issue for your machine, it is a security for the school network who is using mac address filtering as hopefully only one part of their wireless security.
    That being said, have you read this?
    http://osxdaily.com/2008/01/17/how-to-spoof-your-mac-address-in-mac-os-x/

  • Should I use a MAC address to validate users for my program?

    I'm writing a graphical console program and I was planning on using a few methods for security. One being to block a user from logging in again if they don't type the correct username and password within three tries until the root user authenticates it again. I was planning on blocking the IP address but someone suggested blocking the MAC address since no 2 have the same ID and it's burned in, not to mention alot of people have dynamic addresses. However, I was reading that MAC addresses are mainly used in ethernet cards. I thought any device that has network capabilities has to have a MAC address? Is it good to use a MAC address for blocking someone from logging in again or what?

    Its very easy to change your MAC address. If you have a wireless router (which you can buy for like 20 dollars) then you can tell it what MAC address to use. So I agree, don't use a MAC address to block users from your program. Also are you sending the username/password over the network in clear text? If so, these can be intercepted. So doing that may be a bad idea; it depends on how much security you want for your application.

  • Change MAC Address

    How do you change the MAC address in Leopard?

    I've found that http://spoofmac.com works great in Leopard... for spoofing the AirPort MAC address. Not so much for the ethernet. It seems that something changed in Leopard and I haven't seen any information about spoofing wired MAC addresses and success under Leopard.
    (A legitimate reason to spoof a MAC address: I'm trying to get two ports in my apartment swapped from the student subnet to the faculty subnet. The net admin has no idea which cables are involved and wants to trace MAC addresses. I've got a couple of routers plugged into the ports... but no way of getting the routers to go through the web forms to register with our student ResNet and therefore no way to get the routers (and their MAC addresses) out of their ResNet jail, and make them traceable so I can get these ports swapped. So... I'm trying to spoof their MAC addresses on a machine that can go through the web forms to get those MAC addresses out of jail. Unclear if spoofing the MAC addresses on the wireless will suffice. Ay yi yi.)

Maybe you are looking for