Strange mac address causing err-disable

I have mainly 3550/4506 with port-security. Every day user ports go into err-disable and it's the same few mac addresses each time? anyone else came acreoss this ans know what's it is all about.

It should tell you in the logg why the port is err-disableing the port . Could be as simple as speed/duplex mismatches on the port if they are causing something like a lot of late collisions the switch will err-disable the ports . Check the switch and nic settings for these devices .

Similar Messages

  • DHCP Server with the strange MAC address at the same time. This MAC address is HEX IP address!

    Server version: Windows server 2008 R2 Ent.
    Structure of DHCP scopes: Two DHCP server 50% to 50% all allocation for per scopes.
    Question: Sometimes the DHCP server
    allocate the IP address at the same time to the a strange MAC address per  IP  address, the type is "DHCP/BOOT", it cause DHCP scopes out of space at some time point.  We need clear up them manually.
    I found strange MAC address in HEX is the IP address which the server allocated. 
    Someone meet the issues before, any solution for this ? 
    Thanks !
    Client IP Address
    Name
    Lease Expiration
    Type
    Unique ID
    10.199.190.0
    10.199.190.0
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e3000
    10.199.190.46
    10.199.190.46
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e343600
    10.199.190.59
    10.199.190.59
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e353900
    10.199.190.69
    10.199.190.69
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e363900
    10.199.190.74
    10.199.190.74
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e373400
    10.199.190.90
    10.199.190.90
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e393000
    10.199.190.101
    10.199.190.101
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31303100
    10.199.190.104
    10.199.190.104
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31303400
    10.199.190.110
    10.199.190.110
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31313000
    10.199.190.114
    10.199.190.114
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31313400
    10.199.190.117
    10.199.190.117
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31313700
    10.199.190.121
    10.199.190.121
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31323100
    10.199.190.138
    10.199.190.138
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31333800
    10.199.190.144
    10.199.190.144
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31343400
    10.199.190.153
    10.199.190.153
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31353300
    10.199.190.156
    10.199.190.156
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31353600
    10.199.190.157
    10.199.190.157
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31353700
    10.199.190.163
    10.199.190.163
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31363300
    10.199.190.165
    10.199.190.165
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31363500
    10.199.190.168
    10.199.190.168
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31363800
    10.199.190.169
    10.199.190.169
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31363900
    10.199.190.174
    10.199.190.174
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31373400
    10.199.190.177
    10.199.190.177
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31373700
    10.199.190.184
    10.199.190.184
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31383400
    10.199.190.188
    10.199.190.188
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31383800
    10.199.190.189
    10.199.190.189
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31383900
    10.199.190.192
    10.199.190.192
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31393200
    10.199.190.197
    10.199.190.197
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e31393700
    10.199.190.201
    10.199.190.201
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32303100
    10.199.190.202
    10.199.190.202
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32303200
    10.199.190.209
    10.199.190.209
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32303900
    10.199.190.210
    10.199.190.210
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32313000
    10.199.190.211
    10.199.190.211
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32313100
    10.199.190.212
    10.199.190.212
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32313200
    10.199.190.213
    10.199.190.213
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32313300
    10.199.190.216
    10.199.190.216
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32313600
    10.199.190.219
    10.199.190.219
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32313900
    10.199.190.222
    10.199.190.222
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32323200
    10.199.190.225
    10.199.190.225
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32323500
    10.199.190.226
    10.199.190.226
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32323600
    10.199.190.229
    10.199.190.229
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32323900
    10.199.190.233
    10.199.190.233
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32333300
    10.199.190.235
    10.199.190.235
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32333500
    10.199.190.238
    10.199.190.238
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32333800
    10.199.190.240
    10.199.190.240
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32343000
    10.199.190.242
    10.199.190.242
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32343200
    10.199.190.243
    10.199.190.243
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32343300
    10.199.190.246
    10.199.190.246
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32343600
    10.199.190.249
    10.199.190.249
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32343900
    10.199.190.251
    10.199.190.251
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32353100
    10.199.190.252
    10.199.190.252
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32353200
    10.199.190.255
    10.199.190.255
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139302e32353500
    10.199.191.1
    10.199.191.1
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e3100
    10.199.191.2
    10.199.191.2
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e3200
    10.199.191.5
    10.199.191.5
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e3500
    10.199.191.6
    10.199.191.6
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e3600
    10.199.191.8
    10.199.191.8
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e3800
    10.199.191.13
    10.199.191.13
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e313300
    10.199.191.14
    10.199.191.14
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e313400
    10.199.191.15
    10.199.191.15
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e313500
    10.199.191.16
    10.199.191.16
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e313600
    10.199.191.17
    10.199.191.17
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e313700
    10.199.191.18
    10.199.191.18
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e313800
    10.199.191.19
    10.199.191.19
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e313900
    10.199.191.20
    10.199.191.20
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e323000
    10.199.191.21
    10.199.191.21
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e323100
    10.199.191.22
    10.199.191.22
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e323200
    10.199.191.23
    10.199.191.23
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e323300
    10.199.191.24
    10.199.191.24
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e323400
    10.199.191.27
    10.199.191.27
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e323700
    10.199.191.29
    10.199.191.29
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e323900
    10.199.191.30
    10.199.191.30
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333000
    10.199.191.31
    10.199.191.31
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333100
    10.199.191.32
    10.199.191.32
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333200
    10.199.191.33
    10.199.191.33
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333300
    10.199.191.34
    10.199.191.34
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333400
    10.199.191.37
    10.199.191.37
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333700
    10.199.191.38
    10.199.191.38
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333800
    10.199.191.39
    10.199.191.39
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e333900
    10.199.191.42
    10.199.191.42
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e343200
    10.199.191.44
    10.199.191.44
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e343400
    10.199.191.49
    10.199.191.49
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e343900
    10.199.191.52
    10.199.191.52
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e353200
    10.199.191.54
    10.199.191.54
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e353400
    10.199.191.56
    10.199.191.56
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e353600
    10.199.191.61
    10.199.191.61
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e363100
    10.199.191.62
    10.199.191.62
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e363200
    10.199.191.64
    10.199.191.64
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e363400
    10.199.191.65
    10.199.191.65
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e363500
    10.199.191.66
    10.199.191.66
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e363600
    10.199.191.70
    10.199.191.70
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e373000
    10.199.191.72
    10.199.191.72
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e373200
    10.199.191.73
    10.199.191.73
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e373300
    10.199.191.79
    10.199.191.79
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e373900
    10.199.191.80
    10.199.191.80
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e383000
    10.199.191.81
    10.199.191.81
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e383100
    10.199.191.82
    10.199.191.82
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e383200
    10.199.191.83
    10.199.191.83
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e383300
    10.199.191.84
    10.199.191.84
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e383400
    10.199.191.86
    10.199.191.86
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e383600
    10.199.191.90
    10.199.191.90
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e393000
    10.199.191.91
    10.199.191.91
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e393100
    10.199.191.92
    10.199.191.92
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e393200
    10.199.191.93
    10.199.191.93
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e393300
    10.199.191.97
    10.199.191.97
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e393700
    10.199.191.98
    10.199.191.98
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e393800
    10.199.191.99
    10.199.191.99
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e393900
    10.199.191.101
    10.199.191.101
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31303100
    10.199.191.102
    10.199.191.102
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31303200
    10.199.191.105
    10.199.191.105
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31303500
    10.199.191.106
    10.199.191.106
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31303600
    10.199.191.108
    10.199.191.108
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31303800
    10.199.191.112
    10.199.191.112
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31313200
    10.199.191.115
    10.199.191.115
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31313500
    10.199.191.116
    10.199.191.116
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31313600
    10.199.191.117
    10.199.191.117
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31313700
    10.199.191.119
    10.199.191.119
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31313900
    10.199.191.120
    10.199.191.120
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31323000
    10.199.191.121
    10.199.191.121
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31323100
    10.199.191.125
    10.199.191.125
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31323500
    10.199.191.133
    10.199.191.133
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31333300
    10.199.191.146
    10.199.191.146
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31343600
    10.199.191.158
    10.199.191.158
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31353800
    10.199.191.162
    10.199.191.162
    2014/8/5 10:07
    DHCP/BOOTP
    31302e3139392e3139312e31363200

    Hi,
    According your description, this may be caused by virus or malicious client.
    Please try to perform a network capture on your DHCP server. Then find the device which send these malicious discover messages.
    To download Network Monitor, please click the link below,
    http://www.microsoft.com/en-hk/download/details.aspx?id=4865
    To prevent this issue, you may implement NAP Enforcement for DHCP.
    Here is a checklist of configuring NAP Enforcement for DHCP,
    Checklist: Configure NAP Enforcement for DHCP
    http://technet.microsoft.com/en-us/library/cc772356(v=WS.10).aspx
    Hope this helps.
    Steven Lee
    TechNet Community Support

  • Computer names persistently associated with a MAC address causing problems

    Our WDS server will assign out a computer name like CompanyName###  This is great.
    The problem is sometimes WDS will assign a computer name that is getting associated with the MAC address somehow--I assume this is what's happening--and kick a computer off the domain that now has that computer name. 
    Is there some way I can disable the association of computer names with MAC addresses, or persistent computer names?

    Hi,
    How did you define your naming policy in WDS or in your answer file?
    3.1.1.4 Machine Naming Policy
    http://msdn.microsoft.com/en-us/library/dd871418.aspx
    Please also check this hotfix:
    Windows Deployment Services generates duplicate client computer names when the %MAC variable is used
    http://support.microsoft.com/kb/957051
    Hope this helps.

  • SF300-24PP switch causing err-disable on some other switch Uplinks

    This is something that happened as I was setting up a couple of these PoE SF300 switches for IP cameras.
    We wanted to save a little money so we purchased a few of these switches to daisy-chain onto a couple of our 4507s to provide PoE support for IP cameras that are coming in. But an odd thing happened when I set one up and connected it.
    I set up the SF300 switch with all FE ports set to access and for VLAN 18 (our camera VLAN). I then configured a Portchannel (PO2) and assigned GE1 and GE2 to it. I defined the allowed VLANs 10,14,18 on the Port Channel Interface definition. I also created an SVI Interface VLAN definition for our management address (on VLAN 10) to be able to SSH into the switch once it's on the network.
    I did most of this thru the CLI and not the GUI.
    I saved the config (copy run start) and turned off the switch then deployed it in the IDF closet. I powered it up and connected the GE1&2 ports to 2 Gig ports in the 4507 defined with PO2 - both with MODE=ON.
    Well, as I found out later, my config changes never got saved and the GE1&2 because trunk ports, so when I plugged them in, They started acting independently. At about the same time another switch we have in our network (that is daisy-chained off a 3750 - 1 trunk port) suddenly had it's uplink put into ERR_DISABLE mode (we also had this occur with another 2 switches with a very similar config - Daisy-Chain).
    Now , how my config never got saved issue, is not at the forefront of my mind as much as how did a couple of switch uplinks in another building go into ERR-DISABLE. 
    I know that our 4507s run rapid per-vlan STP+ and that the SP300 only runs Rapid STP, but this is a real mystery to us. If anyone has any ideas for tracking this down, please reply.

    Hello James,
    Welcome to the forums!
    About the default settings. The switch comes with vlan1 as the default vlan for all traffic.
    Here is a quick overview of the port settings
    access - one vlan
    trunk - multiple vlans
    general - multiple vlans (had additional options)
    When using the auto voice-vlan, you can have your port set as access for vlan 1 and when the switch see a phone connected, it will join the voice vlan also. This allow the ports to be dynamic. It is not necessary to do this. You can create all ports as trunk ports that are part of both your default vlan and your voice vlan.
    The benifits of auto-voice vlan
    -phones are discovered and joined to the vlan dynamically
    -predetermined QoS settings
    -security in that you can have your port set to access
    This is a relatively basic overview.
    As for the problem you are seeing. I would recommend that you check the firmware of the switch and upgrade if needed. While it may not have anything to do with the problem at hand, it will help prevent any future issues.
    I would suggest disabling the Green Ethernet, which can be found under the port management section. If you continue to see the problem after that, I would recommend giving us a call at the support center. We will be able to look a little closer to what is happening.
    http://www.cisco.com/en/US/support/tsd_cisco_small_business_support_center_contacts.html

  • How to view logs of disabled MAC addresses?

    I have a Wireless LAN Controller 4402 and WCS 7.0, and I have a few MAC addresses that are "disabled" due to policy violations. How can I view a log or a report that will show me if these MAC addresses are still attempting to connect?

    if the clinet is excluded.. then the client will not be able to connect at all... if you want to see the Logs.. i guess we see that on the TRAP logs, if not then we need to run the debug..
    lemme know if this answered your question..
    Regards
    Surendra
    ====
    Please dont forget to rate the posts which answered your question and mark it as answered or was helpfull

  • Cannot get to the Mac address!

    Hi everyone,
    We used to be able to connect our Wii to our wireless connection with a few clicks, now after we haven't had the Wii plugged in for about a year it can't seem to connect anymore, all though nothing changed on my airport side, the WEP password is the same, I tried retyping it a few times and that did nothing.....anyways, we went to the Nintendo support site and they also recommend the following:
    1. If your WEP or WPA key is correct, then the problem might be related to MAC address filtering:
    1. From the router settings, locate the "MAC address filter" settings (also known as "access control", "access list", or "network filter" depending on your router model).
    2. If the Mac address filter is set to "enabled", then you must add the Wii's MAC address to the "allowed" list. You can locate the Wii's MAC address from the "console information" page (located under "Internet" in the Wii Settings).
    3. If the Mac address filter was disabled, then continue troubleshooting.
    now, I am not able to access my airport utility, I put in the WEP password its asking for and it keeps coming back for it............so , I cannot access that panel, but I can't find a place to add a Mac address in the network preferences for the airport!???
    Help?
    Thank you,
    Lucia

    Ok, here's the basic step-by-step to get your AX up-and-running to get Internet access from a cable modem ...
    Perform a "factory default" reset of the AX
    o (ref: http://docs.info.apple.com/article.html?artnum=108044)
    Modem/Router Power ReCycling
    o Power-off the Cable modem, AX, & computer(s); Wait at least 5 minutes.
    o Power-on the Cable modem; Wait at least 15 minutes.
    o Power-on the AX; Wait at least 10 minutes.
    o Power-on the computer(s)
    Setup the AX
    Connect to the AX's wireless network, and then, using the AirPort Admin Utility, try these settings:
    AirPort tab
    o Base Station Name: <whatever you wish or use the default>
    o AirPort Network Name: <whatever you wish or use the default>
    o Create a closed network (unchecked)
    o Wireless Security: Not enabled
    o Channel: Automatic
    o Mode: 802.11b/g Compatible
    Internet tab
    o Connect Using: Ethernet
    o Configure: Using DHCP
    o WAN Ethernet Port: Automatic
    Network tab
    o Distribute IP addresses (checked)
    o Share a single IP address (using DHCP & NAT) (enabled)
    Once you verified that you can get Internet access for all of your computers, you should secure your wireless network. To do so, I suggest that you make these changes:
    Change Wireless Security
    o Wireless Security: WPA Personal or WPA2 Personal
    o Encryption Type: WPA and WPA2
    Base Station Options - WAN Ethernet Port
    o Enable Ethernet Port (checked)
    o Enable SNMP Access (unchecked)
    o Enable Remote Configuration (unchecked)
    o Enable Remote Printer Access (unchecked)

  • WLC - How to block a single client MAC address?

    Hi Sir,
    On a WLC (software version 4.1.185.0), how to block a single client MAC address?
    I thought of using the SECURITY -> Disabled Clients. Is it right?
    There are currently 250 users connected to the WLC. MAC Filtering is not a scalable solution because as I understand it, we have to specify all the legitimate MAC addresses in the local database.
    Thank you.
    B.Rgds,
    Lim TS

    Hi Lim,
    As you have discovered, the Mac filtering on the WLC is an Allow (based on Mac address) rather than what you need which is a Deny (based on Mac address). I have not tried this feature but I think you are on the right track in using the Exclusion List (Blacklist) feature. Have a look;
    Use SECURITY > AAA > Disabled Client then click New or MONITOR > Clients then click Disable to navigate to this page.
    This page allows you to manually Exclusion List (blacklist) a client by MAC address.
    Add the MAC Address and an optional Client Description for the client to be disabled.
    Note When you enter a client MAC address to be disabled, the Operating System checks that the MAC address is not one of the known Local Net clients ( Local Net Users), Authorized clients ( MAC Filtering), or Local Management users ( Local Management Users) MAC addresses. If the entered MAC address is on one of these three lists, the Operating System does not allow the MAC address to be manually disabled.
    Hope this helps! Let us know.
    Rob

  • Firefox has detected that the server is redirecting the request for this address in a way that will never complete. * This problem can sometimes be caused by disabling or refusing to accept cookies.

    Firefox has detected that the server is redirecting the request for this address in a way that will never complete.
    * This problem can sometimes be caused by disabling or refusing to accept
    cookies.

    In my experience this is most of the times a server issue of the website provider.
    Does this error occur on all Websites or just one specific Website?
    Does this Website load in Internet Explorer (or any other Browser?)?

  • TP 60 Access connection - Preferred AP MAC address disabled permanently

    I have at home WiFi Router and WiFi repeater. They both are visible, but Router has weak signal, Repeater strong signal. TP not like to connect to Repeater. Problem, that preferred AP MAC address field is always disabled in Connection wizard (profile).
    Access Connection v.5.72 - last recommended for my PC. WiFi adapter 11 a/b/g/n/ Wireless LAN Mini-PCI Express Adapter (Atheros Communication Inc), driver 2.0.0.75
    Any idea?

    OS - Win7 Pro 32 bit

  • Need to disable "Block Anonymous Internet Requests" with "Clone MAC address?"

    Ok -- so I learned from tech support and this forum that the "Clone MAC address" option needs to be enabled when connecting to the Internet via a cable modem. In one of the forum posts (sorry lost track of which one), it said that in addition I need to disable "Block Anonymous Internet Requests" as well -- is this correct? If so what is the effect of this? Linksys documentation is not clear if this is absolutely necessary.
    I think the comment is in this thread
    http://forums.linksys.com/linksys/board/message?board.id=Wireless_Routers&message.id=8600

    Usually resetting you cable modem will allow you to use a router without cloning the MAC address.  Reset modem, power down, plug router into the modem, power up the modem, power up the router and you should be good to go.  The popular reason that I know of for unchecking "Block Anonymous Internet Requests" is when you plan to use P2P software like Azureus.  Your computer becomes pingable and can be seen on the net.

  • .mac iCloud address causing 'contacts' syncing problems

    Hello,
    This may have already been addressed here, but if not hopefully this may be helpful.  I have been having many issues syncing contacts to my iPad Air.  The correct contacts are on my Macbook, my iCloud account, and on my iPhone, however they were not syncing correctly to my iPad.  I tried all the usual fixes, i.e. turning iCloud off on my iPad, signing out of iCloud on my iPad and singing back in, etc... to no avail.  Everything BUT contacts was syncing between all my devices.
    That is when I noticed that all my devices under settings->Mail, Contacts, Calendars->Accounts listed an 'iCloud' account for mail, contacts, calendars, Safari.  However, my iPad Air listed a .MAC address for these.  If I tried to add an iCloud account, it would say that an iCloud account has already been added to your iPad.  Once I deleted the .Mac account and choose to erase all the information on my iPad, I was able to add a iCloud account back to my iPad.  The account now shows up as an 'iCloud' account and not a '.Mac' account.  Problem solved.  Hope this helps anyone having this issue.
    Billy

    Did you change it on both phones?  If you are syncing contacts with separate iCloud accounts on both phones, then the only way I can think of that your contacts would be linked is by syncing them both with another external sources, such as an exchange account.  Setting iCloud as the default account for contacts on both phones would cause new contacts to be created in iCloud, and since your iCloud accounts are different on each phone, I don't see how contacts added to the iCloud account on one phone would be seen on the other.
    You may need to go to icloud.com and confirm that new contacts added to each phone are added to your separate iCloud accounts, just to confirm that the change to settings is working properly.

  • Firefox has detected that the server is redirecting the request for this address in a way that will never complete. *This problem can sometimes be caused by disabling or refusing to accept cookies. I followed the instructions for "redirection" issues.

    Firefox has detected that the server is redirecting the request for this address in a way that will never complete.
    * This problem can sometimes be caused by disabling or refusing to accept
    cookies.

    In my experience this is most of the times a server issue of the website provider.
    Does this error occur on all Websites or just one specific Website?
    Does this Website load in Internet Explorer (or any other Browser?)?

  • Dot1x disable mac-address aging

    Hi, all!
    I have configured dot1x on 3560 switches on my network. Switches have been configured to send MAC notification traps. I have set mac address-table aging time to 1800 sec. but only 802.1x not enabled switch send trap periodically.  It seem dot1x technilogy disable mac-address aging process.
    Can anybody explain it.

    You can control mac-address learning for a VLAN by using this switchport command on a trunk.
    Router(config-if)# switchport port-security maximum 3 vlan 102
    Or simply use this to allow only a certain number of mac's per access port.
    Router(config-if)# switchport port-security maximum 1
    Here is the command reference.
    http://www.cisco.com/univercd/cc/td/doc/product/software/ios122sr/cr/srir_r/ir_s4sr.htm#wp1015189
    PS: you cannot totally stop mac learning as the valid values are from 1-4097 so you cant set it to zero and i believe you dont want to as well , since you have a layer2/3 environment.
    HTH-Cheers,
    Swaroop

  • ISE 1.2 disable endpoints with certain mac address

    Hi All,
    We have an AD to authenticate for wireless users. In AD, we have specified to block the user if the password is entered wrongly for more than 3 times. The problem is some of them are using other user ID and locking the accounts. I have gotten the MAC address of the user. Can anyone please advise how to block the request from this MAC from even reaching the AD.
    Thanks

    You have two options from ISE and one option from the WLC:
    The first option which is not very scalable is to modify your authentication policy to deny access to an specific MAC address(Radius:Calling station ID). But this is not very scalable as you can only specify one MAC address.
    Your second option is to enable the anomalous client suppression(under systems->settings->protocols->RADIUS). This will be your best option but it would require a bit of testing to identify what are the best values for your environment.
    From the controller you can enable the excessive 802.1x authentication failures. By default it won't even send the fourth authentication to ISE for a failing endpoint:

  • How to disable mac address filtering

    Hello I have a macbook pro. I am using a Westell 7500 wireless router and my hp photosmart 110 printer stopped working, saying that "MAC address filtering may be enabled on your wirelss router". Not sure how to dissble this and/or why it all of a sudden was enabled. Printer had worked perfectly for 2 months previously since installation of new wireless router/internet in our home. Any help is appreciated!

    You need to use AirPort Utility to change any of the AirPort Extreme's settings.
    However, like Bob Timmons said I don't believe the tech really knows what he is after, and is lost in the weeds regarding MAC Address Filtering.
    Perhaps you can ask for another technician who understands you are using an AirPort Extreme. Your Roku box should not require so much effort to configure.
    Have you read these instructions?
    http://support.roku.com/entries/244199-how-do-i-set-up-my-roku-player
    I don't have a Roku but it seems very similar to my Blu-Ray player. Account registration and setup is performed on a computer by going to the address www.roku.com/link in Step 6.
    It should not be necessary to change anything at all with your AirPort. Just make sure the Roku is within its wireless range.

Maybe you are looking for