Quick answer would be, not in that scenario. All frames from your NAT router to your FreeBSD machine are only going to have the SRC MAC of the NAT router itself, and the DST MAC of the FreeBSD machine if it's directly connected. You might be able to identify the hosts to a degree that are behind the router by using some type of passive OS identification. The easiest way to get what you want would be to replace the wireless NAT router with an access point which will allow you to bridge your wireless hosts directly to your wired network, and finally to your FreeBSD machine, use FreeBSD to do your NAT.

Chris Bowman


Paul Bridger wrote:
Hi

I'm trying to solve a problem with ipfw2, so would be grateful for help from anyone on the list with moving things forward.

I would like to understand if it's possible to discover the real MAC address of a packet that has been NAT'd by another device. The scenario for using this would be for hosts on a wireless LAN that connect to a wireles router which NAT's their connection and then routes the packets to another LAN (across a wire) where a FreeBSD server performs firewall packet filtering via ipfw2. As all the connections from the hosts on the wireless LAN have had their MAC and IP addresses NAT'd to that of the wireless router, it is difficult to distinguish between hosts, unless some form of deep packet inspection could be performed to discover the true MAC address. Is this something that would be possible with ipfw2?

Thank you.

-Paul
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to