Hi,
On Wed, 28.10.2009 at 17:29:36 -0500, Andres Salazar ndrsslz...@gmail.com
wrote:
I Have dhcp enabled on my LAN which assigns an IP according to the
clients MAC address, however if a user wanted to be malicious he can
statically assign any IP to his NIC.
he then has root access to the
Google 802.1x port authentication then see if your switch is capable of
doing it. (ebay might get you a switch that can)
It'd block the rogue machine at the switch connection.
NB. it's possible to change mac addresses on machines so it's not really
very secure. It's more of a inconvenience.
Hello,
I Have dhcp enabled on my LAN which assigns an IP according to the
clients MAC address, however if a user wanted to be malicious he can
statically assign any IP to his NIC.
Isnt there anyway I can force my ARP tables to only allow IPs to be
assigned if the MAC address matches?
Thanks
You can do that using the arp(8) command
# arp -s 10.0.0.2 00:90:27:bb:cc:dd permanent
take a look at the man page of the command
I hope this can Help !
On Wed, Oct 28, 2009 at 5:29 PM, Andres Salazar ndrsslz...@gmail.comwrote:
Hello,
I Have dhcp enabled on my LAN which assigns an IP
Jorge Enrique Valbuena Vargas jvalbue...@gmail.com writes:
You can do that using the arp(8) command
# arp -s 10.0.0.2 00:90:27:bb:cc:dd permanent
take a look at the man page of the command
and you could combine that with dhcpd -L to maintain a pf table and
only pass traffic from addresses
On Wed, Oct 28, 2009 at 6:08 PM, Peter N. M. Hansteen pe...@bsdly.net
wrote:
Jorge Enrique Valbuena Vargas jvalbue...@gmail.com writes:
You can do that using the arp(8) command
# arp -s 10.0.0.2 00:90:27:bb:cc:dd permanent
take a look at the man page of the command
and you could combine
6 matches
Mail list logo