Security Basics mailing list archives
Re: IP to MAC mapping
From: Devdas Bhagat <dvb () users sourceforge net>
Date: Sat, 23 Nov 2002 00:03:46 +0530
On 20/11/02 18:49 +0100, Johan Denoyer wrote:
Hi, we are currently looking into illegal usage of a protected network. We are managing a class C network, and we would like to be able to detect illegal usage of the network by finding the MAC address of the ip address used and then checking it against a database.
This is a bad idea. Use the generic concept of a firewall and allow only selected MAC addresses to be active on the network. You could script up some iptables rules for these, and a rule to DROP and LOG all other MAC addresses. The ruleset can be built automatically from a database. Devdas Bhagat
Current thread:
- IP to MAC mapping Johan Denoyer (Nov 22)
- RE: IP to MAC mapping Ian Lyte (Nov 25)
- RE: IP to MAC mapping Vytautas Kaziukonis (Nov 26)
- Re: IP to MAC mapping _rAt_ (Nov 26)
- Re: IP to MAC mapping Richard Westlake (Nov 25)
- RE: IP to MAC mapping Burton M. Strauss III (Nov 25)
- Re: IP to MAC mapping Shanon (Nov 28)
- RE: IP to MAC mapping Seth Connolly (Nov 25)
- Re: IP to MAC mapping Jon (Nov 25)
- Re: IP to MAC mapping Devdas Bhagat (Nov 25)
- Re: IP to MAC mapping Robert Hogan (Nov 26)
- Message not available
- Re: IP to MAC mapping Devdas Bhagat (Nov 26)
- Enforcing IE not cache usr/passwords and parsing the current cache Mark (fat) (Nov 28)
- RE: IP to MAC mapping Ian Lyte (Nov 25)
- RE: IP to MAC mapping Steinar Skjelanger (Nov 27)
- <Possible follow-ups>
- RE: IP to MAC mapping Wolf, Glenn (Nov 25)