Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Clone MAC address in Linux

Posted on 2002-03-03
8
575 Views
Last Modified: 2010-04-20
In almost all DSL/Cable Routers (Barricades and Linksys) they give you the option of cloning the mac address of a machine on the network or allowing you to manual enter a new mac address for the WAN port.

Is this possible in Linux?  I have a Linux Box with two NICs, Eth0=WAN Eth1=LAN.  I want to set Eth0's MAC address to that of a machine on my network.

Please inform me how this would be done!

Thanks
0
Comment
Question by:jajej
  • 3
  • 3
  • 2
8 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6837890
this can simply done with the ipconfig command
But your NIC must support setting of the MAC.
0
 

Accepted Solution

by:
John_Bell_2 earned 100 total points
ID: 6838070
Whups - the ipconfig command is MS, not Linux. I believe ahoffman meant "ifconfig". Look at the man page for ifconfig ("man ifconfig") and scroll down to the description for "hw class address". In your case, you're making the change on an ethernet interface. If the device driver for your ethernet interface supports changing the MAC (as ahoffman has mentioned), then you can run the following command to make the change:

root# ifconfig eth0 hw ether 00:01:02:03:04:05 (example)

That should do the trick. Let me know how it turns out.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6838484
oops, ifconfig

> If the device driver for your ethernet interface ..
hmm, to be more precise: this must be the driver on the NIC itself, usually in a ROM or a-like.
0
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

 

Expert Comment

by:John_Bell_2
ID: 6839274
Right, the NIC has to support it. Ugh, layering...
0
 
LVL 1

Author Comment

by:jajej
ID: 6839293
Do 3Com and Intel cards support "temporary" changing of the MAC address using ifconfig?  I don't want to change the MAC address permanently.
0
 
LVL 1

Author Comment

by:jajej
ID: 6839337
Do 3Com and Intel cards support "temporary" changing of the MAC address using ifconfig?  I don't want to change the MAC address permanently.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6840865
most 3Com do, but check your docs
0
 
LVL 1

Author Comment

by:jajej
ID: 6863759
FOR EVERYONE: Just so you guys know, at least with 3Com 3C905c and RH 7.2 this is the order to change the MAC address of the card.

1. ifconfig eth(x) down
2. ifconfig eth(x) hw ether 00:01:02:03:04:05
3. ifconfig eth(x) up

I will award the points in a day so that people have some time to weigh in if they would like.


0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

837 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question