Solved

MAC address

Posted on 2003-10-21
8
570 Views
Last Modified: 2013-11-13
Here is the situation: A friend of mine uses cable internet. His provider restricts it to only one MAC address. He wants to connect a second computer to the internet, using second NIC and his machine as a router/gateway. The question is if the provider can find out that a second computer is attached /coz they'll cut him off if they find out/. Are the MAC addresses or the original IP preserved in the IP packet?
0
Comment
Question by:mitttko
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
8 Comments
 
LVL 31

Accepted Solution

by:
qwaletee earned 500 total points
ID: 9593104
No, they generally are not at the lower levels of traffic.  Only the IP addess remains in the header, and if your friend's computer is using ICS to share the connection, it will use NAT to translat the address back out to the "public address."

Your friend should use a SOHO gateway (D-Link, Linksys) for this.  It works much better, does not require the "main" PC to remain on, and is pretty typical even for a single PC setup, since it provides extra security to the computer.

I don't know many cable companies that still restrict you to one PC, though.  Sounds like this place sucks!
0
 
LVL 4

Expert Comment

by:Wiired
ID: 9593138
When you have an ISP that restricts to a single MAC address, follow qwaletee's recommendation, get a linksys router, and use the "Clone Mac Address" option in the advanced properties. This way, the ISP gets the MAC of the router, not your NIC.
0
 

Author Comment

by:mitttko
ID: 9593150
aha, sucks

is the destination of the packets recognized only by ports?
and what about the internal-net MACs? can the me "seen" from the provider?
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 

Author Comment

by:mitttko
ID: 9593170
to Wiired
are there any other soho /cheap/ routers around that do that trick? d-link?
0
 

Author Comment

by:mitttko
ID: 9593180
can THEY BE "seen"...
0
 

Author Comment

by:mitttko
ID: 9593203
<<No, they generally are not at the lower levels of traffic>>
just got that
understood
0
 
LVL 4

Expert Comment

by:Wiired
ID: 9593226
Most Dlink's also have the Clone MAC address feature, but Iam not sure of any others off hand.
0
 
LVL 4

Expert Comment

by:Wiired
ID: 9593233
Price wise, between the Linksys and the Dlink...depends who is on sale. :-)
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
VOIP gateways - feedback 23 65
site - site VPN 3 38
Exchange 2010 Edge subscription question 1 24
Datacenter Upgrade - Design Question 5 19
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question