Solved

MAC-based acces restriction

Posted on 2003-12-07
5
274 Views
Last Modified: 2010-08-05
We have a server on Suse Linux 8.2 set up to share the internet acces to the whole acces. I want to filter some users out by only allowing specific users to acces the internet (using the mac of the network card) but i couldn't do it, could anybody help me? Maybe even point me to a how-to/tutorial?
0
Comment
Question by:Yo-NuTZ
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 9897111
If using ipchains/iptables:

iptables -N MACcheck
iptables -A MACcheck -m mac --mac-source aa.bb.cc.dd.ee.ff -j ACCEPT
iptables -A MACcheck -m mac --mac-source uu.vv.ww.xx.yy.zz -j ACCEPT
iptables -A MACcheck -j DROP

Couple of good articles..
http://www.linuxworld.com/features/search.htm?ss=iptables
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11468653
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:

--> DELETE - No refund

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

tim_holman
EE Cleanup Volunteer
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 11472558
>Maybe even point me to a how-to/tutorial

I provided links to good resources in my comment..
0
 

Author Comment

by:Yo-NuTZ
ID: 11474579
Sorry for the late answer but this was an issue i solved long ago, similarly how irmoore pointed out. I answered so late because my pc has been broke for several months and i didn't have time to fix it! thanks anyways for the patience and excuse me once more
0

Featured Post

Defend Your Organization from The Greatest Threats

Looking to fill the gaps in your security? Bring together information from the network, endpoint and threat intelligence feeds to really see what's happening in your organization. Join the WatchGuardians in their adventures fighting cyber crime!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question