Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 503
  • Last Modified:

PIX to Cable Modem

I might need the help of security gods like lrmoore to come and help out here.

I have been connecting to the cable modem directly from my machine and now
have a PIX.

Cable modem companies usually authorise you into their network using MAC
address and not my MAC address has changed..Is there any way to perform MAC
address cloning on the outside interface of the PIX so that it can fool the
cable modem into thinking it's still my computer connecting?

Thx.
0
billwharton
Asked:
billwharton
  • 3
1 Solution
 
visioneerCommented:
All you need to do is call the cable company and tell them that you have a new MAC address.  Give them the MAC of the PIX and you're all set.  You can get that info with the command "show interface e0".

0
 
visioneerCommented:
Oh, and the answer to your actual question is "no", the PIX won't spoof MAC addresses.  Cable companies get this issue all the time when someone replaces a firewall, so a quick phone call should take care of it.
0
 
billwhartonAuthor Commented:
Hey thx visioneer.

Supposedly my cable company doesnt even need a call...I simply rebooted the cable modem and that did the trick. I thought cable companies authorize customers via MAC's and hence wonder how did my PIX get allowed into the network without even a call?

thx.
0
 
visioneerCommented:
Not every cable company is the same.  Some of them set their routers to work only with specific MAC addresses, and some don't want the headache.  Glad to hear that it's working for you.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Increase Security & Decrease Risk with NSPM Tools

Analyst firm, Enterprise Management Associates (EMA) reveals significant benefits to enterprises when using Network Security Policy Management (NSPM) solutions, while organizations without, experienced issues including non standard security policies and failed cloud migrations

  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now