Solved

How to involve MAC Address in IPtables Rule

Posted on 2004-09-08
2
369 Views
Last Modified: 2012-05-05
How can i add the mac address restriction to this rule ?


-A RH-Lokkit-0-50-INPUT -p tcp -m tcp --dport 22 -s 200.75.XXX.XXX --syn -j ACCEPT


Thanks to you all !
0
Comment
Question by:diordonez
2 Comments
 
LVL 5

Expert Comment

by:NashvilleGuitarPicker
ID: 12016931
The following thread has a discussion similar to what you are trying to do:

http://lwn.net/2001/1011/a/netfilter-mac.php3

- Will
0
 

Accepted Solution

by:
danieldg earned 125 total points
ID: 14150601
-A RH-Lokkit-0-50-INPUT -p tcp -m tcp --dport 22 -s 200.75.XXX.XXX -m mac --mac-source 01:02:03:04:05:06 --syn -j ACCEPT

Note this won't protect you from someone on the same switch/hub, mac addresses are not hard to forge.

Source:
http://iptables-tutorial.frozentux.net/iptables-tutorial.html#MACMATCH
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows firewall change to allow all exe in a folder structure to be allowed 8 45
WEBSITE Capture via Linux Router 2 94
Firewall question 5 93
Hardening ScreenOS 8 109
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question