Solved

Block traffic via a router using the MAC address or by IP?

Posted on 2006-11-27
4
368 Views
Last Modified: 2010-04-12
I have a server connected to the internet.
There is a router between the server and the Internet.
I need to let one computer into my internal network.
I'm not really interested in a VPN.

Should I allow that computer in by configuring the router to allow only one IP or should I configure it to allow one MAC adddress in?

I heard you can spoof a MAC address?

Can you also spoof an IP?

What should I do?
0
Comment
Question by:vanauden
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
jjoseph_x earned 250 total points
ID: 18029366
You can't block by the MAC address.  This is an over-simplification, but the internet doesn't work based on layer-2 addressing (the layer-2 address is only between routers).  So, the only MAC address that you'll see on your router is the MAC of its next-hop router (the router in front of it).

Which is just needlessly long-winded way of saying that you'll have to allow access via IP address.  If you have to access multiple computers/ips on your internet network, you'd be better-off using a VPN (it's pretty easy to setup a PPTP VPN using Windows 2000/2003 server).

0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 250 total points
ID: 18039798
I'd go with putting the control on the IP address making the call to your router. Depending on what you are allowing them access to will really make the decision of whether a VPN should be used or not. If it is just to administrate, then port-forwarding port 3389 (RDP) from the given source IP is a pretty secure way forward. The client would use the Remote Desktop MS client
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18040153
Thanks :)
0
 
LVL 1

Author Comment

by:vanauden
ID: 18040166
thank you very much guys.

this narrows my options and gives me a better undertstanding of them.

Thanks!
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Open BDS Pf 3 48
Sonicwall Email los and Alerts 1 59
Allowing a local account for incoming Rdp but not outgoing Rdp 15 109
Firewall blocking images 4 36
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now