Solved

Block traffic via a router using the MAC address or by IP?

Posted on 2006-11-27
4
365 Views
Last Modified: 2010-04-12
I have a server connected to the internet.
There is a router between the server and the Internet.
I need to let one computer into my internal network.
I'm not really interested in a VPN.

Should I allow that computer in by configuring the router to allow only one IP or should I configure it to allow one MAC adddress in?

I heard you can spoof a MAC address?

Can you also spoof an IP?

What should I do?
0
Comment
Question by:vanauden
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
jjoseph_x earned 250 total points
ID: 18029366
You can't block by the MAC address.  This is an over-simplification, but the internet doesn't work based on layer-2 addressing (the layer-2 address is only between routers).  So, the only MAC address that you'll see on your router is the MAC of its next-hop router (the router in front of it).

Which is just needlessly long-winded way of saying that you'll have to allow access via IP address.  If you have to access multiple computers/ips on your internet network, you'd be better-off using a VPN (it's pretty easy to setup a PPTP VPN using Windows 2000/2003 server).

0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 250 total points
ID: 18039798
I'd go with putting the control on the IP address making the call to your router. Depending on what you are allowing them access to will really make the decision of whether a VPN should be used or not. If it is just to administrate, then port-forwarding port 3389 (RDP) from the given source IP is a pretty secure way forward. The client would use the Remote Desktop MS client
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18040153
Thanks :)
0
 
LVL 1

Author Comment

by:vanauden
ID: 18040166
thank you very much guys.

this narrows my options and gives me a better undertstanding of them.

Thanks!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now