?
Solved

Blocing MAC Address on a Sonicwall.

Posted on 2009-05-11
4
Medium Priority
?
5,455 Views
Last Modified: 2012-05-06
Is there any way to block a MAC Address from accessing the internet on a Sonicwall T170?

Thanks!


Shawn
0
Comment
Question by:goneal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
ccomley earned 500 total points
ID: 24356393
Yes.

You don't say if you'r running Enhanced or Standard.

In "Enhanced"

- Networks
- Address Objects
- Create a new object, say "fred's laptop" or whatever, Type will be MAC and then put in the mac address.

Now in "Firewall"
- Access rules tab
- Lan-to-WAN section
- ADD new
- DENY radio button
- From Service - Any
- Source - select your new object "fred's laptop" or whatever
- Destination - select "All WAN IP"
- Users - select ALL
- Schedule = Always On

Save. Job Done.
0
 
LVL 1

Author Comment

by:goneal
ID: 24356435
Sorry about that.  Its Standard version software.
0
 
LVL 17

Expert Comment

by:ccomley
ID: 24362113
Well the principle's pretty much the same except you don't need to create the address object, and all the Access Rules are in a single long list. Sorry I don't have access to a Standard OS machine any more so I can't dive in and work out a click by click route for you.

0
 
LVL 1

Author Comment

by:goneal
ID: 24365711
I did try what you suggested in the Standard version and it won't let me add a MAC Address Object to the Access Rules...So I am stumped. :I
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Arrow Electronics was searching for a KVM  (Keyboard/Video/Mouse) switch that could display on one single monitor the current status of all units being tested on the rack.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses
Course of the Month11 days, 20 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question