Solved

Prevent NDAS Traffic on WLAN

Posted on 2010-11-29
4
467 Views
Last Modified: 2012-05-10
Hi,

in my network, I have some NDAS devices. Most of them are used as Time Machine Backup drives for Mac Books. There is no problem if some users use it with wired network, my problem is the WLAN Access. I have a build in firewall in my WLAN Access Points, but what protocol do i have to block, to prevent NDAS WLAN Traffic?
0
Comment
Question by:LL0rd
  • 2
4 Comments
 
LVL 12

Expert Comment

by:enachemc
ID: 34234995
you cannot block the protocol as other machines may use them
just block their IPs
or better yet: allow only the known IPs access to the WIFI Router
0
 
LVL 1

Author Comment

by:LL0rd
ID: 34235041
NDAS Devices does not have IP addresses...
0
 
LVL 4

Accepted Solution

by:
bjove earned 500 total points
ID: 34235394
NDAS does not use IP protocol. It uses ethernet frames. So only way to block traffic is by blocking access to MAC addresses of NDIS devices  (if it is possible on your firewall).
0
 
LVL 12

Expert Comment

by:enachemc
ID: 34236623
WiFi routers can allow only MAC addresses entered by you
if an equipment does not have a MAC address, it cannot communicate on Ethernet (WiFi or Wired)
0

Featured Post

Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
not output on the show arp command 5 45
Can't access DMZ from internal network 7 44
MOVING OFFICE / SERVER 22 74
Printer Settings 3 64
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now