Solved

Prevent NDAS Traffic on WLAN

Posted on 2010-11-29
4
477 Views
Last Modified: 2012-05-10
Hi,

in my network, I have some NDAS devices. Most of them are used as Time Machine Backup drives for Mac Books. There is no problem if some users use it with wired network, my problem is the WLAN Access. I have a build in firewall in my WLAN Access Points, but what protocol do i have to block, to prevent NDAS WLAN Traffic?
0
Comment
Question by:LL0rd
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 12

Expert Comment

by:enachemc
ID: 34234995
you cannot block the protocol as other machines may use them
just block their IPs
or better yet: allow only the known IPs access to the WIFI Router
0
 
LVL 1

Author Comment

by:LL0rd
ID: 34235041
NDAS Devices does not have IP addresses...
0
 
LVL 4

Accepted Solution

by:
bjove earned 500 total points
ID: 34235394
NDAS does not use IP protocol. It uses ethernet frames. So only way to block traffic is by blocking access to MAC addresses of NDIS devices  (if it is possible on your firewall).
0
 
LVL 12

Expert Comment

by:enachemc
ID: 34236623
WiFi routers can allow only MAC addresses entered by you
if an equipment does not have a MAC address, it cannot communicate on Ethernet (WiFi or Wired)
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question