Improve company productivity with a Business Account.Sign Up

x
?
Solved

Sonicwall MAC Filtering

Posted on 2012-04-09
7
Medium Priority
?
1,748 Views
Last Modified: 2012-04-09
I want to start MAC filtering at the company I work at with our Sonicwall. But everything I read says that MAC filtering is only done for wireless networks on the Sonicwall. I want to enforce it on our wired network. Does Sonicwall do that?
0
Comment
Question by:new_to_networks
  • 3
  • 3
7 Comments
 
LVL 15

Accepted Solution

by:
Robert Sutton Jr earned 750 total points
ID: 37824596
Is there a reason why you would want to filter by MAC? Yes, wireless is the primary use for this type of filtering and is typically not intended for "Physically" connected devices on your network.
0
 

Author Comment

by:new_to_networks
ID: 37824607
Its to prevent people with unsecure laptops from coming in, plugging into a port and having access to our office network. We want to force them to use our guest wireless. Does that make sense?
0
 
LVL 13

Expert Comment

by:IT-Monkey-Dave
ID: 37824612
You might want to do that to discourage users from accessing resources by plugging in "rogue" devices without permission.
0
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

 

Author Comment

by:new_to_networks
ID: 37824621
There's a lot of traffic here, so I'm trying to deny unauthorized machines from plugging in to a port.
0
 
LVL 13

Expert Comment

by:IT-Monkey-Dave
ID: 37824630
Is it an Active Directory domain?  You could probably do that via Group Policy.  Computer not a member of domain = No access.
0
 

Author Comment

by:new_to_networks
ID: 37824680
The office is connected to a VPN which goes to our datacenter with our servers/domains etc. If you're away from the office you have to log in to the VPN. If you're in the office, you just plug in and you're already connected. You don't have a user name and password to connect to the servers or anything, but you're on the office network. I'm probably not explaining very well.
0
 
LVL 13

Assisted Solution

by:IT-Monkey-Dave
IT-Monkey-Dave earned 750 total points
ID: 37824933
You could control access by having your DHCP server use "reservations" to issue specific IP addresses to specific MAC addresses.  If someone plugs in a device with a MAC address that doesn't have a reservation, they won't be able to obtain an IP address via DHCP.

Of course a savvy user could assign their system a static IP and bypass DHCP entirely.  Or if everyone already has a static IP, DHCP reservations do you no good.

Sorry but I have to ask: Why no user authentication?
0

Featured Post

NEW Internet Security Report Now Available!

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out this quarters report on the threats that shook the industry in Q4 2017.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
In short, I will be giving a guide on how to install UNMS on a virtual machine in hyper-v and change the default port for security (you don’t need to have a server, since Windows 10 supports hyper-v)
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question