Solved

Restrict Users to connect to network on MAc address

Posted on 2014-04-14
4
653 Views
Last Modified: 2014-04-15
I have windows 2003 std. server based environment. I have some specific users who connect to wireless & I would like to avoid this. How can I do this based on MAC address I see in the DHCP tool I have on my domain controller?
0
Comment
Question by:itbUD
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 15

Accepted Solution

by:
Perarduaadastra earned 200 total points
ID: 40000311
I don't think that you can do this with the DHCP applet, but you certainly can with the MAC filtering tool in the wireless access point configuration pages.

When MAC filtering (or access control) is enabled it will allow you to permit or deny a connection, based on the MAC address of the device requesting it being present in a list of permitted MAC addresses. No entry in the list, no connection!
0
 
LVL 15

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 150 total points
ID: 40000336
You could create a DHCP reservation which would provide trivial restrictions (e.g. custom default gateway, DNS servers, routes, etc.) or more appropriately, Network Access Protection with DHCP.

Combine with layer 2 device rules (switch stack, etc.)
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 150 total points
ID: 40000728
They bring in their own "rouge" wifi and then connect to that? You'll have to look at NAC technologies, perhaps packet fence, or if your DHCP can ban based on the first 3 octets of a mac-address then perhaps you can ban linksys, or the specific mac address of that device. Finding that mac depends on your switch, but they can all give you a list, you have to look up the mac's and figure out the maker, and then try to ban that.
-rich
0
 

Author Closing Comment

by:itbUD
ID: 40001391
Thanks
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question