Solved

Networking: Cisco linksys EA6500: allowing wireless access by filtering MAC addresses in my network

Posted on 2014-12-08
3
242 Views
Last Modified: 2015-02-03
Hello Experts,

I configured my wireless router to only allow devices by MAC addresses. As a result, I see this warning:

"Wi-Fi Protected Setup cannot be used with WEP or WPA wireless security mode or MAC Filtering. To use Wi-Fi Protected Setup, change your wireless security mode and/or disable MAC filtering"

is this technique safe? or should I use WAP2?

also, when filtering MAC addresses to allow wireless access, I am unable to access my devices via the network. When I use WAP2, I am able to (hosts files and apache server confg ok). Any ideas why this is?

In advance, thank you for your help....
0
Comment
Question by:epifanio67
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
Rafael earned 500 total points
Comment Utility
what devices are you trying to filter? You mentioned an apache server. Anything else such as cell phones, tablets, etc ?
0
 

Author Comment

by:epifanio67
Comment Utility
Thanks Rafael,

Iphones, tables, and laptops...

My thoughts: by filtering MAC address the system is more secure....

it seems that it is.. but now I can not access my apache server wirelessly... (apache.conf ok)

Regards,
0
 

Author Closing Comment

by:epifanio67
Comment Utility
Thanks for trying to help Rafael...
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now