Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Networking: Cisco linksys EA6500: allowing wireless access by filtering MAC addresses in my network

Posted on 2014-12-08
3
Medium Priority
?
269 Views
Last Modified: 2015-02-03
Hello Experts,

I configured my wireless router to only allow devices by MAC addresses. As a result, I see this warning:

"Wi-Fi Protected Setup cannot be used with WEP or WPA wireless security mode or MAC Filtering. To use Wi-Fi Protected Setup, change your wireless security mode and/or disable MAC filtering"

is this technique safe? or should I use WAP2?

also, when filtering MAC addresses to allow wireless access, I am unable to access my devices via the network. When I use WAP2, I am able to (hosts files and apache server confg ok). Any ideas why this is?

In advance, thank you for your help....
0
Comment
Question by:epifanio67
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
Rafael earned 1000 total points
ID: 40488042
what devices are you trying to filter? You mentioned an apache server. Anything else such as cell phones, tablets, etc ?
0
 

Author Comment

by:epifanio67
ID: 40489439
Thanks Rafael,

Iphones, tables, and laptops...

My thoughts: by filtering MAC address the system is more secure....

it seems that it is.. but now I can not access my apache server wirelessly... (apache.conf ok)

Regards,
0
 

Author Closing Comment

by:epifanio67
ID: 40587614
Thanks for trying to help Rafael...
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Make the most of your online learning experience.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question