Solved

Networking: Cisco linksys EA6500: allowing wireless access by filtering MAC addresses in my network

Posted on 2014-12-08
3
263 Views
Last Modified: 2015-02-03
Hello Experts,

I configured my wireless router to only allow devices by MAC addresses. As a result, I see this warning:

"Wi-Fi Protected Setup cannot be used with WEP or WPA wireless security mode or MAC Filtering. To use Wi-Fi Protected Setup, change your wireless security mode and/or disable MAC filtering"

is this technique safe? or should I use WAP2?

also, when filtering MAC addresses to allow wireless access, I am unable to access my devices via the network. When I use WAP2, I am able to (hosts files and apache server confg ok). Any ideas why this is?

In advance, thank you for your help....
0
Comment
Question by:epifanio67
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
Rafael earned 500 total points
ID: 40488042
what devices are you trying to filter? You mentioned an apache server. Anything else such as cell phones, tablets, etc ?
0
 

Author Comment

by:epifanio67
ID: 40489439
Thanks Rafael,

Iphones, tables, and laptops...

My thoughts: by filtering MAC address the system is more secure....

it seems that it is.. but now I can not access my apache server wirelessly... (apache.conf ok)

Regards,
0
 

Author Closing Comment

by:epifanio67
ID: 40587614
Thanks for trying to help Rafael...
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question