Solved

Networking: Cisco linksys EA6500: allowing wireless access by filtering MAC addresses in my network

Posted on 2014-12-08
3
253 Views
Last Modified: 2015-02-03
Hello Experts,

I configured my wireless router to only allow devices by MAC addresses. As a result, I see this warning:

"Wi-Fi Protected Setup cannot be used with WEP or WPA wireless security mode or MAC Filtering. To use Wi-Fi Protected Setup, change your wireless security mode and/or disable MAC filtering"

is this technique safe? or should I use WAP2?

also, when filtering MAC addresses to allow wireless access, I am unable to access my devices via the network. When I use WAP2, I am able to (hosts files and apache server confg ok). Any ideas why this is?

In advance, thank you for your help....
0
Comment
Question by:epifanio67
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
Rafael earned 500 total points
ID: 40488042
what devices are you trying to filter? You mentioned an apache server. Anything else such as cell phones, tablets, etc ?
0
 

Author Comment

by:epifanio67
ID: 40489439
Thanks Rafael,

Iphones, tables, and laptops...

My thoughts: by filtering MAC address the system is more secure....

it seems that it is.. but now I can not access my apache server wirelessly... (apache.conf ok)

Regards,
0
 

Author Closing Comment

by:epifanio67
ID: 40587614
Thanks for trying to help Rafael...
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Suggestions for how and where to maintain and protect client passwords... 31 91
Reseller Hosting 2 85
paypal ipn status 4 38
VPN Connection WIndows 10 5 32
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now