- Community Home
- >
- Networking
- >
- IMC
- >
- Re: blocking mac range for BYOD
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-04-2016 12:27 PM
08-04-2016 12:27 PM
blocking mac range for BYOD
Hi.
We are using a 850 AC controller with IMC, to have a byod platform.
since our network is fairly spread out, ive unfortunately gotten myself some.. unwanted users, and they seem to be using a virtual machine or something in that order to access a specific accesspoint.
Is there a way to block a certain range of MAC addresses in the UAM/ IMC? f.x 02:00:00:00:00:00-02:FF:FF:FF:FF:FF
ive tried to look at the available information in the UI about the client, and it seems to be a windows 10 machine.
The MAC changes regularly as the user tries to evade my blocks, so i assume he is either running in a vm, or has the ability to alter/spoof the mac of his equipment.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-04-2016 06:09 PM
08-04-2016 06:09 PM
Re: blocking mac range for BYOD
At first I looked at creating an Access scenario using the endpoint groups, but unlike IPs you can't specify a range of MACs, only individual ones. You could import a list, but all macs in a range is too many
However you might look at the mute terminal user Configuration profile under Access user - you can configure a range of MAC's there to automatically register and assign to a service - where it can then deny any access or dump them on a dead end vlan or something. It does have a deny filter option, so that might also be even simpler.
Depends on how the BYOD setup you've deployed might work with the mute terminal registration.