This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
device_filtering [2024/10/31 20:40] – [Block devices via script/Scheduler] -Condense hogwild | device_filtering [2025/03/03 18:09] (current) – [Notes] -condense hogwild | ||
---|---|---|---|
Line 5: | Line 5: | ||
\\ | \\ | ||
- | * For a bridged environment (Media | + | * For a bridged environment (Media |
- | * For a routed environment (single router), you'll use // | + | |
\\ | \\ | ||
- | Given a MAC address you wish to control, | + | * For a routed environment (single router), you must use // |
+ | |||
+ | \\ | ||
+ | |||
+ | Given a MAC address you wish to control, | ||
Line 42: | Line 45: | ||
\\ | \\ | ||
- | # Flush\\ | + | # Flush\\ |
\\ | \\ | ||
Line 48: | Line 51: | ||
\\ | \\ | ||
- | Nowadays, blocking MAC addresses | + | These days, many devices use MAC randomization which can make blocking MAC addresses tedious. MAC addresses can " |
- | For managing | + | To help manage |
\\ | \\ | ||
Line 63: | Line 66: | ||
\\ | \\ | ||
+ | |||
===== Notes ===== | ===== Notes ===== | ||
- | Still, the kernel resolves the hostname to an IP address. A device with randomized MAC address will obtain a new IP address when reconnecting. This might function well, but only until the user restarts the device or just manually disconnects WiFi. | + | The kernel |
- | If you' | + | If you're security conscious, you could trigger a " |
For WiFi devices, perhaps the best way to limit access is to make them connect to a dedicated SSID, and enable/ | For WiFi devices, perhaps the best way to limit access is to make them connect to a dedicated SSID, and enable/ |