darkane's Profile
Reputation: 0
Neutral
- Group:
- Members
- Active Posts:
- 3 (0 per day)
- Most Active In:
- High Speed ADSL (3 posts)
- Joined:
- 13-June 07
- Profile Views:
- 1,523
- Last Active:
- Aug 31 2007 04:25 PM
- Currently:
- Offline
Latest Visitors
-
ninja_billy
20 Jun 2007 - 13:52
Posts I've Made
-
In Topic: proper Bridging to facilitate MAC filtering Paradyne 6218
Posted 4 Jul 2007
you are the best .. guys with all this response
i was out of town sorry for not replying soon
now i will answer your questions
Quote
I think he was reffering to using the default 255.255.255.0 subnet mask, but different IP ranges (ie 192.168.1.* & 192.168.2.*). But yeah, I'm still trying to figure out what the point of subnets really is
i was referring to that exactly and the point is the malicious user will get into the internal LAN behind the speedtouch but will not be able to get on the internet since there is still the Paradyne router , he can't intercept that how can he intercept something outside the internal network
something that is between the speedtouch and the paradyne , Srnoth what you said in the first was exactly what i thought about why do you all now think it is wrong do i a have a misconception?
Quote
the last part is very interesting, how are u sharing the internet through wire or wireless
well it is wired i have 4 or 5 unmanaged switches up linked to the router covering few building and wireless feature is actually disabled I don't need it for many reasons the best of them is that my neighbours don't have wireless cards
Quote
if he already knows how to spoof IPs, that means he will most probably know how to spoof MAC addresses too, so even if you ban his current MAC address, he'll just change it and do the same thing all over again
although i was warned about this point by many articles and it is very logic i was surprised that along my very long hunt of this guy he simply never ever did change his MAC we did take 5 -6
hours plugging / unplugging cables on different switches on roofs of building while i was at the pc watching the users getting off and on it was so cool btw like a suspense movie , the usual suspects teens were clear one by one one and we were pulling our hair till the bad guy turned out to be a big man supposed to be respectable
my friend the administrator cut off the link and all was good for weeks when it all started again
and Part II was even uglier than part one because the idea I read about virtual MAcs used by switches made feel frustrated this is beyond me we are talking about layer 2 termonology
and btw i dont make money from this the administrator who owns the network makes money from it i am just a user but since I'm an addict to the internet and i know better than the admin I do it as volunteer i just want the connection to work for all of us
I think that the malicious user have managed to get hooked through another neighbor or perhaps moved on and somehow fooled the admin so he got back on track in an inconvenient way even to him since he is not doing it in the light so he gave up like we did 2 weeks ago
my friend tells me that everything was working perfect when i was out and i m here it looks very stable that was the news but I was wondering can anyone comment on the tutorial on searchnetworking.com
http://searchnetwork... m/tip...1069224,00.html
regarding our SOHO networks?? i appreciate it -
In Topic: proper Bridging to facilitate MAC filtering Paradyne 6218
Posted 20 Jun 2007
Quote
which you wish to use to control access to your internet connection. Is this correct?
yes it is correct
Quote
Then using a network cable connect the WAN/Internet port on the new router to a LAN port on the old router.
this is what confuses me because WAN port suits phone jack while LAN port needs RJ45 jack how can this work? it either needs a weirdly suitable cable or my routers don't have the ports needed to perform this setup , I understand the second part about IP hopefully I will use it if i get to connect the ports right
Quote
One question though, what environment are you using this setup in? Is it a large network like in a school or something? And are you trying to prevent unauthorized users from getting access to the internet by plugging in to the network? Just wondering, cus I've never heard of this situation before.
actually it is a neighborhood network LOL I got like 20 neighbor connected and the real problem can be described as losing connection at most PCs while the router is working fine after investigating the router and network i noticed a certain MAC address spoofing IPs like what happend in ARP poisoning which is probably the case he steals people's IPs and take the whole network for himself it got pretty hard to determine who he is or maybe it is even a switch problem i read once on "searchnetworking.com" that sometimes switches may use virtual MAC addresses for certain purposes whatever it is I know the MAC that gives me problems I ban it I save myself the headache i am having everyday
thanks for your response Stephen , how do you find my paragraphs this time btw ?
My Information
- Member Title:
- Newbie
- Age:
- Age Unknown
- Birthday:
- Birthday Unknown
Contact Information
- E-mail:
- Private
Friends
darkane hasn't added any friends yet.
Comments
darkane has no profile comments yet. Why not say hello?