Security Basics mailing list archives

Re: dhcp / mac address


From: Erik Mintz <erik () courttavern net>
Date: Thu, 16 Oct 2003 13:40:10 -0400

Everything is there on you server. 10 minutes of work per segment I would estimate. Just listen to the traffic on the segment with all hosts online during a broadcast ping and feed it into a file. From that you can sort the data and feed it into your allowable hosts list.

Erik Mintz

Joey Peloquin wrote:

If the hosts are already deployed, why not write a script to
automagically collect the ethernet addresses for you?  Actually, you can
probably find one on the Internet that will work with a little
site-specific tweaking.

Joey Peloquin

-----Original Message-----
From: Meidinger Chris [mailto:chris.meidinger () badenit de] Sent: Tuesday, October 14, 2003 1:17 PM
To: 'Johnny Tam'
Cc: Security-Basics@Securityfocus. Com (E-Mail)
Subject: RE: dhcp / mac address


It would be nice in theory to restrict mac addresses to the ones in your
network - if you have more than 20-30 hosts, the administration efforts
will be herculean. For this reason most people let anyone get an IP
address.
Chris Meidinger

-----Original Message-----
From: Johnny Tam [mailto:mypunsotang () yahoo com]
Sent: Friday, October 10, 2003 5:23 PM
To: security-basics () securityfocus com
Subject: dhcp / mac address


Do most of you restrict your DHCP server to only MAC
addresses that are on your LAN PCs, or is it any one
who connects to your network?

__________________________________
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com

------------------------------------------------------------------------
---
------------------------------------------------------------------------
----

------------------------------------------------------------------------
---
------------------------------------------------------------------------
----

------------------------------------------------------------------------

The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material.  If the reader of this message is not the intended recipient,
you are hereby notified that your access is unauthorized, and any review,
dissemination, distribution or copying of this message including any
attachments is strictly prohibited.   If you are not the intended
recipient, please contact the sender and delete the material from any
computer.

------------------------------------------------------------------------

---------------------------------------------------------------------------
----------------------------------------------------------------------------




---------------------------------------------------------------------------
FREE Whitepaper: Better Management for Network Security

Looking for a better way to manage your IP security?
Learn how Solsoft can help you:
- Ensure robust IP security through policy-based management
- Make firewall, VPN, and NAT rules interoperable across heterogeneous
networks
- Quickly respond to network events from a central console

Download our FREE whitepaper at:
http://www.securityfocus.com/sponsor/Solsoft_security-basics_031015
----------------------------------------------------------------------------


Current thread: