Filtering by MAC adress..


Recommended Posts

Hy. I wish to print using the wireless connection to my printer (canon) but filtering connection by mac adress simply blocks this demand. Any way to find out the printer mac.adress & add it to permission?

Cheers.

post-18459-0-91050400-1319567648.png

Link to comment
Share on other sites

/offtopic

This is why MAC address filtering is not considered a "security" method. It only limits you from accessing your own network. Hackers can get by it just fine"

/offtopic

The MAC address for any device should be on the device itself. There's a sticker there or should be. If not then you can easliy just disable MAC address filtering and then connect the printer, after that just check the DHCP and see it's MAC, copy it then turn it back on and put in the copied info.

Link to comment
Share on other sites

agreed -- mac filtering is completely pointless as a security method. If you wanting to use it to "control" say when your kids machines can use the network with a schedule or something that is fine. But as a security measure its just causing you grief.

I would suggest how you fix your issue is disable it -- it has no security value at all!!

What printer? As stated the mac should be on there somewhere. But yeah the disable and let it get a IP from your dhcp server is very simple way to find it.

Link to comment
Share on other sites

greed -- mac filtering is completely pointless as a security method

Simply filters 'intruders' by a physical adress; how can an invalid MAC connect bypassing these rules?

I would suggest how you fix your issue is disable it -- it has no security value at all!!

Did that :|

What printer? As stated the mac should be on there somewhere. But yeah the disable and let it get a IP from your dhcp server is very simple way to find it.

Canon Mp495.

Link to comment
Share on other sites

Simply filters 'intruders' by a physical adress; how can an invalid MAC connect bypassing these rules?

If someone wants to get in they'll just scan the packets passing by and then clone that MAC adress (aka fake it on their PC). Not hard at all.

Link to comment
Share on other sites

If someone wants to get in they'll just scan the packets passing by and then clone that MAC adress (aka fake it on their PC). Not hard at all.

This. MAC Spoofing is a no-brainer, and would be the first thing any clueless hacker would do anyway.

A good password on a WPA2-secured network is about the only thing you need to protect your network.

Link to comment
Share on other sites

Ok -- not going to go into the actual details.. Might be against rules to actually show you the actual steps. And any 8 year old can google for the instructions

But here -- see the MACs of the clients

post-14624-0-42202000-1319721253.jpg

Simple command to change your mac -- this would take all of 3.2 seconds for even the most clueless script kiddie following a guide to do. Found that above image from a simple how to ;) The tools out there will show you what station a client is connected to, etc. So you know what mac to use to access a specific AP.

Mac filtering is a method of control - its not a valid security feature. Since it takes 2 seconds to see the mac, and then spoof the mac.

To secure your wireless network use WPA2 and a SECURE PSK!! Mac filtering really is just going to make it harder for you to join your own wireless network. If that is what you want, then ok -- but its not a valid security method to be honest.

  • Like 1
Link to comment
Share on other sites

  • 3 weeks later...
This topic is now closed to further replies.