Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    "Spoof" MAC VLAN not Parent

    Scheduled Pinned Locked Moved General pfSense Questions
    4 Posts 2 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      NOYB
      last edited by

      Is it possible to "spoof" a VLAN interface MAC without the parent and/or other VLAN's of parent being "spoofed" also?

      1 Reply Last reply Reply Quote 0
      • W
        wallabybob
        last edited by

        I suggest you try it. I suspect it might be driver dependent. In some cases it might be necessary to set the VLAN parent interface into promiscuous mode.

        1 Reply Last reply Reply Quote 0
        • N
          NOYB
          last edited by

          I did try it.  And it changed MAC for both physical (parent) and the VLAN.  That's reason for the question.

          Was expecting that spoofing the MAC on the VLAN interface would enable promiscuous mode and only use the spoofed MAC for the VLAN.  NIC is Broadcom 440x 10/100 (bfe0).

          1 Reply Last reply Reply Quote 0
          • W
            wallabybob
            last edited by

            @NOYB:

            I did try it.  And it changed MAC for both physical (parent) and the VLAN.  That's reason for the question.

            Can you try on a different type of NIC?

            @NOYB:

            Was expecting that spoofing the MAC on the VLAN interface would enable promiscuous mode and only use the spoofed MAC for the VLAN.  NIC is Broadcom 440x 10/100 (bfe0).

            Some NICs don't need to enable promiscuous mode to see frames directed to a "non-standard" MAC address. I think (but its a long time since a looked at this) one way that was done was for the NIC to have a number of programmable MAC address hash registers and a receive frame was accepted if the hash of the destination MAC address matched a value in one of the MAC address hash registers. It was then up to software to determine if there was an exact match between destination MAC address in the frame and "acceptable" MAC addresses.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.