Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block Unknown clients when connecting to our network

    Scheduled Pinned Locked Moved Firewalling
    8 Posts 4 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mknav
      last edited by

      How can I block unknown clients when they are connecting to our network

      Already I setup DHCP Mac based filtering and firewall rules .but my problem is if a person knows our IP range then he can manually enter the range in his system and he can connect to our network easily.I just want to block all the unknown devices when they are connecting to our network through manually configured ip…only the mac adress listed pc can enter in our network.already made mac binding in dhcp and allow some people to connect internet through the firewall rule.but if some one knows the ip range allowed for internet..then he can manually enter the ip in his pc and connect the cable he can brows internet and even connect in our network too

      1 Reply Last reply Reply Quote 0
      • H
        Harvy66
        last edited by

        You can't have an unknown device without first defining what a "known" device is.

        I'm only a ware of 3 options

        1. Physically secure your network and don't let "unknown" device on
        2. Get a switch that supports authentication. Very expensive. Effectively places a port in a "guest" vlan until the client authenticates, then switches the vlan to whatever your "internal" vlan is.
        3. Use VPN. Force all clients to connect to pfSense via VPN tunnels, even if on the LAN

        In general, if you can't trust the LAN, you've lost the war. No point in a firewall at that point.

        1 Reply Last reply Reply Quote 0
        • M
          moikerz
          last edited by

          This is the purpose of NAP. Built into Windows 2008R2 and up, as well as offered by PacketFence and some others for free. Both solutions utilize RADIUS and VLANs. Initial requests are put into an isolated VLAN for assessment. If they pass the assessment they can be re-VLAN'd dynamically to a corporate VLAN, or onto a guest/DMZ VLAN for remediation or guest processing. Could be as cheap as $0 plus your electricity ;)

          1 Reply Last reply Reply Quote 0
          • H
            Harvy66
            last edited by

            It's been about 15 years, but I think NAP requires 802.1X. I only worked with this in a 100 level Networking class many years ago and most enterprises are not smart enough to use this technology from 2001.

            Strangely recent
            https://it.slashdot.org/story/18/01/27/016207/is-it-time-for-zero-trust-corporate-networks

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              What is the problem environment?

              Why can you not control who connects and where?

              Open Wi-Fi or cross-connected, open wired jacks all over the place?

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • M
                mknav
                last edited by

                my co building having 4  lounges in 2 bulding .bulding 2 is connected with ubnt wirless bridge  …every where we have physical network points and wifi too...I did DHCP Static Mappings for the clients..so only the mac maping client will get the ip automatically…but my problem is those who knows our ip range if he put manually on his device then it is working ..

                after that I chose this option

                ARP Table Static Entry
                Create an ARP Table Static Entry for this MAC & IP Address pair.

                then it is working good and  unknown client can't get connect in our network even if they put our ip address manually or by the dhcp

                but here my problem is in bulting no2 even the maped dhcp client also not working

                1 Reply Last reply Reply Quote 0
                • H
                  Harvy66
                  last edited by

                  It's not difficult to spoof a MAC address and it's not difficult to find which MAC address to use.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    The solution is to put all the ports you don't want active on a blank VLAN with no access to anything except maybe anyone else who connected to a port they should not be connected to.

                    That, or 802.1x, as has been stated.

                    You are not going to solve your layer 2 problem with a layer 3 device. Has to be done in the switches/wifi.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.