Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Why am I seeing Softbank in my DHCP list

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 3 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • AndyRHA
      AndyRH
      last edited by

      It is most likely an Intel NIC. Your call, but my paranoia says block all unknown devices.

      o||||o
      7100-1u

      johnpozJ R 2 Replies Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @AndyRH
        last edited by johnpoz

        18:56:80 is intel device..

        As to what it actually is? You would only know.. As to how it got a lease from your dhcp - well because it was on your network.

        Why are you hiding its IP - if its on your internal network, would have to assume its IP is rfc1918?

        As to blocking stuff on your local network from getting dhcp from your dhcp server? Why would you be putting it on your network if you do not want to be on your network?

        As to the hostname with bbtec.net - are you using that domain locally. While its a public domain. That could what it registered as its hostname, or it could be what was resolved from the IP.. Again have to assume that IP is rfc1918? Are you running public IP space on your internal network?

        I show that name resolving to

        ;; QUESTION SECTION:
        ;softbank219168200058.bbtec.net.        IN      A
        
        ;; ANSWER SECTION:
        softbank219168200058.bbtec.net. 86400 IN A      219.168.200.58
        

        Are you running a 219.x.x.x address space on your internal network?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • R
          RJP1267 @AndyRH
          last edited by

          @andyrh Yes I did a search on the MAC and it is an Intel card but not any I can verify as belonging to any of my devices. Since I am still getting up to speed can you point me in the right direction on how to block access to the LAN from unknown dvices? Thank you.

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @RJP1267
            last edited by

            ;; QUESTION SECTION:                                                           
            ;58.200.168.219.in-addr.arpa.   IN      PTR                                    
                                                                                           
            ;; ANSWER SECTION:                                                             
            58.200.168.219.in-addr.arpa. 86400 IN   PTR     softbank219168200058.bbtec.net.
            

            If you are running that IP space internally - then yeah that IP would and could resolve to that name.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • AndyRHA
              AndyRH
              last edited by

              I would block that system at the LAN port with a FW rule to prevent it from going out. Then if you have a managed switch you should be able to locate the MAC and the port should lead you to the device.
              If you are in a business environment be careful and do not cause an outage that you cannot explain and justify.
              Preventing unknown devices from getting DHCP addresses is a completely different problem.

              In my home environment the blocking generally brings a kid to me saying the internet is down... No real work on my part. :)

              o||||o
              7100-1u

              R 1 Reply Last reply Reply Quote 0
              • R
                RJP1267
                last edited by

                @johnpoz Aaaah I can now see, it appears a tad of dyslexia has caused an issue. 219 is a public ip range which is why its visible doing a DNS search, will have to make a change. So if it were the 192 or other private range this issue would not be an issue? Thanks for highlighting that for me, I have made the changes. Still curious what that softbank device was, maybe a scanner of sorts, no info can be found on the web using that name. Now I need to find a way to limit only devices belonging to this network to connect, on my old wifi router I was using WRT and I was able to static assign and lock everything else out, if there a package for pfSense that gives me that granular control? I know someone said using the managed switch which is an option but if can do it centrally from PFS it makes it easier. Thanks for your help and input.

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @RJP1267
                  last edited by johnpoz

                  huh? So your local network was 219.168.200 vs 192.168.200..

                  Because of a typo?

                  So again no device from outside was on your network.. But if some devices had that 219 address because you were handing out that space, then it would and could resolve to that name.. Doesn't mean that was its actual name..

                  You need to watch your network for that mac address to find out what the actual device was.

                  If you want to use static arp - you can do that with pfsense.. But then every signal device that is on your network will have to be setup with reservation..

                  https://docs.netgate.com/pfsense/en/latest/services/dhcp/ipv4.html

                  static.png

                  Or you could use the deny unknown

                  deny.png

                  Do you have a scenario where billy could just bring in his device and plug it into some jack - and that is what your looking to stop. Or are you wanting to stop billy from bringing in his own phone and connecting it to your wifi, since he already knows the psk vs using only his work laptop or phone to get on the wifi?

                  A better option to keeping unwanted devices off your network would prob be to setup 802.1x for both your wired and wireless connections..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • R
                    RJP1267 @AndyRH
                    last edited by

                    @andyrh Yes this is for my home and kid control is my main reason for ditching my wifi router and moving up to pfSense a managed PoE switch and an AP. Definitley interested in the details to establish rules to further nail down the environment. I know its an incremental process and appreciate the feedback from other users who know the ins and outs.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @RJP1267
                      last edited by

                      So at a loss to what could connect to your "home" network that you would want to prevent? Do you have strangers coming into your house and plugging stuff in?

                      Do you have your wifi psk on sign outside your house?

                      If what your wanting is to keep your kids phone off the wifi after 10pm say when they are suppose to be in bed, that is a different matter than static arp or deny unknown mac, etc..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      R 1 Reply Last reply Reply Quote 0
                      • R
                        RJP1267 @johnpoz
                        last edited by

                        @johnpoz You never know who is lurking outside or scanning. WiFi passphrases can be cracked, certs can be duplicated, macs spoofed and with everything else going on I think an ounce of prevention is a good thing, besides I hate it when they watch youtube and stupid/silly content, would rather block it all so they decide to go out and play.

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @RJP1267
                          last edited by

                          @rjp1267 said in Why am I seeing Softbank in my DHCP list:

                          outside or scanning. WiFi passphrases can be cracked,

                          And you think spoofing a mac can not :) hehehe

                          Can tell you one thing breaking my psk going to be the harder part then some mac address spoof ;)

                          Blocking youtube is a bit different than static arp ;)

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.