Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Do you use dhcp reservations?

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    62 Posts 26 Posters 17.4k Views 20 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ Offline
      JonathanLee @ahking19
      last edited by

      @ahking19 shared devices sometimes I want to watch a streaming movie at night is all

      Make sure to upvote

      1 Reply Last reply Reply Quote 0
      • Sergei_ShablovskyS Offline
        Sergei_Shablovsky @johnpoz
        last edited by Sergei_Shablovsky

        @johnpoz said in Do you use dhcp reservations?:

        @JonathanLee said in Do you use dhcp reservations?:

        I do not want any mac address cloning going on.

        Who is going to clone your macs?

        Hackers. Black hackers.
        Or cyber warriors from China, Iran, russia. (They are in 120-180ms distance from Your data ;)

        And for what purpose?

        Steal money. Or steal some info about Your clients to steal MUCH MORE money from them.
        2.
        Make damage for Your country.

        Mac cloning is only a thing if they are already on your network..

        Because around 80% of devices at home, work and office are connected by WiFi, airsnort, fake DHCP server for MITM doing work well.

        I would love to hear your theory how anyone could use that to do anything? That doesn't already have full access to my network anyway..

        Hm. Are You serious? I do not believe that You say that…

        BTW, I prefer to using “IP reservation “ feature ONLY as some sort of helpful feature in administration and of pf rules work.
        And THIS IS NOT AS A SECURITY BARRIER any way!

        When planning infrastructure each one need to keep in mind that MAC/IP - NOT MAKE DEVICE TRUSTED, this is just ID.
        And like Your passport w/o photo or biometric chip,- may be stealing by someone.

        One of the basic rules nowadays must be: EACH DEVICE MUST HAVE OWN SERTS. NO SERTS,- NO ANY RIGHTS, NO ACCESS ANYWHERE !

        Am I wrong?

        —
        CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
        Help Ukraine to resist, save civilians people’s lives !
        (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

        1 Reply Last reply Reply Quote 0
        • GertjanG Gertjan referenced this topic on
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.