HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Firewall
DrillDown Icon Configure HTTPS inspection using third-party Certificate
DrillDown Icon Exclude Users’ Data Accounting for Specific Traffic
DrillDown Icon Block Internet access for IPv6-based traffic
DrillDown Icon Import Trusted MAC Address from CSV File
DrillDown Icon Allow Remote Desktop Connection of Internal Network Resources over Internet
DrillDown Icon Allow Only Email Traffic While Blocking All Internet Access
DrillDown Icon Does Cyberoam protect the network against IP Spoofing?
DrillDown Icon Configure Location-aware Identity-based Access Control Policy
DrillDown Icon Configure Virtual Host with Load Balancing and Health Checking
DrillDown Icon Allow Access to Internal Server Behind Cyberoam Using Non-Standard Port
DrillDown Icon Create a Schedule Based Firewall Rule
DrillDown Icon How to create a Country-based Firewall Rule
DrillDown Icon Create Source NAT Policy in Cyberoam
DrillDown Icon Create DoS Bypass Rule
DrillDown Icon Configure Port Forwarding using Virtual Host to access devices on Internal network
DrillDown Icon Publish Internal Server over Internet
DrillDown Icon Block Internet Access Based on MAC Address
DrillDown Icon Configure Policy-based Routing
DrillDown Icon How can I protect my network’s internal resources from becoming zombies and being illegitimately used for Spamming?
DrillDown Icon How to find out the country to which an IP Address belongs?
DrillDown Icon How to NAT Cyberoam generated traffic?
DrillDown Icon Why client computers are not able to get DHCP lease IP after deployment of Cyberoam in bridge mode between DHCP Server and Clien
DrillDown Icon How can we enable Strict Authentication for unauthenticated users?
DrillDown Icon Do I need to manually create Reflexive Firewall Rules each time I want to publish an Internal Server over the Internet?
DrillDown Icon How to prevent TCP Split Handshake spoof attack?
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Tech Notes
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
 
Block Internet Access Based on MAC Address

Applicable to Version: 10.00 onwards
 
MAC address filtering is more secure than IP address filtering as MAC address is rarely changed.
 

In DHCP environment, IP address changes dynamically and hence MAC address is more reliable to identify source and destination of the network traffic.

In wireless environment, common security measure to prevent the unwanted network access is MAC address filtering. Here the router is configured to accept traffic from specific MAC addresses only and whitelisted devices are assigned new IP addresses through DHCP. This way they retain their ability to communicate with the Network. Any attempt to communicate by masquerading the IP address will be blocked as attacker’s computer’s MAC address will not match with the MAC address of the whitelisted devices.
 
The article provides the steps to block the Internet access based on MAC address.
 
The entire configuration is to be done from Web Admin console. Access Web Admin Console with user having “Administrator” profile.

Step 1: Add MAC Host

Go to Objects
à Host à MAC Host and click on “Add” button to add a new MAC Host.
 
 

Parameters

Value

Name

Scott

Type

MAC Address

MAC Address – Single MAC address

MAC Address

00-1D-09-DF-84-54

Specify MAC Address based on the Host Type selected in the form of 00:16:76:49:33:CE or 00-16-76-49-33-CE

 

Click OK and the MAC Host will be added successfully.

Note:

Alternately, Host can be added at the time of configuring Firewall Rule also.


Step 2: Create LAN to WAN zone Firewall Rule

Go to
Firewall à Rule and click on “Add” button to add a firewall rule for MAC Host – ‘Scott’ with the parameters as displayed in the below given screens.
 
 

Parameters

Value

Name

LAN_WAN_AnyTraffic

Zone

Source – LAN

Destination - WAN

Network/Host

Source – Scott

Destination - Any

Services

Any

Schedule

All the time

Action

Drop

 
 

Click OK and the Firewall Rule will be created successfully.
 

In the similar manner, access can be blocked for multiple MAC addresses also.

Above configuration will block the Internet access for user ‘Scott’ whose request is coming from the MAC address ‘00-1D-09-DF-84-54’.

Please note that MAC address of the original requestor is replaced with the MAC address of the firewall, router or layer 3 switch when the request is routed through them. So if the user is not directly connected through Cyberoam, Cyberoam will not receive the MAC address of the original requester. In such cases, use user-MAC binding to block the Internet access as specified in below related article "How do I enable User/MAC binding?"
 
                                                                                                                                                         Document Version: - 1.0-05/07/2011
 
Attachments
Related Articles

Article ID: 1985


How helpful was this information?
Poor Below Average Average Above Average Very High
Provide suggestions for article improvment. Please provide your email address if you wish to receive mail updates on your suggestion.
 Get a new challenge
Write the characters in the image above