F5F Stay Refreshed Power Users Networks Identify the adjustment you wish to make.

Identify the adjustment you wish to make.

Identify the adjustment you wish to make.

Pages (2): 1 2 Next
N
NoobGirlPT
Member
64
11-17-2016, 03:29 AM
#1
I bought a new router and need assistance configuring a Mac filter. I want to include all my devices on the white list, but some settings are unclear. I've attached a screenshot for reference. Thanks!
N
NoobGirlPT
11-17-2016, 03:29 AM #1

I bought a new router and need assistance configuring a Mac filter. I want to include all my devices on the white list, but some settings are unclear. I've attached a screenshot for reference. Thanks!

B
Bartekdwarf
Posting Freak
791
11-18-2016, 11:32 AM
#2
Are you sure you want a whitelist? Right now it’s set up for a blacklist, so you don’t need to add your devices there.
B
Bartekdwarf
11-18-2016, 11:32 AM #2

Are you sure you want a whitelist? Right now it’s set up for a blacklist, so you don’t need to add your devices there.

G
garrettguy02
Member
163
11-18-2016, 12:09 PM
#3
The filter seems to be a hassle, and it doesn't work against any kind of attacker.
G
garrettguy02
11-18-2016, 12:09 PM #3

The filter seems to be a hassle, and it doesn't work against any kind of attacker.

W
Wixxgriffel
Member
191
11-18-2016, 08:59 PM
#4
Follow the steps to add your approved items to the whitelist.
W
Wixxgriffel
11-18-2016, 08:59 PM #4

Follow the steps to add your approved items to the whitelist.

B
bspickler12345
Junior Member
29
11-19-2016, 03:56 AM
#5
What do you recommend?
B
bspickler12345
11-19-2016, 03:56 AM #5

What do you recommend?

E
Expandablexx
Junior Member
47
11-25-2016, 04:22 AM
#6
You should reassess the main issue at hand. What goal are you trying to achieve? Are you focusing on enhanced protection or simple configuration? It seems this question is too limited in its focus.
E
Expandablexx
11-25-2016, 04:22 AM #6

You should reassess the main issue at hand. What goal are you trying to achieve? Are you focusing on enhanced protection or simple configuration? It seems this question is too limited in its focus.

G
Globolosos
Junior Member
5
11-26-2016, 02:27 AM
#7
Adjusted the initial settings to block by default. Permissions will now be granted solely through the MAC address you specify for "Allow" access.
G
Globolosos
11-26-2016, 02:27 AM #7

Adjusted the initial settings to block by default. Permissions will now be granted solely through the MAC address you specify for "Allow" access.

H
hotcone33
Member
204
11-26-2016, 02:50 AM
#8
Source and destination MAC addresses identify network devices. Direction settings control traffic flow, while allow options adjust filtering rules.
H
hotcone33
11-26-2016, 02:50 AM #8

Source and destination MAC addresses identify network devices. Direction settings control traffic flow, while allow options adjust filtering rules.

G
GoPatriots1
Member
221
11-26-2016, 07:00 AM
#9
Enhanced protection. Only devices on the white list should be able to link with your router.
G
GoPatriots1
11-26-2016, 07:00 AM #9

Enhanced protection. Only devices on the white list should be able to link with your router.

L
LittleBearEric
Junior Member
14
11-30-2016, 07:01 AM
#10
The core idea is to configure a Wi-Fi password using the strongest encryption available. Honestly, that should suffice. For a whitelist approach, switch outgoing and incoming traffic to deny access and you’ll need to specify each MAC address. It seems you’d need a list of all devices allowed to communicate. Frankly, this can be quite challenging (as mentioned before). I believe solid encryption with a strong key is sufficient and practical. If you want additional security, an access control list might be more suitable (there’s a tab for that).
L
LittleBearEric
11-30-2016, 07:01 AM #10

The core idea is to configure a Wi-Fi password using the strongest encryption available. Honestly, that should suffice. For a whitelist approach, switch outgoing and incoming traffic to deny access and you’ll need to specify each MAC address. It seems you’d need a list of all devices allowed to communicate. Frankly, this can be quite challenging (as mentioned before). I believe solid encryption with a strong key is sufficient and practical. If you want additional security, an access control list might be more suitable (there’s a tab for that).

Pages (2): 1 2 Next