0
Votes

MAC Based Authentication Wired Clients

 
0
Votes

MAC Based Authentication Wired Clients

MAC Based Authentication Wired Clients
MAC Based Authentication Wired Clients
2 weeks ago

The idea that we still can't do MAC based filtering on switch and router ports is absolutely insane. The other forum on here mentioning it has been closed for any further comments and we are still without any sort of status update from TP-Link as to when this absolutely necessary security critical "feature" will be added.

 

Someone mentioned this can already be done at the switch level when it hasn't been adopted by the Omada controller. If this is already possible on the switches, then this further begs the question, why is it adopting a switch into the Omada controller REMOVES this absolute necessity of a feature?

 

You are leaving tons of TP-Link customers vulnerable to network infiltrations via switch ports, and even plugging directly into AP ports and POE injectors. It is not hard to access a camera, AP, or anything else with a hard wired connection, and hijack it. How can we protect our networks from unauthorized access? 

#1
Options
1 Reply
Re:MAC Based Authentication Wired Clients
2 weeks ago - last edited 2 weeks ago

Hi @Mikett 

Do you have any chance to test MAC Filtering?

 

The switch can configure Port Security and you can use CLI to configure it. Features not listed in the Omada Controller can still be accessed by CLI.

Try that out? The router is not gonna do much of the filtering as you cascade the switch. Basic hierarchy of the network. So try to configure that on the switch.

Best Regards! If you are new to the forum, please read: Howto - A Guide to Use Forum Effectively. Read Before You Post. Look for a model? Search your model NOW Official and Beta firmware. NEW features! Subscribe for the latest update!Download Beta Here☚ ☛ ★ Configuration Guide ★ ☚ ☛ ★ Knowledge Base ★ ☚ ☛ ★ Troubleshooting ★ ☚ ● Be kind and nice. ● Stay on the topic. ● Post details. ● Search first. ● Please don't take it for granted. ● No email confidentiality should be violated. ● S/N, MAC, and your true public IP should be mosaiced.
#2
Options

Information

Helpful: 0

Views: 91

Replies: 1

Voters 0

No one has voted for it yet.