02-29-2016
Quote:
Originally Posted by
Lazydog
You are creating one large management nightmare.
But would it be possible though?
Quote:
Originally Posted by
Lazydog
Then when something goes wrong or you need to know who did what look at the mac address associated to the IP address.
Ok, that sounds good. But there is one thing, I can't stop thinking about. In the past there were one or two request over four years (so, not that often, but it occurs) from the police who asked about the owner of a specific IP-adress to specific time. There was no more information about it (so no clue what event would be, nor the MAC-address of the subject). But with this system of yours we wouldn't be able to answer those requests in a proper way. That's why I thought every user should have an unique identifier, besides the MAC adress.
Quote:
Originally Posted by
Lazydog
Ensure that only known MAC addresses receive an IP.
Yeah, we have some knowledge on that part, since our current network is based on MAC/IP-binding
Quote:
Originally Posted by
Lazydog
Another question is how are you going to ensure that only the user has access to his/her network?
Well, I thought we could use something like IEEE802.x/Radius to authentificate the user going over WiFi and when they want to go online via the provided cable connection, then we could route the port of the connected switch to the ip... something like that...
Last edited by mrgruen; 02-29-2016 at 03:04 PM..
10 More Discussions You Might Find Interesting
1. IP Networking
I'm new to this forum, so please be gentle !
I need to get my IBM RS running AIX4.3 onto the internet to a particular ftp server, through a NT server running proxy services.
This NT server is directly connected to our internet router vis a secondary NIC on the NT server.
When I add the route... (2 Replies)
Discussion started by: garry
2 Replies
2. UNIX for Dummies Questions & Answers
Using Redhat Linux Enterprise AS 4
can someone teach me how to setup a dns server for my webserver?
i've registered a domainname at mydomain.com
but when i type in the domain i register i cannot enter to my webserver.
someone told me that it is related with the DNS setting on my server.
i've... (2 Replies)
Discussion started by: kaixiang88
2 Replies
3. AIX
I know that IBM's official stance is that NIM does not work on etherchannel environment, but has anyone able to get around it?
I'm working on a p5-590 LPAR system, and the NIM master and clients are all on the same frame.
Any help is appreciated. (1 Reply)
Discussion started by: pdtak
1 Replies
4. HP-UX
I am running HP_UX 11.23 with 4 NIC cards (this is our TSM server)
I have 4 subnets we are backing across. trying to keep traffic on their subnets. I only have one route statment should I add more.
route add net 123.99.8.0 netmask 255.255.255.0 123.99.8.254
route add net 123.99.67.0 netmask... (2 Replies)
Discussion started by: myork
2 Replies
5. AIX
Hi All,
I know there is a way to do this in routers. The question is whether it is posisble to do this in AIX.
For our Web Focus ODBC connection to the Disaster Recovery servers, we want to restrict the access to the ODBC ports so that only the IP address of the Web Focus server can get to... (1 Reply)
Discussion started by: strunz
1 Replies
6. IP Networking
We have a client that is bringing in a MPLS router into our network. Right now they connect to our site using a tunnel between our two firewalls. I have a policy in place that locks them down to 4 specific servers (the servers have a gateway of 10.199.1.1 w/ a subnet of /24). Keep that in mind.... (2 Replies)
Discussion started by: sdotsen
2 Replies
7. Linux
Dear Sir
I am a newbie in the world of IP telephony. I have been working with Asterisk PBX (SIP) and Cisco Call Manager (MGCP) but now I am learning on how to work GNUGK for H.323 Gatekeeper.
I am having a problem, configuring static call routing on GNUGK
in the section
... (0 Replies)
Discussion started by: mfondoum
0 Replies
8. UNIX for Dummies Questions & Answers
hi guys
This is suse 11 sp1
I have a Server that has 4 NICs, I've created 2 bonds
bond0(eth0-eth1) - 10.10.10.2
bond1(eth2-eth3) - 10.10.10.3
Each bound goes to a Storage Device which is directly connected
so bond0 goes to Storage_Controller_1 and 2 like this
Server_bond0 <-------->... (2 Replies)
Discussion started by: karlochacon
2 Replies
9. Ubuntu
Hi everyone,
Hopefully there is someone here that can help me with the problem I got.
At my office I have 1 ubuntu firewall/gateway and several networks.
On the firewall/gateway I have three network cards, one for internet, one for network 192.168.100.0 and one for network 172.20.1.0
We... (0 Replies)
Discussion started by: thbor83
0 Replies
10. UNIX and Linux Applications
Hi Friends,
I am trying to connect to remote server via proxy server and transfer files from my server .
the proxy server is windows.
I wanted to know is that is it possible?
I am using command to connect is
/usr/local/bin/sftp -o "ProxyCommand nc proxyserver.com 8080"(E-Mail... (6 Replies)
Discussion started by: mallayanala
6 Replies
LEARN ABOUT DEBIAN
shell-quote
SHELL-QUOTE(1p) User Contributed Perl Documentation SHELL-QUOTE(1p)
NAME
shell-quote - quote arguments for safe use, unmodified in a shell command
SYNOPSIS
shell-quote [switch]... arg...
DESCRIPTION
shell-quote lets you pass arbitrary strings through the shell so that they won't be changed by the shell. This lets you process commands
or files with embedded white space or shell globbing characters safely. Here are a few examples.
EXAMPLES
ssh preserving args
When running a remote command with ssh, ssh doesn't preserve the separate arguments it receives. It just joins them with spaces and
passes them to "$SHELL -c". This doesn't work as intended:
ssh host touch 'hi there' # fails
It creates 2 files, hi and there. Instead, do this:
cmd=`shell-quote touch 'hi there'`
ssh host "$cmd"
This gives you just 1 file, hi there.
process find output
It's not ordinarily possible to process an arbitrary list of files output by find with a shell script. Anything you put in $IFS to
split up the output could legitimately be in a file's name. Here's how you can do it using shell-quote:
eval set -- `find -type f -print0 | xargs -0 shell-quote --`
debug shell scripts
shell-quote is better than echo for debugging shell scripts.
debug() {
[ -z "$debug" ] || shell-quote "debug:" "$@"
}
With echo you can't tell the difference between "debug 'foo bar'" and "debug foo bar", but with shell-quote you can.
save a command for later
shell-quote can be used to build up a shell command to run later. Say you want the user to be able to give you switches for a command
you're going to run. If you don't want the switches to be re-evaluated by the shell (which is usually a good idea, else there are
things the user can't pass through), you can do something like this:
user_switches=
while [ $# != 0 ]
do
case x$1 in
x--pass-through)
[ $# -gt 1 ] || die "need an argument for $1"
user_switches="$user_switches "`shell-quote -- "$2"`
shift;;
# process other switches
esac
shift
done
# later
eval "shell-quote some-command $user_switches my args"
OPTIONS
--debug
Turn debugging on.
--help
Show the usage message and die.
--version
Show the version number and exit.
AVAILABILITY
The code is licensed under the GNU GPL. Check http://www.argon.org/~roderick/ or CPAN for updated versions.
AUTHOR
Roderick Schertler <roderick@argon.org>
perl v5.8.4 2005-05-03 SHELL-QUOTE(1p)