I have a device on my network that's used 200mb+ of data since yesterday and while sure I can can change the PW.
The easiest thing for me to do is just block that specific device... so ya, how can I block a MAC address without messing up any other connected devices ?
Mac Filter in Wireless tab. _________________ Segment 1 XR700 10Gb LAN, 1Gb WAN ISP BS
Wired AP 1 Unifi Wifi 6 LR US 1Gb LAN
Wired AP 2 Unifi Wifi 6 LR US 1Gb LAN
Wired AP 3 Unifi Wifi 6 LR US 1Gb LAN
Syslog Services Asustor 7110T NAS 10GB
NetGear XS716T 10GB Switch
download1.dd-wrt.com/dd-wrtv2/downloads/betas/ (Brain Slayer)
YAMon https://usage-monitoring.com/index.php
Block one of your own devices to test the function. _________________ Segment 1 XR700 10Gb LAN, 1Gb WAN ISP BS
Wired AP 1 Unifi Wifi 6 LR US 1Gb LAN
Wired AP 2 Unifi Wifi 6 LR US 1Gb LAN
Wired AP 3 Unifi Wifi 6 LR US 1Gb LAN
Syslog Services Asustor 7110T NAS 10GB
NetGear XS716T 10GB Switch
download1.dd-wrt.com/dd-wrtv2/downloads/betas/ (Brain Slayer)
YAMon https://usage-monitoring.com/index.php
Block one of your own devices to test the function.
Good idea but seems it's working. Seems the devices tried to connect and managed a 0.1 mb data grab. I only know this because I also use Yamon. So it seems like there's a sm window before the block kicks in but seems it works.
Block one of your own devices to test the function.
Good idea but seems it's working. Seems the devices tried to connect and managed a 0.1 mb data grab. I only know this because I also use Yamon. So it seems like there's a sm window before the block kicks in but seems it works.
Ok, so for a blocked device, how does it seemingly jump from 374.5mb last night to 520.3 now ?
It's like its blocked but doesnt catch right away thus allow data grabs.
what that is doing is adding to the firewall a new chain called CMACFILTER
In that chain the first is saying if the source of the packet is from that mac address to just drop it and return to the chain for all others. Then the last two are inserting rules into the FORWARD and INPUT chains to jump to the newly created chain.
I have no idea why the MAC filter is not working. I was trying to give you an alternative since the MAC filter seems to not be working for you.
what that is doing is adding to the firewall a new chain called CMACFILTER
In that chain the first is saying if the source of the packet is from that mac address to just drop it and return to the chain for all others. Then the last two are inserting rules into the FORWARD and INPUT chains to jump to the newly created chain.
I have no idea why the MAC filter is not working. I was trying to give you an alternative since the MAC filter seems to not be working for you.
Oh I appreciate that. I was just dumbfounded as to why the MAC filter seems to be still allowing some stuff.
Did you apply the filter to all radios? _________________ Segment 1 XR700 10Gb LAN, 1Gb WAN ISP BS
Wired AP 1 Unifi Wifi 6 LR US 1Gb LAN
Wired AP 2 Unifi Wifi 6 LR US 1Gb LAN
Wired AP 3 Unifi Wifi 6 LR US 1Gb LAN
Syslog Services Asustor 7110T NAS 10GB
NetGear XS716T 10GB Switch
download1.dd-wrt.com/dd-wrtv2/downloads/betas/ (Brain Slayer)
YAMon https://usage-monitoring.com/index.php