Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 30 Aug 2007 11:33:50 -0700
From:      Chuck Swiger <cswiger@mac.com>
To:        paul@wilorc.co.uk
Cc:        freebsd-ipfw@freebsd.org
Subject:   Re: ipfw2 deep packet filtering
Message-ID:  <F4C586D9-C6D8-4852-98AF-F77116590E62@mac.com>
In-Reply-To: <46D6CF7A.9080502@wilorc.co.uk>
References:  <46D6CF7A.9080502@wilorc.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
On Aug 30, 2007, at 7:08 AM, Paul Bridger wrote:
> I would like to understand if it's possible to discover the real  
> MAC address of a packet that has been NAT'd by another device.

No.  You can only get the real MACs of devices by listening on the  
same subnet that the traffic originates from; once it passes through  
a router (with NAT enabled or not, doesn't matter), you only see the  
MAC of the device which passed that traffic along.

> The scenario for using this would be for hosts on a wireless LAN  
> that connect to a wireles router which NAT's their connection and  
> then routes the packets to another LAN (across a wire) where a  
> FreeBSD server performs firewall packet filtering via ipfw2.  As  
> all the connections from the hosts on the wireless LAN have had  
> their MAC and IP addresses NAT'd to that of the wireless router, it  
> is difficult to distinguish between hosts, unless some form of deep  
> packet inspection could be performed to discover the true MAC  
> address.  Is this something that would be possible with ipfw2?

Nope.  You'd need to do your firewall inspection of your wireless  
router, not on the FreeBSD box.

-- 
-Chuck




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F4C586D9-C6D8-4852-98AF-F77116590E62>