No refundIs there a real solution to netcut
Please advise me please
I did not know that there are settings of connecting with the WPA Filter USER managerisolate clients from eachother, then all problems will be solved.
use default-forwarding=no to deny connection from one customer to another, and use wpa encryption keys to avoid strangers in your network
Hi sergejs;Hareth, what real problem from Netcut do you have?
Hi Sergejs;1) Cookie option is for different purpose, it has nothing to do with IP/MAC scanning software.
2) At the moment HotSpot does not have any option to check unique secret key. For HotSpot server, legitimate user A with IP address x.x.x.x and MAC-address yy:yy:yy:yy:yy:yy, is the same as "bad" user who uses the same IP address x.x.x.x and MAC-address yy:yy:yy:yy:yy:yy:yy
3) When you have network with "bad" users, that are using IP/MAC scanning software. The main rule is protect/control their access to local network, then netctut and other IP/MAC softwares will be useful.
Yes, because from router point of view, randomly generated IP/MAC is the same as for valid IP/MAC combination.this a bad sitiuation. is this wiki information wrong ? "if source MAC address and randomly generated ID matches the ones stored on the gateway, user will be automatically logged in using the login information (username and password pair) was used when the cookie was first generated"
Thank you very muchHi sergejs;Hareth, what real problem from Netcut do you have?
Can you watch video ? and Is this http cookie? ( for attachment picture)
https://www.youtube.com/watch?v=gDZ1LbpqXIA
https://www.youtube.com/watch?v=ngmanR25PQo
Thank you very muchHi sergejs;Hareth, what real problem from Netcut do you have?
Can you watch video ? and Is this http cookie? ( for attachment picture)
https://www.youtube.com/watch?v=gDZ1LbpqXIA
https://www.youtube.com/watch?v=ngmanR25PQo
In fact,
Yes, it is for this problem and the penetration in the explanation
YouTube on the links established by the
Is the problem that made me hate MIKROTK and made me desperate surfer MIKROTK
Each annotated solutions
In its Web sites and is not damaged Gagne
Even radical solutions
solution. if this is so simple bypass, then why are you develop hotspot authorization this product? Mikrotik you just do routing. am I right? How bad people will handle them in both the average of four thousand people you explain it for me? and 10-20 minute. is possible?
If there is public network, where everyone has access I do not see any reason to worry about unauthorized access.I guess I did not explain the situation. The reason I use my hotspot setup in a simple way and do not want additional configuration on the client side. I work at a large university. a lot of people. I will not go to everyone send WEP/WPA vss password is not flexible. Simply give a session ID needs to do Mikrotik and follow it. Similar ip
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1solution. if this is so simple bypass, then why are you develop hotspot authorization this product? Mikrotik you just do routing. am I right? How bad people will handle them in both the average of four thousand people you explain it for me? and 10-20 minute. is possible?If there is public network, where everyone has access I do not see any reason to worry about unauthorized access.I guess I did not explain the situation. The reason I use my hotspot setup in a simple way and do not want additional configuration on the client side. I work at a large university. a lot of people. I will not go to everyone send WEP/WPA vss password is not flexible. Simply give a session ID needs to do Mikrotik and follow it. Similar ip
However for your case, it will be enough with additional open AP, where you can setup HotSpot and put instructions, how to configure WPA/WPA2 authentication client side (it does not ask too much by the way), if bad users abuse your network.
44444444444444444444!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1solution. if this is so simple bypass, then why are you develop hotspot authorization this product? Mikrotik you just do routing. am I right? How bad people will handle them in both the average of four thousand people you explain it for me? and 10-20 minute. is possible?If there is public network, where everyone has access I do not see any reason to worry about unauthorized access.I guess I did not explain the situation. The reason I use my hotspot setup in a simple way and do not want additional configuration on the client side. I work at a large university. a lot of people. I will not go to everyone send WEP/WPA vss password is not flexible. Simply give a session ID needs to do Mikrotik and follow it. Similar ip
However for your case, it will be enough with additional open AP, where you can setup HotSpot and put instructions, how to configure WPA/WPA2 authentication client side (it does not ask too much by the way), if bad users abuse your network.
Exactly right - but when implementing Feklar's solution, don't forget the switches between APs. It is not enough to turn off "default foward" on the AP interface.Devices on the same layer2 segment do not need to talk to a router to communicate, therefore the router cannot control their communications since the traffic never touches it. This has to be done at the edge of the physical network.
AP --- (clients-ap1)
/
router --- switch - AP --- (clients-ap2)
\
AP --- (clients-ap3)
What is wrong with you?hlooooooooooooooo!!!!!!!!!!!!!!!