Mon Feb 13, 2017 1:36 pm
Well, hiding MAC addresses would break your network :-)
I guess you're talking about a wireless hotspot, right?
I would do it this way:
Set your DHCP server to add ARP entries for leases.
Set your LAN-facing interface to reply-only arp.
Stop client2client communication (default forward in w/l settings)
If you're using multiple w/l interfaces added to a bridge, give all of them the same bridge horizon, this stops inter-port-communication on the bridge.
If still necessary, add bridge filters to drop any arp request coming in from client-facing interfaces leaving the bridge on other client-facing interfaces.
This still won't stop attacker's ability to spoof mac addresses, but will make it more difficult.
-Chris