473,394 Members | 1,759 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

Block a computer from the LAN network

I was wondering if there was a way to block a computer from a LAN.

I am using a windows network with AD servers and windows DHCP

I can only think of a couple of scenarios, one would be in the switch level
although I have a dell switch 2848, and I don't see any type of access control in the interface.

The other I would guess would maybe be something with windows ipsec, but I'm not sure.

If anyone knows any ways of doing this, I'd be curious. Weather it be hardware, software, or configurations.
Nov 10 '12 #1
5 6579
Rabbit
12,516 Expert Mod 8TB
Most routers come with mac filtering. Or you could use a proxy server.
Nov 11 '12 #2
I'm assuming my router/firewall will block the computer from lan to wan networking, but I don't think it will block a computer from using the internet lan network
Nov 11 '12 #3
zmbd
5,501 Expert Mod 4TB
- You've given very little information about your network setup.

- How is the computer you want to block linking into your network.
Nov 12 '12 #4
there is a main switch, a dell switch 2848, bringing wires to all the offices, in some offices there are smaller switches.

So I want the ability to be able to see an unwanted computer on the network internally and block the IP or mac address.

Nowmally routers will block lan to wan, but what controls all the internal traffic?

In my mind, the only way to do this is in the main switch, or maybe something in windows IPSEC
Nov 12 '12 #5
zmbd
5,501 Expert Mod 4TB
Rabbit has a good basic solution for you and is how I control the small home network (in fact, the router acts as my DHCP and I have rules that block Internet access for anything without a logged MAC, secured the wireless (I don't even let it broadcast), the firewall has a program component that I can install on each authorized PC, and so forth)

SysInternals has some of the better freeware type tools:
http://technet.microsoft.com/en-us/s.../bb795532.aspx is one page for active directory. You can do a search for others there and they have some networking stuff too... and there is some pay-for commercial suites.

Then there is this article http://www.techrepublic.com/blog/fiv...42?tag=nl.e550 mind you it's just one person's opinion

Switches are normally like coax-cable splitters so maybe not so much help... however the managed ones should allow you to at least shunt or kill a specific connection:
http://www.netgear.com/business/prod...e/default.aspx

Much past this and someone with more current understanding than I have will have to help you.
Nov 12 '12 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: Omega | last post by:
Hi In serveral firewall software you can block all network traffic with one click, can I do the same in c# ? Thanks
5
by: abcd | last post by:
any ideas on how to block a network port from being used, or one that is currently in use? For example, say I want to block port 23 from being used. by used, I mean allowing connections to or...
14
by: Omar Abid | last post by:
Hi, I'm using my with a program to detect an internet connection. It return true when I'm connected, but even when I 'm disconnected it returns true I don't know why ? Thx Omar Abid
2
by: =?Utf-8?B?Um9ja3k=?= | last post by:
If the network cable is unplugged I need to change an image on my main form status bar, however this does not work ' The computer has been connected or disconnected from the network If...
3
by: SyGC | last post by:
Hi People, Im trying to do a simple Loop where by an IP address is pinged (Using My.computer.network.ping) and the results, true or false, are used to invoke another line of code. Basically if...
5
by: SyGC | last post by:
Greetings All, I have established a working Remote Connection to a MySQL DB using ODBC which allows me to select data in a Datagridview in my Form. The data is a list of IP addresses. What i want...
20
by: =?Utf-8?B?QnJpYW4gTmljaG9sc29u?= | last post by:
Hello, I'm trying to create an admin page that can run miscellaneous scripts for our IT department. Currently, I'm trying to create a script that can map a network drive for a user (e.g. a form...
2
by: =?Utf-8?B?TmV1bmc=?= | last post by:
Dear Sir, I'm not sure I'm in the correct discussion group or not. I would like to create a tool like a small script or program to run at a computer and then returns all networking results....
2
by: Jerry Spence1 | last post by:
In VB2005 (.NET 2.0) when I do: my.computer.network.uploadfile I get the error "The requested FTP command is not supported when using an HTTP Proxy" Is there any way round this? Does this...
6
by: =?Utf-8?B?Tmljb2xhcw==?= | last post by:
Basically I got a LAN with several computer. From Computer A I'll got my appliation which should do the following: Check if any other computer lost connection to the network. (Computer B may has...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.