I am developing an appliance that will use bridging to create a little integrated switch. We need to ensure that only approved devices are allowed to connect to the switch; are there any mechanisms to enforce security within the linux bridge? What would be the recommended method if not? ebtables? I did a search and found nothing- please point me in the right direction if I missed something! Thanks! -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.linux-foundation.org/pipermail/bridge/attachments/20100910/8947ea30/attachment.htm
On Fri, 10 Sep 2010 00:01:57 -0400 Ryan Whelan <rcwhelan at gmail.com> wrote:> I am developing an appliance that will use bridging to create a little > integrated switch. We need to ensure that only approved devices are allowed > to connect to the switch; are there any mechanisms to enforce security > within the linux bridge? What would be the recommended method if not? > ebtables?no. it is not designed to do this.> I did a search and found nothing- please point me in the right direction if > I missed something!802.1X? --