MT/HOSTPOT = 10.0.0.1
Clients = 10.0.0.x with default gw & dns pointing to MT (i.e 10.0.0.1)
My network is flooded with ARP Poisoning. How can I prevent it to infect my HOTSPOT SERVER without going at every client end, and tell them to load antiarp or provide them with batch file doing static mac-ip entry for server.
Set your interfaces/bridges to arp=reply-only, then on your dhcp server set add-arp=yes, and on the wireless interface disable default forwarding. If the arp poisoning is coming from the ethernet network, then set to allow only mac-address per port. PPPoE would be the most secure, but is less convenient.
Is there any tool available through which I can create a ready made PPPoE dialer setup for user. Like in VPN, we have CMAK option which creates custom dialer , users simply install it and enter user id passwd only,