I would like to ask if somebody has experienced (probably yes) that there are unauthorized routers connected to your network. This issue is becoming headache for me now. Right now, I am tracing these devices and blocking using their MAC addresses. But the problem is, there are users that are smart to changed their MAC address or cloning their Laptop MAC address to be used on their router. Is there a way to limit them? This is usually happening for individual subscribers… using a Radius server for authentication, etc.
If you any have other suggestion on securing the network, please share.
This is on the router directly connected to your clients. Change the dst-address to your network. This will set the TTL to 2 and when it leaves your router it will we decremented by 1, so when it gets to your client it will be 1 and no further routing will be possible without the client changing the TTL. Most of your users will not be able to fix this.
“Output” isn’t a good chain to do that in, though. That only contains packets originated by the router, not packets going through the router.
I tend to simple set the TTL to 1 in postrouting (it hs already been decremented by the router at this point, so you’d want it to be 1, or it could go one hop behind a customer router).