Joined: 18 Feb 2007 Posts: 87 Location: Bern, Switzerland
Posted: Mon Aug 04, 2014 19:27 Post subject:
I don't know the specific answer to your question. But I have noticed, that the MAC blacklist only is in effect on the physical interfaces, not however on the virtual interfaces. So if you shouldn't be able to find a direct solution, maybe you can work something that way. _________________ Deployed:
Buffalo WZR-1750 - v3.0-r38580M kongac (02/05/19) - Router
Buffalo WZR-1750 - v3.0-r38580M kongac (02/05/19) - Client Bridge
Buffalo WZR-1750 - v3.0-r38100M kongac (12/27/18) - Router
Linksys WRT320 -> E2000 - v3.0-r33772 K30 mega (11/16/17) - Client Bridge
I don't know if I am understanding what you are trying to do correctly or not, but I believe that this functionality is already built-in with DD-WRT on the Access Restriction tab.
It looks like one can setup 10 policies and for each policy you have a choice of denying:
1) specific MAC addresses (up to 8 per policy),
2) specific IP addresses (up to 6 per policy),
3) specific IP address ranges (up to 2 per policy).
I don't know if you can mix those options on the same policy or not (i.e. 2 MAC addresses with an IP range). You can then set the time frame (from when to when), and what specific days, if not everyday.
Do you have this tab on your router's build? _________________ R7000 Nighthawk - DD-WRT v3.0-r40270M kongac (07/11/19)
WRT54Gv2 - V24 STD Build 22118 configured as AP
WRT54Gv8.2 - V24 Micro Build 22118 configured as AP