This sounds promising, can you point me towards some documentation or examples where I could read more?
On Fri, Mar 22, 2019 at 1:28 PM Francis Dupont <fdup...@isc.org> wrote: > Munroe Sollog writes: > > There has to be a way to give kea a list of MAC addresses to ignore. > > => this is what I called a black list and in Kea it can be implemented > with a client class and guards in subnets or pools (the effect is a bit > different: when all subnets are guarded against a rogue client no subnet > is selected. For pools it makes only resources (i.e addresses) not > available for the rogue client (of course I suppose it has no > reservations). > > Regards > > Francis Dupont <fdup...@isc.org> > -- Munroe Sollog Senior Network Engineer mun...@lehigh.edu
_______________________________________________ Kea-users mailing list Kea-users@lists.isc.org https://lists.isc.org/mailman/listinfo/kea-users