This sounds promising, can you point me towards some documentation or
examples where I could read more?

On Fri, Mar 22, 2019 at 1:28 PM Francis Dupont <fdup...@isc.org> wrote:

> Munroe Sollog writes:
> > There has to be a way to give kea a list of MAC addresses to ignore.
>
> => this is what I called a black list and in Kea it can be implemented
> with a client class and guards in subnets or pools (the effect is a bit
> different: when all subnets are guarded against a rogue client no subnet
> is selected. For pools it makes only resources (i.e addresses) not
> available for the rogue client (of course I suppose it has no
> reservations).
>
> Regards
>
> Francis Dupont <fdup...@isc.org>
>


-- 
Munroe Sollog
Senior Network Engineer
mun...@lehigh.edu
_______________________________________________
Kea-users mailing list
Kea-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/kea-users

Reply via email to