Feature Request: Anti-Tethering (Anti-NAT) Detection on LAN Side

Feature Request: LAN-side Anti-Tethering (Anti-NAT) & Rogue AP Detection

Hi Peplink Team,

I’d like to suggest adding a practical feature that would bring real value to Peplink routers, switches, and access points — specifically in environments where network misuse and security enforcement are critical.

Feature:

LAN-side Anti-Tethering (Anti-NAT) and Rogue Access Point Detection

The idea is to provide a way to automatically detect and block devices acting as mobile hotspots, tethered connections, or unauthorized Wi-Fi APs connected to the LAN side of the network.


Why It’s Useful:

  • Helps prevent users from bypassing captive portals, firewall rules, or quotas by using personal mobile hotspots or unauthorized NAT devices.
  • Detects rogue or unauthorized access points that could be re-broadcasting LAN traffic or exposing internal networks.
  • Reduces risk of bandwidth abuse, unauthorized access, and L2-based attacks.
  • Keeps guest and corporate networks clean and enforceable without requiring additional appliances.

Potential Detection Methods:

  • Block or alert on traffic with suspicious TTL values (e.g., TTL=64 from Android tethering).
  • Detect multiple MACs behind a single IP address.
  • Identify AP signatures or bridge devices via MAC vendor IDs or DHCP behavior.
  • Simple rule-based engine to take action: log, rate-limit, or block the offending device.

Value to Peplink:

  • Adds security value at the edge with minimal complexity.
  • Useful for MSPs, schools, offices, retail — where network integrity and usage control are important.
  • Fits naturally into Peplink’s LAN and Wi-Fi infrastructure, and could even integrate with InControl2 for visibility and alerting.

This isn’t a complicated feature to implement, and I hope you agree it can bring real value by helping to enforce network policies and prevent detouring or misuse

6 Likes

What would be really nice is if we could grab more granular information about the traffic being forwarded on the router, and have that information available via the HTTP API, so we could write our own filtering and blocking logic in Python (or whatever). We stick them in Docker containers and run those on the Peplink devices that support this (or put them on external devices like RPi when not). This would give us unlimited flexibility for writing rules that detect misuse of our networks (however we define that), and alert or block.