MAC filtering

MAC filtering

In computer networking, MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control methodology whereby the 48-bit address assigned to each network card is used to determine access to the network.

MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network.

In theory, MAC filtering allows a network administrator to permit or deny network access to hosts associated with the MAC address, though in practice there are methods to circumvent this form of access control through address modification ("spoofing") or the physical exchange of network cards between hosts.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Mac OS X Server — Screenshot of Snow Leopard Server Company / developer …   Wikipedia

  • Mac OS X Leopard — Mac OS X v10.5 Leopard Part of the Mac OS X family …   Wikipedia

  • Mac OS X v10.5 — Infobox OS version name = Mac OS X v10.5 Leopard family = Imac logo size = 60px caption = Screenshot of Mac OS X v10.5 Leopard developer = Apple Inc. website = [http://www.apple.com/macosx/ www.apple.com/macosx/] source model = Closed source… …   Wikipedia

  • Bayesian Filtering Library — (BFL) is an open source C++ library for recursive Bayesian estimation. The library is mainly written by the Belgian scientist Klaas Gadeyne, and runs on Linux, Mac OS X, and Microsoft Windows. Features * Kalman filtering * Particle filters *… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… …   Wikipedia

  • Link layer — In computer networking, the link layer is the lowest layer in the Internet Protocol Suite (commonly known as TCP/IP ), the networking architecture of the Internet (RFC 1122, RFC 1123). It is the group of methods or protocols that only operate on… …   Wikipedia

  • Data link layer — The OSI model 7 Application layer 6 Presentation layer 5 Session layer 4 Transport layer 3 Network layer 2 …   Wikipedia

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

  • Wireless LAN security — One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”