SlideShare a Scribd company logo
1 of 11
MAC Filtering
Presented Devang Doshi on: Sep 17, 2015
Index
• MAC
• MAC Address
• MAC Filtering
MAC
• MAC stands for Media Access Control
• In the 7 layer OSI model for computer networking,
Layer Data Unit
Host
Layers
7. Application
Data6. Presentation
5. Session
4. Transport Segments
Media
Layers
3. Network Packet/Datagram
2. Data link Bit/Frame
1. Physical Bit
Media Access Control
(MAC) sub-layer
responsible for controlling
how devices in a network
gain access to data and
permission to transmit it.
Logical Link Control
(LLC) sub-layer
controls error checking
and packet
synchronization.
MAC Address
• A unique identifier assigned to
network interfaces
(for communications on the physical
network segment)
• Network address for most IEEE
802 network technologies
(including Ethernet and WiFi)
• Most often assigned by the
manufacturer
• Stored in hardware
(on card's read-only memory or some other
firmware mechanism)
Image source: https://en.wikipedia.org/wiki/MAC_address#/media/File:MAC-48_Address.svg
What is MAC Filtering?
• Definition, as per wikipedia,
“In computer networking,
MAC Filtering refers to
a security access control method whereby the
48-bit address assigned to each network card
is used to determine access to the network. “
• Definition, as per TechNet,
“MAC address filtering
is a feature for IPv4 addresses
that allows you to include or exclude computers
and devices based on their MAC address”
MAC Filtering
=
GUI Filtering
=
Layer 2 Filtering
=
Link-layer Filtering
How to implement MAC Filtering?
• When configuring MAC address filtering, you can specify the
hardware types that are exempted from filtering
(By default, all hardware types defined in RFC 1700 are exempted from filtering)
• Before configuring MAC address filtering,
• Enable and define an explicit allow and deny list
(for DHCP to function smoothly)
• Enable and define an allow list and a block list
(the block list has precedence over the allow list)
How to implement MAC Filtering?
• Four step process to enable MAC address filtering on
Windows Computer:
1. In the DHCP console, double-click the IPv4 node, and then double-
click the Filters node
2. Right-click Allow or Deny as appropriate for the type of filter you
are creating, and then click New Filter
3. Enter the MAC address to filter, and then enter a comment in the
Description field if you want to. Click Add. Repeat this step to add
other filters
4. Click Close when you have finished
Summary
Unique address
for each card,
can’t be changed*
Blacklists and
Whitelists
Devices not Users
Effective in wired
networks
Not effective on
wireless
networks
Used on
Enterprise
Networking
Reference: Websites
• https://en.wikipedia.org/wiki/MAC_filtering
• https://en.wikipedia.org/wiki/MAC_address
• https://en.wikipedia.org/wiki/OSI_models
• https://en.wikipedia.org/wiki/Media_access_control
• https://technet.microsoft.com/en-us/magazine/ff521761.aspx
Questions?
Thank you for your time

More Related Content

What's hot

Network servers
Network serversNetwork servers
Network serversOnline
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
San zoning in details
San zoning in detailsSan zoning in details
San zoning in detailsGaurav Rege
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
Network Components
Network ComponentsNetwork Components
Network ComponentsIfrad Mahbub
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegejackmakani
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 

What's hot (20)

Network servers
Network serversNetwork servers
Network servers
 
DHCP
DHCPDHCP
DHCP
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network basics
Network basicsNetwork basics
Network basics
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
San zoning in details
San zoning in detailsSan zoning in details
San zoning in details
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom college
 
Nat pat
Nat patNat pat
Nat pat
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 

Similar to Mac Filtering

Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BMahmmoud Mahdi
 
how does the OSI Model relate to the seven domains of an IT infrastr.pdf
how does the OSI Model relate to the seven domains of an IT infrastr.pdfhow does the OSI Model relate to the seven domains of an IT infrastr.pdf
how does the OSI Model relate to the seven domains of an IT infrastr.pdfmohammedfootwear
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
Network standards
Network standardsNetwork standards
Network standardshspatalia
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5RaynaITSTEP
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion ciscoyexia
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion ciscoyexia
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Osi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersOsi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersAll About Testing
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 

Similar to Mac Filtering (20)

Lesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing BLesson.7: Configuring IP Routing B
Lesson.7: Configuring IP Routing B
 
how does the OSI Model relate to the seven domains of an IT infrastr.pdf
how does the OSI Model relate to the seven domains of an IT infrastr.pdfhow does the OSI Model relate to the seven domains of an IT infrastr.pdf
how does the OSI Model relate to the seven domains of an IT infrastr.pdf
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Network standards
Network standardsNetwork standards
Network standards
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Cisco CCNA module 6
Cisco CCNA module 6Cisco CCNA module 6
Cisco CCNA module 6
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Osi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersOsi Model Interview Questions & Answers
Osi Model Interview Questions & Answers
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 

More from Devang Doshi

Reviewing Mindfulness of Leaders
Reviewing Mindfulness of LeadersReviewing Mindfulness of Leaders
Reviewing Mindfulness of LeadersDevang Doshi
 
In defense of Obama - article critique
In defense of Obama - article critiqueIn defense of Obama - article critique
In defense of Obama - article critiqueDevang Doshi
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final PresentationDevang Doshi
 

More from Devang Doshi (6)

Green Computing
Green ComputingGreen Computing
Green Computing
 
Social Perception
Social PerceptionSocial Perception
Social Perception
 
Reviewing Mindfulness of Leaders
Reviewing Mindfulness of LeadersReviewing Mindfulness of Leaders
Reviewing Mindfulness of Leaders
 
In defense of Obama - article critique
In defense of Obama - article critiqueIn defense of Obama - article critique
In defense of Obama - article critique
 
Capstone Final Presentation
Capstone Final PresentationCapstone Final Presentation
Capstone Final Presentation
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Mac Filtering

  • 1. MAC Filtering Presented Devang Doshi on: Sep 17, 2015
  • 2. Index • MAC • MAC Address • MAC Filtering
  • 3. MAC • MAC stands for Media Access Control • In the 7 layer OSI model for computer networking, Layer Data Unit Host Layers 7. Application Data6. Presentation 5. Session 4. Transport Segments Media Layers 3. Network Packet/Datagram 2. Data link Bit/Frame 1. Physical Bit Media Access Control (MAC) sub-layer responsible for controlling how devices in a network gain access to data and permission to transmit it. Logical Link Control (LLC) sub-layer controls error checking and packet synchronization.
  • 4. MAC Address • A unique identifier assigned to network interfaces (for communications on the physical network segment) • Network address for most IEEE 802 network technologies (including Ethernet and WiFi) • Most often assigned by the manufacturer • Stored in hardware (on card's read-only memory or some other firmware mechanism) Image source: https://en.wikipedia.org/wiki/MAC_address#/media/File:MAC-48_Address.svg
  • 5. What is MAC Filtering? • Definition, as per wikipedia, “In computer networking, MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. “ • Definition, as per TechNet, “MAC address filtering is a feature for IPv4 addresses that allows you to include or exclude computers and devices based on their MAC address” MAC Filtering = GUI Filtering = Layer 2 Filtering = Link-layer Filtering
  • 6. How to implement MAC Filtering? • When configuring MAC address filtering, you can specify the hardware types that are exempted from filtering (By default, all hardware types defined in RFC 1700 are exempted from filtering) • Before configuring MAC address filtering, • Enable and define an explicit allow and deny list (for DHCP to function smoothly) • Enable and define an allow list and a block list (the block list has precedence over the allow list)
  • 7. How to implement MAC Filtering? • Four step process to enable MAC address filtering on Windows Computer: 1. In the DHCP console, double-click the IPv4 node, and then double- click the Filters node 2. Right-click Allow or Deny as appropriate for the type of filter you are creating, and then click New Filter 3. Enter the MAC address to filter, and then enter a comment in the Description field if you want to. Click Add. Repeat this step to add other filters 4. Click Close when you have finished
  • 8. Summary Unique address for each card, can’t be changed* Blacklists and Whitelists Devices not Users Effective in wired networks Not effective on wireless networks Used on Enterprise Networking
  • 9. Reference: Websites • https://en.wikipedia.org/wiki/MAC_filtering • https://en.wikipedia.org/wiki/MAC_address • https://en.wikipedia.org/wiki/OSI_models • https://en.wikipedia.org/wiki/Media_access_control • https://technet.microsoft.com/en-us/magazine/ff521761.aspx
  • 11. Thank you for your time

Editor's Notes

  1. Before you can configure MAC address filtering, you must do the following: Enable and define an explicit allow list. The DHCP server provides DHCP services only to clients whose MAC addresses are in the allow list. Any client that previously received IP addresses is denied address renewal if its MAC address isn’t on the allow list. Enable and define an explicit deny list. The DHCP server denies DHCP services only to clients whose MAC addresses are in the deny list. Any client that previously received IP addresses is denied address renewal if its MAC address is on the deny list. Enable and define an allow list and a block list. The block list has precedence over the allow list. This means that the DHCP server provides DHCP services only to clients whose MAC addresses are in the allow list, provided that no corresponding matches are in the deny list. If a MAC address has been denied, the address is always blocked even if the address is on the allow list.
  2. Before you can configure MAC address filtering, you must do the following: Enable and define an explicit allow list. The DHCP server provides DHCP services only to clients whose MAC addresses are in the allow list. Any client that previously received IP addresses is denied address renewal if its MAC address isn’t on the allow list. Enable and define an explicit deny list. The DHCP server denies DHCP services only to clients whose MAC addresses are in the deny list. Any client that previously received IP addresses is denied address renewal if its MAC address is on the deny list. Enable and define an allow list and a block list. The block list has precedence over the allow list. This means that the DHCP server provides DHCP services only to clients whose MAC addresses are in the allow list, provided that no corresponding matches are in the deny list. If a MAC address has been denied, the address is always blocked even if the address is on the allow list.
  3. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network. MAC filtering is not an effective control in wireless networking as attackers can eavesdrop on wireless transmissions. However MAC filtering is more effective in wired networks, since it is more difficult for attackers to identify authorized MACs. MAC filtering is also used on enterprise wireless networks with multiple access points to prevent clients from communicating with each other. The access point can be configured to only allows clients to talk to the default gateway, but not other wireless clients. It increases the efficiency of access to network