The Tech Edvocate

Top Menu

  • Advertisement
  • Apps
  • Home Page
  • Home Page Five (No Sidebar)
  • Home Page Four
  • Home Page Three
  • Home Page Two
  • Home Tech2
  • Icons [No Sidebar]
  • Left Sidbear Page
  • Lynch Educational Consulting
  • My Account
  • My Speaking Page
  • Newsletter Sign Up Confirmation
  • Newsletter Unsubscription
  • Our Brands
  • Page Example
  • Privacy Policy
  • Protected Content
  • Register
  • Request a Product Review
  • Shop
  • Shortcodes Examples
  • Signup
  • Start Here
    • Governance
    • Careers
    • Contact Us
  • Terms and Conditions
  • The Edvocate
  • The Tech Edvocate Product Guide
  • Topics
  • Write For Us
  • Advertise

Main Menu

  • Start Here
    • Our Brands
    • Governance
      • Lynch Educational Consulting, LLC.
      • Dr. Lynch’s Personal Website
      • Careers
    • Write For Us
    • The Tech Edvocate Product Guide
    • Contact Us
    • Books
    • Edupedia
    • Post a Job
    • The Edvocate Podcast
    • Terms and Conditions
    • Privacy Policy
  • Topics
    • Assistive Technology
    • Child Development Tech
    • Early Childhood & K-12 EdTech
    • EdTech Futures
    • EdTech News
    • EdTech Policy & Reform
    • EdTech Startups & Businesses
    • Higher Education EdTech
    • Online Learning & eLearning
    • Parent & Family Tech
    • Personalized Learning
    • Product Reviews
  • Advertise
  • Tech Edvocate Awards
  • The Edvocate
  • Pedagogue
  • School Ratings

logo

The Tech Edvocate

  • Start Here
    • Our Brands
    • Governance
      • Lynch Educational Consulting, LLC.
      • Dr. Lynch’s Personal Website
        • My Speaking Page
      • Careers
    • Write For Us
    • The Tech Edvocate Product Guide
    • Contact Us
    • Books
    • Edupedia
    • Post a Job
    • The Edvocate Podcast
    • Terms and Conditions
    • Privacy Policy
  • Topics
    • Assistive Technology
    • Child Development Tech
    • Early Childhood & K-12 EdTech
    • EdTech Futures
    • EdTech News
    • EdTech Policy & Reform
    • EdTech Startups & Businesses
    • Higher Education EdTech
    • Online Learning & eLearning
    • Parent & Family Tech
    • Personalized Learning
    • Product Reviews
  • Advertise
  • Tech Edvocate Awards
  • The Edvocate
  • Pedagogue
  • School Ratings
  • A Visitor’s Guide to Tucson, Arizona, United States

  • A Visitor’s Guide to Hamilton, Canada

  • Beware of Fiverr: You Might Get Scammed

  • The Future of Artificial Intelligence: Navigating the Next Frontier

  • Best Home Backup Generators for 2026

  • Online Learning Platforms: Transforming Education in the Digital Age

  • Fastest Growing Sectors of the EdTech Market: Exploring Emerging Trends

  • The Best Video Games of All Time

  • What is the Best Gaming Platform on the Market?

  • Midjourney vs OpenArt: A Comprehensive Comparison of AI Art Generators

Digital & Mobile Technology
Home›Digital & Mobile Technology›MAC Address Filtering: What It Is and How It Works

MAC Address Filtering: What It Is and How It Works

By Matthew Lynch
June 8, 2023
0
Spread the love

As technology continues to advance, new ways of securing networks are being developed. One such technique is MAC address filtering, which is a method of allowing or denying access to a particular network based on a device’s Media Access Control (MAC) address. In this article, we will explore what MAC address filtering is and how it works.

What is MAC Address Filtering?

MAC address filtering is a form of network security that uses the MAC addresses of devices to permit or deny access to a network. Since the MAC address of a device is unique, network administrators can use this information to identify and control traffic on their network. Essentially, it is a method of limiting access to those devices that have been pre-approved by the network administrator.

How Does MAC Address Filtering Work?

MAC address filtering works by creating a list of devices that are allowed to access the network. The network administrator must first determine the MAC addresses of each device that is allowed to connect to the network. This list is then entered into the router or access point’s control panel. Once the list is complete, the router or access point can be configured to allow only these pre-approved MAC addresses to connect to the network. This way, any unauthorized device attempting to connect to the network is automatically denied access.

There are two types of MAC address filtering: Whitelist and Blacklist Filtering.

Whitelist Filtering

Whitelist filtering only permits devices that have been pre-approved by the network administrator to access the network. The MAC addresses of these devices are added to a list in the router or access point’s control panel. Any device that is not on the approved list will be denied access to the network.

Blacklist Filtering

In blacklist filtering, devices are denied access to the network based on MAC addresses that have been blacklisted. This technique is mainly used when network administrators want to block specific devices from accessing the network. For example, if an employee’s device has been lost or stolen, their MAC address can be added to the blacklist, preventing any unauthorized user from accessing the network with that device.

Limitations of MAC Address Filtering

While MAC address filtering is an effective way of securing a network, it does have some limitations. Firstly, it is not entirely foolproof, as rogue users can spoof their MAC addresses, allowing them to bypass the filtering system. Secondly, managing the MAC address list can be time-consuming, especially in large networks with many devices. Lastly, if a device is lost or stolen, its MAC address will still be on the approved list and can be used to access the network.

Conclusion

MAC address filtering is a powerful security tool that can help ensure the integrity of a network. By creating an approved list of devices, network administrators can limit access to those who need it while keeping unauthorized users out. While MAC address filtering may not be the perfect solution, it is an excellent first line of defense for network security. As technology continues to evolve, we can expect to see more advanced security solutions in the future.

Previous Article

How to Set Up and Connect a ...

Next Article

How to Find Friends’ Birthdays on Facebook

Matthew Lynch

Related articles More from author

  • Digital & Mobile Technology

    How to Add Bots to Your Discord Server

    June 12, 2023
    By Matthew Lynch
  • Digital & Mobile Technology

    Best IT Certification Courses for Beginners

    June 23, 2023
    By Matthew Lynch
  • Digital & Mobile Technology

    What Is a DWF File?

    July 15, 2023
    By Matthew Lynch
  • Digital & Mobile Technology

    How to Use the CONCATENATE Function in Google Sheets

    July 31, 2023
    By Matthew Lynch
  • Digital & Mobile Technology

    Why Don’t I Have Facebook Marketplace?

    June 8, 2023
    By Matthew Lynch
  • Digital & Mobile Technology

    Things You Can Do on a Galaxy Watch With Your iPhone

    June 23, 2023
    By Matthew Lynch

Search

Login & Registration

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Newsletter

Signup for The Tech Edvocate Newsletter and have the latest in EdTech news and opinion delivered to your email address!

About Us

Since technology is not going anywhere and does more good than harm, adapting is the best course of action. That is where The Tech Edvocate comes in. We plan to cover the PreK-12 and Higher Education EdTech sectors and provide our readers with the latest news and opinion on the subject. From time to time, I will invite other voices to weigh in on important issues in EdTech. We hope to provide a well-rounded, multi-faceted look at the past, present, the future of EdTech in the US and internationally.

We started this journey back in June 2016, and we plan to continue it for many more years to come. I hope that you will join us in this discussion of the past, present and future of EdTech and lend your own insight to the issues that are discussed.

Newsletter

Signup for The Tech Edvocate Newsletter and have the latest in EdTech news and opinion delivered to your email address!

Contact Us

The Tech Edvocate
910 Goddin Street
Richmond, VA 23231
(601) 630-5238
[email protected]

Copyright © 2025 Matthew Lynch. All rights reserved.