• Skip to main content
  • Skip to secondary menu
Productivity Portfolio logo

Productivity Portfolio

Valuing your time & technology

  • HOME
  • Tutorials
    • Excel
    • Google
    • Word
    • Outlook
    • Terms
  • Quick Tips
    • Email
    • Security
    • Web
    • Windows
    • Internet of Things
    • Cell
  • Reviews
    • Health
    • Services
    • Software
    • Hardware
  • About
    • About Me
    • Contact Page
    • Privacy Policy
  • Newsletter
  • Resources
    • Practical Gift Ideas
    • Books
    • Favorite Podcasts
    • Online Courses
    • Online Services
  • SEARCH
You are here: Home › Quick Tips › MAC Addresses and Filtering Devices

MAC Addresses and Filtering Devices

LAST UPDATED: June 15, 2020 By Anne Hennegar

TwitterPinterestLinkedInRedditFacebookPocketEmail

MAC addresses are one of those terms that few people know, but many could benefit from learning. While some people equate them to a Macintosh computer, others know this unique bit of information can help define your wireless network.

In the past several years, network vendors have done a better job of telling consumers about security. Many articles have suggested steps such as changing administrator passwords, SSIDs, and enabling security protocols for wireless networks.

Another layer of protection is MAC filtering. Using MAC filters in combination with your security settings can deter some hackers. You might think of MAC filtering as adding a deadbolt to the latch bolt on your front door.

What is a MAC Address?

As with many technical terms, MAC is an acronym. It stands for Media Access Control address. This is a 12-character address that maps to a physical component such as your broadband router, wireless access card, network card, and so on. The number is unique with the first half of the address representing the device manufacturer. For example, a MAC address starting with 00-06-25 is identified with Linksys.

Since the MAC address is unique, it can be used as a filtering mechanism to keep devices on or off your wireless network. Most 802.11 wireless networks will allow or deny access to specific MAC addresses. On my router, I enabled MAC filtering and entered the three MAC addresses that I want to connect to my network. Each of these MAC addresses belongs to a device that I use. If a device tries to connect with a MAC address that is not on that list, it will be blocked.

How to Find a MAC Address

Perhaps, the hardest part of using MAC filtering is finding the device addresses. On most Windows systems, you may find this information using the following steps:

  1. Press your Windows key + R
  2. In the Open: text box of the Run dialog, type cmd
  3. Windows Run dialog with cmd in the textbox.Pin
  4. Click OK.
  5. At the DOS prompt, type ipconfig/all
  6. Typed ipconfig/all command.Pin
  7. Press Enter.

Your computer should display a dialog similar to the one below. The line labeled “Physical Address” represents the MAC address. In some cases, you may see more than one MAC address. For example, you might see one for the built-in Ethernet card and another for a wireless network card.

Results of ipconf command and highlighted addresses.Pin

Using MAC filters in conjunction with other security settings on a wireless system is a stronger solution that will deter some from hopping onto your network. One disclaimer about MAC filtering is it isn’t foolproof which is why it shouldn’t be used as the only security measure. The reason is MAC addresses can be cloned. Sometimes people need to clone MAC addresses because of ISP configuration issues. The same mechanism that allows you to change a MAC address for your device also works for a hacker.

Another gotcha about these addresses is some operating systems allow you to randomize your MAC address. This is the case with Android 10. As a result, you’ll have to continually update your allowlist for these phones or turn off the feature.

As with most security intrusions, the harder it is for someone to break in, the less apt they are to try. Adding an extra security layer increases the time and equipment needed for a hacker to compromise your network. Since there are still many insecure wireless networks, it seems likely hackers will start there.

Related Tutorials

  • How to Check Your PC Specs
  • How to Make Symbols with Your Keyboard
  • How to View Chrome History
TwitterPinterestLinkedInRedditFacebookPocketEmail

Filed Under: Quick Tips, Security Tagged With: troubleshooting

© 2021 · Productivity Portfolio | PO BOX 117361 Burlingame, CA 94011

I use cookies to ensure that I give you the best experience on our website. If you continue to use this site I'll figure that you are happy with that. You can find more details in the privacy policy.OKNoPrivacy policy