Which feature is characteristic of MAC filtering in wireless networks

Which feature is characteristic of MAC filtering in wireless networks?

It allows only authorized users to detect the network.
It encrypts data that is transmitted on a wireless network.
It is configured on the computer rather than on the router.
It restricts computer access to a wireless network.

The Correct Answer and Explanation is:

Correct Answer:
It restricts computer access to a wireless network.


Explanation:

Media Access Control (MAC) filtering is a security feature used in wireless networks that helps control access to the network by specifying which devices are permitted or denied access based on their unique MAC addresses. Each device connected to a network (e.g., laptop, smartphone, tablet) has a unique MAC address, which acts like a digital fingerprint for the device’s network interface.

When MAC filtering is enabled on a wireless router or access point, the administrator can create a list of approved MAC addresses. This list acts as a filter:

  • If a device’s MAC address is on the list, the router allows it to connect to the network.
  • If the MAC address is not on the list, the device is blocked from accessing the network—even if the user knows the network name (SSID) and the correct password.

This feature is especially useful in small networks where administrators want to tightly control which devices can connect. For example, in a home or small office, an administrator might configure the router to allow only family or employee devices and block all others.

However, while MAC filtering adds a layer of security, it is not foolproof. Skilled attackers can “spoof” a MAC address—that is, change their device’s MAC address to match an allowed one. Therefore, MAC filtering should not be used as the only form of protection. It is best used in conjunction with stronger security protocols, such as WPA3 or WPA2 encryption, which protect data transmissions and require a password for access.

Summary:

  • MAC filtering restricts access to the wireless network based on device MAC addresses.
  • It is configured on the router, not the client device.
  • It does not encrypt data or hide the network.
  • It is a basic access control measure that works best when combined with other security features.
Scroll to Top