Join Lisa Bock for an in-depth discussion in this video Filtering SSIDs and MAC addresses, part of IT Security Foundations: Core Concepts.
- An access point is a station which functions as a connection between the client computer and an existing network. Each access point has a service set identifier, or network name. The BSSID is the MAC address of the AP. An access point will broadcast its SSID and beacons by default. So all wireless devices within its range can see the network. Disabling SSID Broadcast will make the network harder to find, and users will have to manually connect by entering the network name and security key.
When I manually connect to a network, I would have to first of all, know the network name. In addition, I would have to know the Security type and the key. This makes it harder to join a network, but can conceal your network and add a layer of protection. Every interface has a unique Media Access Control address that identifies it on a network. MAC Address Filtering will allow only registered MAC addresses to join the network. In order for me to join a network that has MAC Address Filtering, I would first have to find my MAC address.
To find the MAC address of the machine I want to allow on my network, I'll run ipconfig /all. Once I've run ipconfig on the computer, I'll look for the network interface I want to allow. I found the interface I want to allow on my network, and I'm either going to copy it or write it down and then I'll add it to the list of allowed MAC addresses on my Wi-Fi router. I've identified it right here, as you see Wireless LAN adapter.
I'm going to mark it so you can see it, and that's what I would add to my router. MAC Address Filtering will allow you to choose which devices are allowed online. For example, you have given your password to your children, and they've shared this information. MAC Address Filtering can prevent too many devices from joining the network.
Note: This course maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals 98-367 certification exam and is recommended test prep viewing.
- Differentiate between risks, threats, and vulnerabilities.
- Explain how to avoid worms and viruses.
- Define cookies, and explain how they preserve user information.
- Describe the WPA2 wireless security method.
- Cite the differences between public and private key encryption.
- Summarize how to use a virtual private network.
- Identify ways to minimize the attack surface.