![]() This security function is most typically associated with wireless networks where MAC address filtering is a standard configuration option. Depending on the way that configuration management is handled in the enterprise, these MAC addresses may be set following a specific standard, recorded for inventory purposes, or potentially used to determine whether or not a specific system should be allowed on the network. The MAC address can usually be modified when needed, but all NICs will have a preassigned MAC address associated with the NIC. ![]() This unique hardware address defines how the NIC is identified to ensure that the data gets to the correct system. ![]() These modules are technically NICs as well.Īs we discussed previously in this chapter, every NIC has a MAC address in the Ethernet or Token Ring topologies. In some networking hardware, such as switches used for network storage arrays, there are replaceable modules that allow for the use of different connection types. While traditionally associated with PCs, laptops, and servers, NICs can exist in almost any networked device including printers, telephones, and scanners. Jeremy Faircloth, in Enterprise Applications Administration, 2014 Network Interface CardĪn NIC is the core piece of hardware used for networking connectivity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |