Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 637

MAC Address

What is MAC Address?

MAC AddressA 48-bit hardware identifier (IEEE 802) burned into a network interface and used for delivery within a single link-layer segment.


A Media Access Control address is a 48-bit identifier defined by IEEE 802 standards, typically written as six hex octets (e.g., 00:1A:2B:3C:4D:5E). The high-order bits are an Organizationally Unique Identifier (OUI) assigned to a vendor, the low-order bits are device-specific, and two reserved bits mark whether the address is unicast/multicast and globally/locally administered. MAC addresses scope only to the local broadcast domain; routers strip and rewrite them at each hop. Switches build CAM/MAC tables from observed source MACs, which makes MAC flooding, MAC spoofing, and CAM-table overflow practical attacks. Defenses include port-security limits, sticky MACs, 802.1X, MAC randomization on clients, and dynamic ARP inspection.

Examples

  1. 01

    A switch port-security rule allows only MAC 00:1A:2B:3C:4D:5E to use the port.

  2. 02

    Modern smartphones randomize Wi-Fi MAC addresses per SSID to limit tracking.

Frequently asked questions

What is MAC Address?

A 48-bit hardware identifier (IEEE 802) burned into a network interface and used for delivery within a single link-layer segment. It belongs to the Network Security category of cybersecurity.

What does MAC Address mean?

A 48-bit hardware identifier (IEEE 802) burned into a network interface and used for delivery within a single link-layer segment.

How does MAC Address work?

A Media Access Control address is a 48-bit identifier defined by IEEE 802 standards, typically written as six hex octets (e.g., 00:1A:2B:3C:4D:5E). The high-order bits are an Organizationally Unique Identifier (OUI) assigned to a vendor, the low-order bits are device-specific, and two reserved bits mark whether the address is unicast/multicast and globally/locally administered. MAC addresses scope only to the local broadcast domain; routers strip and rewrite them at each hop. Switches build CAM/MAC tables from observed source MACs, which makes MAC flooding, MAC spoofing, and CAM-table overflow practical attacks. Defenses include port-security limits, sticky MACs, 802.1X, MAC randomization on clients, and dynamic ARP inspection.

How do you defend against MAC Address?

Defences for MAC Address typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for MAC Address?

Common alternative names include: Hardware address, Physical address.

Related terms