38:
1232:), a mobile wireless device may not only disclose its own MAC address when traveling, but even the MAC addresses associated to SSIDs the device has already connected to, if they are configured to send these as part of probe request packets. Alternative modes to prevent this include configuring access points to be either in beacon-broadcasting mode or probe-response with SSID mode. In these modes, probe requests may be unnecessary or sent in broadcast mode without disclosing the identity of previously known networks.
276:), the Individual Address Block could only be used to assign EUI-48 identifiers. All other potential uses based on the OUI from which the IABs are allocated are reserved and remain the property of the IEEE Registration Authority. Between 2007 and September 2012, the OUI value 00:50:C2 was used for IAB assignments. After September 2012, the value 40:D8:55 was used. The owners of an already assigned IAB may continue to use the assignment.
183:
1209:
Moreover, various flaws and shortcomings in these implementations may allow an attacker to track a device even if its MAC address is changed, for instance its probe requests' other elements, or their timing. If random MAC addresses are not used, researchers have confirmed that it is possible to link a real identity to a particular wireless MAC address.
306:(OUI). The remainder of the address (three octets for EUI-48 or five for EUI-64) are assigned by that organization in nearly any manner they please, subject to the constraint of uniqueness. A locally administered address is assigned to a device by software or a network administrator, overriding the burned-in address for physical devices.
1152:, this is practiced in exploiting security vulnerabilities of a computer system. Some modern operating systems, such as Apple iOS and Android, especially in mobile devices, are designed to randomize the assignment of a MAC address to network interface when scanning for wireless access points to avert tracking systems.
2422:
To improve end-user privacy, various operating system vendors (Apple iOS 14, Android 10 and
Windows 10) are enabling the use of the locally administered mac address (LAA), also referred to as the random mac address for WIFI operation. When wireless endpoint is associated with random mac address, the
513:; the least significant bit of the first octet of a MAC address distinguishes individual addresses from group addresses. That bit is set to 0 in individual addresses and set to 1 in group addresses. Group addresses, like individual addresses, can be universally administered or locally administered.
218:
The distinctions between EUI-48 and MAC-48 identifiers are in name and application only. MAC-48 was used to address hardware interfaces within existing 802-based networking applications; EUI-48 is now used for 802-based networking and is also used to identify other devices and software, for example
1208:
devices while scanning for networks. Other vendors followed quickly. MAC address randomization during scanning was added in
Android starting from version 6.0, Windows 10, and Linux kernel 3.18. The actual implementations of the MAC address randomization technique vary largely in different devices.
301:
Addresses can either be universally administered addresses (UAA) or locally administered addresses (LAA). A universally administered address is uniquely assigned to a device by its manufacturer. The first three octets (in transmission order) identify the organization that issued the identifier and
2484:
You can enter the MAC address in the following formats for representing MAC-48 addresses in human-readable form: six groups of two hexadecimal digits, separated by hyphens (-) in transmission order,six groups of two separated by colons (:),three groups of four hexadecimal digits separated by dots
452:
If the least significant bit of the first octet is set to 1 (i.e. the second hexadecimal digit is odd) the frame will still be sent only once; however, network interface controllers will choose to accept or ignore it based on criteria other than the matching of their individual MAC addresses: for
214:
manages allocation of MAC addresses, originally known as MAC-48 and which it now refers to as EUI-48 identifiers. The IEEE has a target lifetime of 100 years (until 2080) for applications using EUI-48 space and restricts applications accordingly. The IEEE encourages adoption of the more plentiful
267:
is still in use, but the IEEE Registration
Authority does not administer them. An OUI is concatenated with 12 additional IEEE-provided bits (for a total of 36 bits), leaving only 12 bits for the organisation owning the IAB to assign to its (up to 4096) individual devices. An IAB is ideal for
268:
organizations requiring not more than 4096 unique 48-bit numbers (EUI-48). Unlike an OUI, which allows the assignee to assign values in various different number spaces (for example, EUI-48, EUI-64, and the various context-dependent identifier number spaces, like for
291:) provides both 2 EUI-48 identifiers and 2 EUI-64 identifiers, the first 28 bits being assigned by IEEE. The first 24 bits of the assigned MA-M block are an OUI assigned to IEEE that will not be reassigned, so the MA-M does not include assignment of an OUI.
279:
The MA-S registry includes, for each registrant, both a 36-bit unique number used in some standards and a block of EUI-48 and EUI-64 identifiers (while the registrant of an IAB cannot assign an EUI-64). MA-S does not include assignment of an OUI.
1348:(FDDI) send the bytes over the wire with the most significant bit first, confusion may arise when an address in the latter scenario is represented with bits reversed from the canonical representation. For example, an address in canonical form
361:
have their own OUIs. Each new virtual machine is started with a MAC address set by assigning the last three bytes to be unique on the local network. While this is local administration of MAC addresses, it is not an LAA in the IEEE sense.
2460:
321:, which identifies how the address is administered. If the bit is 0, the address is universally administered, which is why this bit is 0 in all UAAs. If it is 1, the address is locally administered. In the example address
1837:
1140:
to specify which of the attached addresses to activate. Hence, various configuration scripts and utilities permit the randomization of the MAC address at the time of booting or before establishing a network connection.
437:) the collision domain usually is the length of the Ethernet cabling between two network interfaces. In a wireless setting, the collision domain is all receivers that can detect a given wireless signal. If a
1064:, treats MAC-48 as EUI-48 instead (as it is chosen from the same address pool) and inverts the local bit. This results in extending MAC addresses (such as IEEE 802 MAC address) to modified EUI-64 using only
231:
is now used in all cases. In addition, the EUI-64 numbering system originally encompassed both MAC-48 and EUI-48 identifiers by a simple translation mechanism. These translations have since been deprecated.
1474:
With local identifiers indicated with a zero bit, locally assigned EUI-64 begin with leading zeroes and it is easier for administrators to type locally assigned IPv6 addresses based on the modified EUI-64
1038:
Every device that connects to an IEEE 802 network (such as
Ethernet and Wi-Fi) has an EUI-48 address. Common networked consumer devices such as PCs, smartphones and tablet computers use EUI-48 addresses.
1968:
815:
IEEE standard 802c further divides the locally administered MAC address block into four quadrants. This additional partitioning is called
Structured Local Address Plan (SLAP) and its usage is optional.
369:
protocol, where the universal MAC address (OUI AA-00-04, Digital
Equipment Corporation) is administered locally. The DECnet software assigns the last three bytes for the complete MAC address to be
1034:). The G.hn Application Protocol Convergence (APC) layer accepts Ethernet frames that use the EUI-48 format and encapsulates them into G.hn Medium Access Control Service Data Units (MSDUs).
1465:. In both cases, the process could be trivially reversed when necessary. Organizations issuing EUI-64s were cautioned against issuing identifiers that could be confused with these forms.
174:, must have a unique MAC address for each network interface in the same network. However, two network interfaces connected to two different networks can share the same MAC address.
2278:
445:. Only the node with the matching hardware MAC address will (normally) accept the frame; network interfaces with non-matching MAC-addresses ignore the frame unless they are in
2472:
441:
does not know which port leads to a given MAC address, the switch will forward a unicast frame to all of its ports (except the originating port), an action known as
2276:
1060:(Modified EUI-64 as the least-significant 64 bits of a unicast network address or link-local address when stateless address autoconfiguration is used.) IPv6 uses a
1457:
and then copy the organization-specified extension identifier. To convert an EUI-48 into an EUI-64, the same process is used, but the sequence inserted is
1097:
2077:
1528:
The universal administration of LAN MAC addresses began with the Xerox
Corporation administering Block Identifiers (Block IDs) for Ethernet addresses.
546:
Given the locations of the U/L and I/G bits, they can be discerned in a single digit in common MAC address notation as shown in the following table:
145:
1630:
886:
For use in the forthcoming IEEE P802.1CQ specification, to be assigned dynamically by the Block
Address Registration and Claiming (BARC) protocol.
2536:
144:(OUI). MAC addresses are formed according to the principles of two numbering spaces based on extended unique identifiers (EUIs) managed by the
309:
Locally administered addresses are distinguished from universally administered addresses by setting (assigning the value of 1 to) the second-
2047:
17:
2277:
Martin Jeremy and
Mayberry Travis and Donahue Collin and Foppe Lucas and Brown Lamont and Riggins Chadwick and Rye Erik C and Brown Dane.
2289:
1494:
1882:
2037:
IEEE P11073-20601 Health informatics—Personal health device communication Part 20601: Application profile—Optimized
Exchange Protocol
140:
mechanism. Many network interfaces, however, support changing their MAC addresses. The address typically includes a manufacturer's
1360:
in the standard transmission order (least significant bit first). But for Token Ring networks, it would be transmitted as bits
1883:"Overview of Layer 2 Switched Networks and Communication | Getting Started with LANs | Cisco Support Community | 5896 | 68421"
2246:
1507:
1340:(Token Bus) send the bytes (octets) over the wire, left-to-right, with the least significant bit in each byte first, while
273:
1576:"Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID)"
1200:
has a system that tracks the movements of mobile devices in a city by monitoring MAC addresses. To avert this practice,
1427:
303:
141:
1813:
2336:
1858:
251:, and has no overlaps in addresses with the IAB registry product as of January 1, 2014. The IAB uses an OUI from the
2170:
1575:
986:
333:
0, where the second-least-significant bit is 1. Therefore, it is a locally administered address. Even though many
1917:
1307:
The standard notation, also called canonical format, for MAC addresses is written in transmission order with the
2546:
2435:
2104:
485:
2387:
2596:
31:
2576:
942:
Reserved for future use, but may be used similarly to AAI until an IEEE specification utilizes this space.
414:
70:
1113:
on that segment and allows frames to be marked for specific hosts. It thus forms the basis of most of the
2606:
2601:
1401:
1172:
1164:
390:
116:
MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the
1634:
495:
are received by all stations on a LAN that have been configured to receive packets sent to that address.
2312:
992:
269:
2413:
2225:
Vanhoef, Mathy; Matte, CĂ©lestin; Cunche, Mathieu; Cardoso, Leonardo; Piessens, Frank (10 June 2016).
1241:
1197:
1027:
236:
2051:
2227:"Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms"
1283:). Other conventions include six groups of two hexadecimal digits separated by colons (:) (e.g.
2320:
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
1145:
1109:
On broadcast networks, such as Ethernet, the MAC address is expected to uniquely identify each
461:
2400:
1502:. The Institute of Electrical and Electronics Engineers, Inc. (IEEE). 2002-02-07. p. 19.
1212:
Randomized MAC addresses can be identified by the "locally administered" bit described above.
522:
501:
identify one or more Token Ring NICs that provide a particular service, defined in IEEE 802.5.
1513:
1221:
1121:) networking upon which upper-layer protocols rely to produce complex, functioning networks.
310:
203:
102:
2514:
2009:
1939:
1761:
1422:
1057:
1005:
453:
example, based on a configurable list of accepted multicast MAC addresses. This is called
8:
1416:
2342:
2252:
1713:
1411:
1031:
1023:
410:
167:
2313:
Matte CĂ©lestin and Cunche Mathieu and Rousseau Franck and Vanhoef Mathy (2016-07-18).
2231:
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
2155:
1308:
194:
addressing and the b1 bit distinguishes universal and locally administered addressing.
2332:
2318:
2242:
1931:
1913:
IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters
1503:
1447:
1156:
1110:
492:
469:
393:
since the MAC address for any DECnet host can be determined from its DECnet address.
210:
address space contains potentially 2 (over 281 trillion) possible MAC addresses. The
171:
66:
2256:
37:
2504:
2379:
2346:
2324:
2234:
1999:
1921:
1751:
1255:) format for printing EUI-48 addresses in human-friendly form is six groups of two
1229:
446:
422:
207:
133:
2581:
1859:"Guidelines for Fibre Channel Use of the Organizationally Unique Identifier (OUI)"
1364:
in most-significant-bit first order. The latter might be incorrectly displayed as
2561:
2198:
1009:
106:
78:
74:
2517:
2498:
2129:
2025:
2021:
2012:
1993:
1955:
1951:
1942:
1911:
1797:
1793:
1789:
1785:
1781:
1777:
1773:
1764:
1745:
1540:
860:
Assigned by IEEE, but uses a unique 3-octet company ID (CID) instead of an OUI.
109:. As typically represented, MAC addresses are recognizable as six groups of two
2556:
1193:
438:
427:
350:
2383:
2590:
2566:
2551:
1969:"Local MAC Addresses in the Overview and Architecture based on IEEE Std 802c"
1935:
1741:
1406:
1176:
1001:
442:
2328:
2238:
401:
The least significant bit of an address's first octet is referred to as the
2541:
1684:
1658:
1604:
1291:), and three groups of four hexadecimal digits separated by dots (.) (e.g.
1149:
996:
460:
The IEEE has built in several special address types to allow more than one
433:
163:
2279:"A study of MAC address randomization in mobile devices and when it fails"
1022:
standard, which provides a way to create a high-speed (up to 1 gigabit/s)
341:, often it is useful to create an entire unique MAC within the LAA range.
1256:
1087:
963:
473:
472:, all one bits, are received by all stations on a local area network. In
110:
526:
1345:
1341:
1337:
1333:
1201:
1160:
1114:
1052:
979:
334:
329:
the first octet is 06 (hexadecimal), the binary form of which is 000001
313:
of the first octet of the address. This bit is also referred to as the
2368:"I know your MAC Address: Targeted tracking of individual using Wi-Fi"
1132:
may be used to remove and add link address aliases. For instance, the
338:
2509:
2004:
1926:
1756:
1419:, which may spoof another device's MAC address during certain periods
1046:
973:
953:
The following network technologies use the EUI-48 identifier format:
516:
454:
220:
187:
98:
94:
2367:
2314:
2226:
1124:
Many network interfaces support changing their MAC address. On most
344:
132:. Each address can be stored in the interface hardware, such as its
2571:
1325:
1319:
1313:
1252:
1159:(IP) networks, the MAC address of an interface corresponding to an
1129:
199:
137:
86:
82:
2078:"Apple Implements Random MAC Address on iOS 8. Goodbye, Marketers"
1446:
To convert a MAC-48 into an EUI-64, copy the OUI, append the two
1118:
1091:
418:
191:
182:
529:
uses locally administered, multicast MAC addresses in the range
186:
The structure of a 48-bit MAC address. The b0 bit distinguishes
1137:
1083:
366:
521:
The U/L and I/G bits are handled independently, and there are
113:
digits, separated by hyphens, colons, or without a separator.
2468:
1016:
967:
389:
of the host. This eliminates the need for DECnet to have an
239:(IAB) is an inactive registry which has been replaced by the
90:
2315:"Defeating MAC address randomization through timing attacks"
1991:
2500:
A Caution On The Canonical Ordering Of Link-Layer Addresses
2200:
Wi-Fi Tracking: Fingerprinting Attacks and Counter-Measures
1689:
1663:
1609:
1225:
1168:
1125:
1019:
550:
Universal/local and individual/group bits in MAC addresses
354:
211:
50:
42:
2428:
2224:
1205:
421:. A unicast frame is transmitted to all nodes within the
358:
46:
2542:
IEEE Registration Authority - Frequently Asked Questions
995:(ATM), switched virtual connections only, as part of an
2171:"iwlwifi: mvm: support random MAC address for scanning"
1961:
1909:
2547:
IEEE Public OUI and Company ID, etc. Assignment lookup
1708:
1706:
1362:
00010010 00110100 01010110 01111000 10011010 10111100
1358:
01001000 00101100 01101010 00011110 01011001 00111101
365:
A historical example of this hybrid situation is the
2572:
IEEE IAB and OUI MAC Address Lookup Database and API
1311:
transmitted first, and is used in the output of the
1275:). This form is also commonly used for EUI-64 (e.g.
912:
Can be randomly or arbitrarily assigned to devices.
810:
488:
and is forwarded to and accepted by all other nodes.
2372:
Journal of Computer Virology and Hacking Techniques
1992:S. Thomson; T. Narten; T. Jinmei (September 2007).
1739:
2496:
2359:
1714:"Ethernet frame IG/LG bit explanation - Wireshark"
1703:
517:Ranges of group and locally administered addresses
396:
345:Universal addresses that are administered locally
146:Institute of Electrical and Electronics Engineers
2588:
2192:
2190:
1814:"Standard Group MAC Addresses: A Tutorial Guide"
1808:
1806:
296:
99:Open Systems Interconnection (OSI) network model
27:Unique identifier assigned to network interfaces
820:SLAP quadrants for unicast local MAC addresses
2423:MAC address of the endpoint changes over time.
2196:
2127:
1570:
1568:
1566:
1564:
1562:
1560:
2187:
2168:
1803:
2465:Configuration Guide for Cisco Secure ACS 4.2
2071:
2069:
1215:
1100:(IEEE 11073-20601 compliant medical devices)
2099:
2097:
1557:
1356:would be transmitted over the wire as bits
1910:D. Eastlake III; J. Abley (October 2013).
1905:
1903:
1735:
1733:
1487:
1204:has started using random MAC addresses in
166:with multiple network interfaces, such as
2508:
2066:
2003:
1925:
1755:
1246:
2094:
2040:
1995:IPv6 Stateless Address Autoconfiguration
1302:
181:
36:
2490:
2461:"Agentless Host Configuration Scenario"
2153:
1985:
1900:
1730:
1685:"IEEE-SA - IEEE Registration Authority"
1659:"IEEE-SA - IEEE Registration Authority"
1605:"IEEE-SA - IEEE Registration Authority"
1144:Changing MAC addresses is necessary in
425:. In a modern wired setting (i.e. with
14:
2589:
2497:T. Narten; C. Burton (December 1998).
2365:
2075:
417:. This type of transmission is called
409:, bit. When this bit is 0 (zero), the
215:EUI-64 for non-Ethernet applications.
202:MAC address originally comes from the
2537:IEEE Registration Authority Tutorials
2411:
1838:"Generating a New Unique MAC Address"
1623:
413:is meant to reach only one receiving
1747:IP Version 6 Addressing Architecture
1718:networkengineering.stackexchange.com
1653:
1651:
385:reflects the DECnet network address
2414:"Randomized and Changing MAC (RCM)"
2156:"Wireless networking in Windows 10"
1128:-like systems, the command utility
85:networking technologies, including
24:
2130:"The Most Wanted Man in the World"
1428:Virtual Router Redundancy Protocol
1309:least significant bit of each byte
1179:addresses with layer 2 addresses.
1136:ifconfig directive may be used on
1080:) and with the local bit inverted.
304:organizationally unique identifier
259:) registry, previously called the
177:
152:—which replaces the obsolete term
142:organizationally unique identifier
25:
2618:
2530:
1648:
1104:
811:IEEE 802c local MAC address usage
206:Ethernet addressing scheme. This
2197:CĂ©lestin Matte (December 2017).
1631:"MAC Address Block Small (MA-S)"
1299:); again in transmission order.
1235:
1187:
1042:EUI-64 identifiers are used in:
987:Fiber Distributed Data Interface
101:, MAC addresses are used in the
2471:. February 2008. Archived from
2453:
2405:
2390:from the original on 2016-03-04
2306:
2270:
2218:
2162:
2147:
2121:
2031:
1918:Internet Engineering Task Force
1875:
1851:
1830:
1541:"Use of EUI-64 for New Designs"
1468:
1094:wireless personal-area networks
948:
476:the broadcast address would be
397:Unicast vs. multicast (I/G bit)
2412:Nayak, Seema (14 March 2022).
1677:
1597:
1533:
1440:
1267:) in transmission order (e.g.
1259:digits, separated by hyphens (
337:manage dynamic MAC addresses
45:router with MAC addresses for
13:
1:
2577:IANA list of Ethernet Numbers
2128:Bamford, James (2014-08-13).
1481:
1175:(NDP) for IPv6, relating OSI
464:to be addressed at one time:
297:Universal vs. local (U/L bit)
81:. This use is common in most
63:medium access control address
32:Mac Address (YouTube channel)
2562:IEEE Public OUI-36/MA-S list
2557:IEEE Public OUI-28/MA-M list
2207:(Theses). Université de Lyon
2076:Mamiit, Aaron (2014-06-12).
1026:using existing home wiring (
71:network interface controller
18:Locally administered address
7:
2582:Wireshark's OUI Lookup Tool
2436:"Hidden network no beacons"
1402:Hot Standby Router Protocol
1395:
1182:
1173:Neighbor Discovery Protocol
1165:Address Resolution Protocol
525:of all four possibilities.
391:address resolution protocol
77:in communications within a
10:
2623:
2440:security.stackexchange.com
2028:.
1958:.
1800:.
1583:IEEE Standards Association
1239:
993:Asynchronous Transfer Mode
906:Administratively assigned
505:These are all examples of
29:
2552:IEEE Public OUI/MA-L list
2503:. Network Working Group.
2384:10.1007/s11416-013-0196-1
2175:Linux commit effd05ac479b
2048:"ifconfig(8) manual page"
1998:. Network Working Group.
1750:. Network Working Group.
1372:. This is referred to as
1242:MAC address anonymization
1216:Other information leakage
563:Universally administered
289:MAC address block, medium
227:to be an obsolete term.
223:. The IEEE now considers
122:Ethernet hardware address
105:protocol sublayer of the
2366:Cunche, Mathieu (2014).
1433:
1198:National Security Agency
1163:may be queried with the
257:MAC address block, large
245:MAC address block, small
237:Individual Address Block
30:Not to be confused with
2329:10.1145/2939918.2939930
2239:10.1145/2897845.2897883
1887:supportforums.cisco.com
1329:commands, for example.
1279:01-23-45-67-89-AB-CD-EF
484:. A broadcast frame is
2024:. Updated by RFC
1776:. Updated by RFC
1247:Notational conventions
1222:wireless access points
1146:network virtualization
543:(with both bits set).
462:network interface card
353:, hypervisors such as
195:
54:
2105:"Android 6.0 Changes"
1948:Best Common Practice.
1303:Bit-reversed notation
571:Unicast (individual)
566:Locally administered
311:least-significant bit
204:Xerox Network Systems
185:
103:medium access control
40:
2597:Media access control
2567:IEEE Public IAB list
2233:. pp. 413–424.
1423:Transparent bridging
1006:Serial Attached SCSI
511:individual addresses
499:Functional addresses
468:Packets sent to the
339:within their own OUI
247:), previously named
2169:Emmanuel Grumbach.
2020:Obsoletes RFC
1954:. Updates RFC
1950:Obsoletes RFC
1772:Obsoletes RFC
1417:Sleep Proxy Service
966:wireless networks (
821:
551:
263:registry. The term
172:multilayer switches
73:(NIC) for use as a
2607:Unique identifiers
2602:Network addressing
2323:. pp. 15–20.
2109:Android developers
2054:on 14 January 2020
1412:Network management
1378:non-canonical form
1374:bit-reversed order
1030:, phone lines and
1024:local area network
957:IEEE 802 networks
880:Standard assigned
819:
690:Multicast (group)
549:
491:Packets sent to a
283:Additionally, the
196:
55:
2248:978-1-4503-4233-9
1744:(February 2006).
1519:on April 29, 2003
1509:978-0-7381-2941-9
1496:IEEE Std 802-2001
1390:Token Ring format
1368:48-2C-6A-1E-59-3D
1352:12-34-56-78-9A-BC
1344:(Token Ring) and
1287:01:23:45:67:89:AB
1271:01-23-45-67-89-AB
1157:Internet Protocol
946:
945:
808:
807:
493:multicast address
480:FF:FF:FF:FF:FF:FF
470:broadcast address
415:network interface
373:AA-00-04-00-XX-YY
325:06-00-00-00-00-00
302:are known as the
118:burned-in address
67:unique identifier
16:(Redirected from
2614:
2525:
2521:
2512:
2510:10.17487/RFC2469
2494:
2488:
2487:
2481:
2480:
2457:
2451:
2450:
2448:
2446:
2432:
2426:
2425:
2409:
2403:
2399:
2397:
2395:
2363:
2357:
2356:
2354:
2353:
2310:
2304:
2303:
2301:
2300:
2294:
2288:. Archived from
2283:
2274:
2268:
2267:
2265:
2263:
2222:
2216:
2215:
2213:
2212:
2194:
2185:
2184:
2182:
2181:
2166:
2160:
2159:
2151:
2145:
2144:
2142:
2141:
2125:
2119:
2118:
2116:
2115:
2101:
2092:
2091:
2089:
2088:
2073:
2064:
2063:
2061:
2059:
2050:. Archived from
2044:
2038:
2035:
2029:
2016:
2007:
2005:10.17487/RFC4862
1989:
1983:
1982:
1980:
1979:
1973:
1965:
1959:
1946:
1929:
1927:10.17487/RFC7042
1907:
1898:
1897:
1895:
1894:
1879:
1873:
1872:
1870:
1869:
1863:
1855:
1849:
1848:
1846:
1845:
1834:
1828:
1827:
1825:
1824:
1818:
1810:
1801:
1768:
1759:
1757:10.17487/RFC4291
1737:
1728:
1727:
1725:
1724:
1710:
1701:
1700:
1698:
1697:
1681:
1675:
1674:
1672:
1671:
1655:
1646:
1645:
1643:
1642:
1633:. Archived from
1627:
1621:
1620:
1618:
1617:
1601:
1595:
1594:
1592:
1590:
1580:
1572:
1555:
1554:
1552:
1551:
1537:
1531:
1530:
1525:
1524:
1518:
1512:. Archived from
1501:
1491:
1475:
1472:
1466:
1464:
1463:
1456:
1455:
1444:
1371:
1370:
1363:
1359:
1355:
1354:
1328:
1322:
1316:
1298:
1297:
1290:
1289:
1282:
1281:
1274:
1273:
1266:
1265:
1230:network cloaking
1098:IEEE 11073-20601
1079:
1078:
1071:
1070:
929:
928:
903:
902:
877:
876:
851:
850:
822:
818:
804:
803:
790:
789:
776:
775:
762:
761:
747:
746:
733:
732:
719:
718:
705:
704:
685:
684:
671:
670:
657:
656:
643:
642:
628:
627:
614:
613:
600:
599:
586:
585:
552:
548:
542:
541:
509:, as opposed to
483:
482:
447:promiscuous mode
423:collision domain
407:Individual/Group
384:
383:
376:
375:
328:
327:
134:read-only memory
130:physical address
126:hardware address
21:
2622:
2621:
2617:
2616:
2615:
2613:
2612:
2611:
2587:
2586:
2533:
2528:
2495:
2491:
2478:
2476:
2459:
2458:
2454:
2444:
2442:
2434:
2433:
2429:
2410:
2406:
2393:
2391:
2364:
2360:
2351:
2349:
2339:
2311:
2307:
2298:
2296:
2292:
2281:
2275:
2271:
2261:
2259:
2249:
2223:
2219:
2210:
2208:
2195:
2188:
2179:
2177:
2167:
2163:
2152:
2148:
2139:
2137:
2126:
2122:
2113:
2111:
2103:
2102:
2095:
2086:
2084:
2074:
2067:
2057:
2055:
2046:
2045:
2041:
2036:
2032:
2018:Draft Standard.
1990:
1986:
1977:
1975:
1971:
1967:
1966:
1962:
1938:. BCP 141.
1908:
1901:
1892:
1890:
1881:
1880:
1876:
1867:
1865:
1861:
1857:
1856:
1852:
1843:
1841:
1836:
1835:
1831:
1822:
1820:
1816:
1812:
1811:
1804:
1770:Draft Standard.
1738:
1731:
1722:
1720:
1712:
1711:
1704:
1695:
1693:
1683:
1682:
1678:
1669:
1667:
1657:
1656:
1649:
1640:
1638:
1629:
1628:
1624:
1615:
1613:
1603:
1602:
1598:
1588:
1586:
1578:
1574:
1573:
1558:
1549:
1547:
1545:www.ieee802.org
1539:
1538:
1534:
1522:
1520:
1516:
1510:
1499:
1493:
1492:
1488:
1484:
1479:
1478:
1473:
1469:
1459:
1458:
1451:
1450:
1445:
1441:
1436:
1398:
1366:
1365:
1361:
1357:
1350:
1349:
1336:(Ethernet) and
1332:However, since
1324:
1318:
1312:
1305:
1293:
1292:
1285:
1284:
1277:
1276:
1269:
1268:
1261:
1260:
1249:
1244:
1238:
1218:
1190:
1185:
1107:
1074:
1073:
1066:
1065:
1062:modified EUI-64
1010:World Wide Name
951:
926:-XX-XX-XX-XX-XX
918:
917:
900:-XX-XX-XX-XX-XX
892:
891:
874:-XX-XX-XX-XX-XX
866:
865:
854:Extended local
848:-XX-XX-XX-XX-XX
840:
839:
813:
801:-XX-XX-XX-XX-XX
793:
792:
791:
787:-XX-XX-XX-XX-XX
779:
778:
777:
773:-XX-XX-XX-XX-XX
765:
764:
763:
759:-XX-XX-XX-XX-XX
751:
750:
744:-XX-XX-XX-XX-XX
736:
735:
734:
730:-XX-XX-XX-XX-XX
722:
721:
720:
716:-XX-XX-XX-XX-XX
708:
707:
706:
702:-XX-XX-XX-XX-XX
694:
693:
682:-XX-XX-XX-XX-XX
674:
673:
672:
668:-XX-XX-XX-XX-XX
660:
659:
658:
654:-XX-XX-XX-XX-XX
646:
645:
644:
640:-XX-XX-XX-XX-XX
632:
631:
625:-XX-XX-XX-XX-XX
617:
616:
615:
611:-XX-XX-XX-XX-XX
603:
602:
601:
597:-XX-XX-XX-XX-XX
589:
588:
587:
583:-XX-XX-XX-XX-XX
575:
574:
560:
557:
539:-33-XX-XX-XX-XX
531:
530:
519:
507:group addresses
478:
477:
399:
379:
378:
371:
370:
347:
323:
322:
319:Universal/Local
317:bit, short for
299:
180:
178:Address details
107:data link layer
79:network segment
75:network address
35:
28:
23:
22:
15:
12:
11:
5:
2620:
2610:
2609:
2604:
2599:
2585:
2584:
2579:
2574:
2569:
2564:
2559:
2554:
2549:
2544:
2539:
2532:
2531:External links
2529:
2527:
2526:
2523:Informational.
2489:
2452:
2427:
2404:
2378:(4): 219–227.
2358:
2337:
2305:
2269:
2247:
2217:
2186:
2161:
2146:
2120:
2093:
2065:
2039:
2030:
1984:
1960:
1899:
1874:
1850:
1829:
1802:
1729:
1702:
1676:
1647:
1622:
1596:
1556:
1532:
1508:
1485:
1483:
1480:
1477:
1476:
1467:
1438:
1437:
1435:
1432:
1431:
1430:
1425:
1420:
1414:
1409:
1404:
1397:
1394:
1304:
1301:
1295:0123.4567.89AB
1251:The standard (
1248:
1245:
1240:Main article:
1237:
1234:
1228:-hidden mode (
1217:
1214:
1194:Edward Snowden
1189:
1186:
1184:
1181:
1106:
1105:Usage in hosts
1103:
1102:
1101:
1095:
1081:
1055:
1050:
1036:
1035:
1032:coaxial cables
1013:
1008:(as part of a
999:
990:
984:
983:
982:
976:
971:
961:
950:
947:
944:
943:
940:
935:
930:
914:
913:
910:
907:
904:
888:
887:
884:
881:
878:
862:
861:
858:
855:
852:
836:
835:
832:
829:
828:Quadrant name
826:
812:
809:
806:
805:
748:
691:
687:
686:
629:
572:
568:
567:
564:
561:
558:
555:
527:IPv6 multicast
518:
515:
503:
502:
496:
489:
398:
395:
351:virtualisation
346:
343:
298:
295:
179:
176:
69:assigned to a
26:
9:
6:
4:
3:
2:
2619:
2608:
2605:
2603:
2600:
2598:
2595:
2594:
2592:
2583:
2580:
2578:
2575:
2573:
2570:
2568:
2565:
2563:
2560:
2558:
2555:
2553:
2550:
2548:
2545:
2543:
2540:
2538:
2535:
2534:
2524:
2519:
2516:
2511:
2506:
2502:
2501:
2493:
2486:
2475:on 2016-08-02
2474:
2470:
2466:
2462:
2456:
2441:
2437:
2431:
2424:
2419:
2415:
2408:
2402:
2389:
2385:
2381:
2377:
2373:
2369:
2362:
2348:
2344:
2340:
2338:9781450342704
2334:
2330:
2326:
2322:
2321:
2316:
2309:
2295:on 2018-08-22
2291:
2287:
2280:
2273:
2258:
2254:
2250:
2244:
2240:
2236:
2232:
2228:
2221:
2206:
2202:
2201:
2193:
2191:
2176:
2172:
2165:
2157:
2154:Winkey Wang.
2150:
2135:
2131:
2124:
2110:
2106:
2100:
2098:
2083:
2079:
2072:
2070:
2053:
2049:
2043:
2034:
2027:
2023:
2019:
2014:
2011:
2006:
2001:
1997:
1996:
1988:
1970:
1964:
1957:
1953:
1949:
1944:
1941:
1937:
1933:
1928:
1923:
1919:
1915:
1914:
1906:
1904:
1888:
1884:
1878:
1860:
1854:
1839:
1833:
1815:
1809:
1807:
1799:
1795:
1791:
1787:
1783:
1779:
1775:
1771:
1766:
1763:
1758:
1753:
1749:
1748:
1743:
1736:
1734:
1719:
1715:
1709:
1707:
1692:
1691:
1686:
1680:
1666:
1665:
1660:
1654:
1652:
1637:on 2021-04-18
1636:
1632:
1626:
1612:
1611:
1606:
1600:
1584:
1577:
1571:
1569:
1567:
1565:
1563:
1561:
1546:
1542:
1536:
1529:
1515:
1511:
1505:
1498:
1497:
1490:
1486:
1471:
1462:
1454:
1449:
1443:
1439:
1429:
1426:
1424:
1421:
1418:
1415:
1413:
1410:
1408:
1407:MAC filtering
1405:
1403:
1400:
1399:
1393:
1391:
1387:
1383:
1379:
1375:
1369:
1353:
1347:
1343:
1339:
1335:
1330:
1327:
1321:
1315:
1310:
1300:
1296:
1288:
1280:
1272:
1264:
1258:
1254:
1243:
1236:Anonymization
1233:
1231:
1227:
1223:
1213:
1210:
1207:
1203:
1199:
1195:
1192:According to
1188:Randomization
1180:
1178:
1174:
1170:
1166:
1162:
1158:
1153:
1151:
1147:
1142:
1139:
1135:
1131:
1127:
1122:
1120:
1116:
1112:
1099:
1096:
1093:
1089:
1085:
1082:
1077:
1069:
1063:
1059:
1056:
1054:
1051:
1048:
1045:
1044:
1043:
1040:
1033:
1029:
1025:
1021:
1018:
1014:
1011:
1007:
1003:
1002:Fibre Channel
1000:
998:
994:
991:
988:
985:
981:
977:
975:
972:
969:
965:
962:
959:
958:
956:
955:
954:
941:
939:
936:
934:
931:
927:
925:
924:
916:
915:
911:
908:
905:
901:
899:
898:
890:
889:
885:
882:
879:
875:
873:
872:
864:
863:
859:
856:
853:
849:
847:
846:
838:
837:
833:
830:
827:
824:
823:
817:
802:
800:
799:
788:
786:
785:
774:
772:
771:
760:
758:
757:
749:
745:
743:
742:
731:
729:
728:
717:
715:
714:
703:
701:
700:
692:
689:
688:
683:
681:
680:
669:
667:
666:
655:
653:
652:
641:
639:
638:
630:
626:
624:
623:
612:
610:
609:
598:
596:
595:
584:
582:
581:
573:
570:
569:
565:
562:
554:
553:
547:
544:
540:
538:
537:
528:
524:
514:
512:
508:
500:
497:
494:
490:
487:
481:
475:
471:
467:
466:
465:
463:
458:
456:
450:
448:
444:
443:unicast flood
440:
436:
435:
431:, not simple
430:
429:
424:
420:
416:
412:
408:
404:
394:
392:
388:
382:
374:
368:
363:
360:
356:
352:
342:
340:
336:
332:
326:
320:
316:
312:
307:
305:
294:
292:
290:
286:
281:
277:
275:
271:
266:
262:
258:
254:
250:
246:
242:
238:
233:
230:
226:
222:
216:
213:
209:
205:
201:
193:
189:
184:
175:
173:
169:
165:
164:Network nodes
161:
159:
155:
151:
147:
143:
139:
135:
131:
127:
123:
119:
114:
112:
108:
104:
100:
97:. Within the
96:
92:
88:
84:
80:
76:
72:
68:
64:
60:
52:
48:
44:
39:
33:
19:
2522:
2499:
2492:
2483:
2477:. Retrieved
2473:the original
2464:
2455:
2443:. Retrieved
2439:
2430:
2421:
2417:
2407:
2392:. Retrieved
2375:
2371:
2361:
2350:. Retrieved
2319:
2308:
2297:. Retrieved
2290:the original
2285:
2272:
2260:. Retrieved
2230:
2220:
2209:. Retrieved
2204:
2199:
2178:. Retrieved
2174:
2164:
2149:
2138:. Retrieved
2133:
2123:
2112:. Retrieved
2108:
2085:. Retrieved
2081:
2056:. Retrieved
2052:the original
2042:
2033:
2017:
1994:
1987:
1976:. Retrieved
1963:
1947:
1912:
1891:. Retrieved
1889:. 2011-07-23
1886:
1877:
1866:. Retrieved
1853:
1842:. Retrieved
1832:
1821:. Retrieved
1769:
1746:
1721:. Retrieved
1717:
1694:. Retrieved
1688:
1679:
1668:. Retrieved
1662:
1639:. Retrieved
1635:the original
1625:
1614:. Retrieved
1608:
1599:
1587:. Retrieved
1582:
1548:. Retrieved
1544:
1535:
1527:
1521:. Retrieved
1514:the original
1495:
1489:
1470:
1460:
1452:
1442:
1389:
1385:
1381:
1377:
1373:
1367:
1351:
1331:
1306:
1294:
1286:
1278:
1270:
1262:
1250:
1219:
1211:
1191:
1154:
1150:MAC spoofing
1143:
1133:
1123:
1108:
1075:
1067:
1061:
1041:
1037:
997:NSAP address
952:
949:Applications
937:
932:
922:
921:
919:
896:
895:
893:
870:
869:
867:
844:
843:
841:
825:MAC address
814:
797:
796:
794:
783:
782:
780:
769:
768:
766:
755:
754:
752:
740:
739:
737:
726:
725:
723:
712:
711:
709:
698:
697:
695:
678:
677:
675:
664:
663:
661:
650:
649:
647:
636:
635:
633:
621:
620:
618:
607:
606:
604:
593:
592:
590:
579:
578:
576:
545:
535:
534:
532:
520:
510:
506:
504:
498:
479:
459:
457:addressing.
451:
432:
426:
406:
402:
400:
386:
380:
372:
364:
348:
330:
324:
318:
314:
308:
300:
293:
288:
284:
282:
278:
264:
260:
256:
252:
248:
244:
240:
234:
228:
224:
217:
197:
162:
157:
153:
149:
129:
125:
121:
117:
115:
62:
58:
56:
2418:Cisco Blogs
2394:19 December
2136:. p. 4
1740:R. Hinden;
1257:hexadecimal
1072:(and never
1028:power lines
978:IEEE 802.5
831:Identifier
474:hexadecimal
335:hypervisors
120:, or as an
111:hexadecimal
61:(short for
59:MAC address
41:Label of a
2591:Categories
2479:2015-09-19
2445:16 October
2352:2018-08-22
2299:2018-08-22
2211:2018-08-22
2180:2018-08-22
2140:2014-12-01
2114:2018-08-22
2087:2014-12-01
2082:Tech Times
2058:16 October
1978:2023-10-04
1893:2016-05-17
1868:2018-10-11
1844:2020-06-15
1823:2018-09-20
1742:S. Deering
1723:2021-01-05
1696:2018-09-20
1670:2018-11-27
1641:2019-02-24
1616:2018-09-20
1550:2024-07-07
1523:2011-09-08
1482:References
1386:IBM format
1382:MSB format
1346:IEEE 802.6
1342:IEEE 802.5
1338:IEEE 802.4
1334:IEEE 802.3
1320:ip address
1167:(ARP) for
1161:IP address
1115:link layer
1053:InfiniBand
1049:(FireWire)
980:Token Ring
136:, or by a
1974:. IEEE-SA
1936:2070-1721
1864:. IEEE-SA
1819:. IEEE-SA
1196:, the US
1047:IEEE 1394
974:Bluetooth
523:instances
455:multicast
221:Bluetooth
188:multicast
95:Bluetooth
2388:Archived
2257:12706713
1920:(IETF).
1840:. RedHat
1589:5 August
1396:See also
1326:ipconfig
1314:ifconfig
1253:IEEE 802
1183:Tracking
1171:and the
1130:ifconfig
1088:802.15.4
960:Ethernet
938:Reserved
933:Reserved
428:switches
200:IEEE 802
148:(IEEE):
138:firmware
87:Ethernet
83:IEEE 802
2401:Alt URL
2347:2625583
1177:layer 3
1119:layer 2
1092:6LoWPAN
486:flooded
419:unicast
192:unicast
168:routers
65:) is a
53:modules
2485:(.)...
2345:
2335:
2255:
2245:
1934:
1585:. IEEE
1506:
1448:octets
1323:, and
1220:Using
1138:NetBSD
1134:active
1084:Zigbee
989:(FDDI)
964:802.11
834:Usage
439:switch
377:where
367:DECnet
249:OUI-36
229:EUI-48
225:MAC-48
208:48-bit
158:EUI-64
154:MAC-48
150:EUI-48
93:, and
2469:Cisco
2343:S2CID
2293:(PDF)
2282:(PDF)
2262:3 May
2253:S2CID
2134:Wired
1972:(PDF)
1862:(PDF)
1817:(PDF)
1579:(PDF)
1517:(PDF)
1500:(PDF)
1461:FF-FE
1453:FF-FF
1434:Notes
1388:, or
1202:Apple
1148:. In
1117:(OSI
1076:FF-FF
1068:FF-FE
1017:ITU-T
968:Wi-Fi
411:frame
405:, or
387:xx.yy
381:XX-YY
156:—and
128:, or
91:Wi-Fi
2518:2469
2447:2016
2396:2014
2333:ISBN
2286:2017
2264:2022
2243:ISBN
2205:2017
2060:2016
2026:7527
2022:2462
2013:4862
1956:2153
1952:5342
1943:7042
1932:ISSN
1798:8064
1796:and
1794:7371
1790:7346
1786:7136
1782:6052
1778:5952
1774:3513
1765:4291
1690:IEEE
1664:IEEE
1610:IEEE
1591:2018
1504:ISBN
1226:SSID
1169:IPv4
1126:Unix
1111:node
1058:IPv6
1020:G.hn
1015:The
1004:and
909:AAI
883:SAI
857:ELI
434:hubs
357:and
355:QEMU
285:MA-M
274:EDID
270:SNAP
253:MA-L
241:MA-S
235:The
212:IEEE
198:The
190:and
170:and
51:WLAN
49:and
43:UMTS
2515:RFC
2505:doi
2380:doi
2325:doi
2235:doi
2010:RFC
2000:doi
1940:RFC
1922:doi
1762:RFC
1752:doi
1224:in
1206:iOS
1155:In
559:I/G
556:U/L
403:I/G
359:Xen
349:In
315:U/L
272:or
265:OUI
261:OUI
47:LAN
2593::
2513:.
2482:.
2467:.
2463:.
2438:.
2420:.
2416:.
2386:.
2376:10
2374:.
2370:.
2341:.
2331:.
2317:.
2284:.
2251:.
2241:.
2229:.
2203:.
2189:^
2173:.
2132:.
2107:.
2096:^
2080:.
2068:^
2008:.
1930:.
1916:.
1902:^
1885:.
1805:^
1792:,
1788:,
1784:,
1780:,
1760:.
1732:^
1716:.
1705:^
1687:.
1661:.
1650:^
1607:.
1581:.
1559:^
1543:.
1526:.
1392:.
1384:,
1380:,
1376:,
1317:,
1090:/
1086:/
449:.
160:.
124:,
89:,
57:A
2520:.
2507::
2449:.
2398:.
2382::
2355:.
2327::
2302:.
2266:.
2237::
2214:.
2183:.
2158:.
2143:.
2117:.
2090:.
2062:.
2015:.
2002::
1981:.
1945:.
1924::
1896:.
1871:.
1847:.
1826:.
1767:.
1754::
1726:.
1699:.
1673:.
1644:.
1619:.
1593:.
1553:.
1263:-
1012:)
970:)
923:6
920:X
897:2
894:X
871:E
868:X
845:A
842:X
798:F
795:X
784:B
781:X
770:7
767:X
756:3
753:X
741:D
738:X
727:9
724:X
713:5
710:X
699:1
696:X
679:E
676:X
665:A
662:X
651:6
648:X
637:2
634:X
622:C
619:X
608:8
605:X
594:4
591:X
580:0
577:X
536:3
533:3
331:1
287:(
255:(
243:(
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.