What is MAC Filtering?

MAC Filtering is a network security technique in which access to a network is restricted on the basis of a device’s MAC address (Media Access Control). Each network device has a unique MAC address, and filtering determines which devices are permitted or denied access.

In OT environments, MAC Filtering is used as an extra layer of security against unauthorised devices or BYOD.


🧠 How does MAC Filtering work?

  1. Each network interface (NIC) has a fixed MAC address, e.g. 00:1A:2B:3C:4D:5E
  2. A list is configured on the switch or access point:
  • Whitelist: only permitted MAC addresses
  • Blacklist: excluded MAC addresses
  1. Traffic from unknown MAC addresses is rejected or ignored

⚙️ Characteristics of MAC Filtering

Characteristic Explanation
Low-level control Operates at Layer 2 (data link layer) of the OSI model
Access restriction Only known devices may use the network
Easy to implement Many switches and Wi-Fi access points support it natively
Not foolproof MAC addresses can be spoofed; not a substitute for 802.1X or VLANs

🏭 MAC Filtering in an OT context

Application Purpose
Industrial switches Only authorised PLCs or HMIs may communicate
Wireless access points Prevent BYOD or unauthorised laptops/tablets in the OT network
Guest network segmentation Combine with network segmentation and firewall rules
Legacy systems without 802.1X Apply minimal access control without certificate infrastructure

✅ Benefits

  • Easy to configure on smaller networks
  • Low risk of false positives with proper configuration
  • An additional barrier to unauthorised access

⚠️ Limitations and risks

Limitation Explanation
Easy to bypass An attacker can spoof the MAC address of an authorised device
Management overhead Manual addition/removal of addresses takes time
Does not scale Impractical in large, dynamic environments

MAC Filtering is not a replacement for network authentication, but rather an additional layer in a defence-in-depth model.


🔐 Best practices


📌 In summary

MAC Filtering is a basic form of network-level access control, suitable for static OT environments with fixed equipment. It does not provide complete security, but it is a useful additional layer within a defence-in-depth strategy.