answersLogoWhite

0


Best Answer

MAC filtering

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is used to control access to a network based on the address hard coded into the NIC?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What major company designed Network Access Protection?

A policy based management is used to simplify the management by establishing policies. Network Access Protection or NAP is a policy based management of Windows server 2008. This allows a Network Administer to control the access to network resources.


You are designing network access control so that remote users are limited to accessing the network during normal business hours only. Policies regarding user access apply to all users.?

Rule-based Access Control


What is used to control access to a broadcasted wireless network based on a user supplied key?

WEP


What is commonly used to restrict access to a network based on the physical hardware address of the clients network device?

You can enable MAC address (also know as Physical Address) filtering. MAC address filtering has two modes: 1. Allow access to listed MAC addresses 2. Deny access to listed MAC addresses.


How do extended access control list differ from standard access control list?

Standard Access Control Lists (ACLs) only allows you to permit or deny source addresses. You can not block based on protocol, port, or destination. Extended ACLS allow you to block traffic based on source address, destination address, source port, destination port, and protocol.


How do you access different PS stores?

You can only use the Playstation Store for your area based on your home address in the Playstation Network Master Account


Can you get the circuit diagram of Fingerprint based access control system?

Yes. You can get the circuit diagram of Fingerprint based access control system.


What is RBACL?

RBACL stands for a role-based access control list. It is a way to restrict access to a system or computer network to authorized users only. You can assign users specific roles using RBACL.


What are A.E.P. policies?

Network admission control and policy-based resource control are based on user identity.


Restricting access to files based on the indentity of the user or group is an example of which on what?

DAC - Discretionary Access Control.


What Bridges filter network frames based on?

physical address


How can you control the congestion in tcp?

The techniques include End-system flow control, Network congestion control, Network based congestion avoidance and Resource allocation.