![]() ![]() manage access to the network based on computer's individual MAC-address. This enabled network administrators to work with fixed assignment of MAC-addresses to the computers, i.e. NAT Passthrough : PPTP Pass-Through, L2TP Pass-Through, IPSec Pass-Through, RTSP Pass-Through, H. ![]() This can be a problem for the security strategy of a company.Īccording to Lenovo, HP, or Dell, for MAC pass-through, a device-specific MAC-address is stored in BIOS, which is passed-through towards a connected compatible (thunderbolt) network adapter, thus always using the same MAC-address for a computer, no matter what individual adapter is being used. Using a variety of network-adapters on one computer, or sharing network adapters among a pool of computers, as it is done in modern office situations without dedicated working desks/equipment, would lead to random-assignment of MAC-addresses to computers. ![]() a laptop can use various external adapters to connect to a network, like USB-ethernet-adapter, a docking-station, or a thunderbolt-connected monitor with integrated hub and network-adapter, each with its specific device MAC-address. Traditionally, each network adapter has its own, unique MAC address.Į.g.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |