Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

LAN & WAN Basics

ISP Authentication - Other Methods

MAC Address

Anything that has an IP address will have a MAC (Media Access Control) address. MAC addresses are unique to each piece of networking equipment (at least they're supposed to be... more below) and are used in the IP address assignment process. The MAC address (also known as an "Adapter" or "Ethernet" address) is composed of twelve hexadecimal characters. To avoid address duplication, ranges of addresses are assigned to network equipment manufacturers, who are charged with setting up the proper systems to ensure that address assignments are not duplicated.

NOTE: MAC addresses are represented in three common ways. Here's how you would write the same MAC address in those three ways:

  • 00fe3c812eab
  • 00-fe-3c-81-2e-ab
  • 00:fe:3c:81:2e:ab.

MAC addresses are not case sensitive, so the letters that are used (A-F) can be either upper or lower case.

MAC address authentication used to be very commonly used. But routers evolved to allow setting the WAN MAC address to whatever you wanted either by automatically "cloning" the MAC address of a computer that's attached to it, or letting you manually enter the MAC address. This greatly reduced the effectiveness of this authentication method.

Host Name

The Host Name method was used primarily by the now defunct BSP @Home. It requires that the Host Name (Windows calls this the "Computer Name") of the connected computer be set to a specific, long name. Many routers continue to include the ability to set the Host Name, even though @Home has long since gone.

PPTP

Known more as Microsoft's VPN protocol, PPTP authentication is used by some ISPs instead of PPPoE. The setup screens and parameters look very similar to PPPoE.

Telstra Bigpond

Another username / password authentication system used by the large Australian BSP.

More Basics

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Main goal of this release: additional boost of the router performance as I hope (slight boost ). I succeed to change GCC compiler from the version 9....
I have been using AiMesh on over many AiMesh models for the past year and I would like to share some thoughts on AiMesh. Opinions are my own. Discussi...
Asuswrt-Merlin 384.19 beta is now available (except for the RT-AX56U which won't be available for this release, due to outdated GPL code).Aug 9th: Bet...
There was a thread here by another poster. There were some disagreements and that thread was deleted. I found the script by @Martineau on Pastebin, bu...
Hi all, I setup OpenVpn in the router webgui, imported the .ovpn file in the android app.It works if I use the public ip but if I replace it with DDNS...

Don't Miss These

  • 1
  • 2
  • 3