![how to enable mac filtering in dir-816 how to enable mac filtering in dir-816](https://static.tp-link.com/res/upfile/faq/20150925104953.png)
![how to enable mac filtering in dir-816 how to enable mac filtering in dir-816](https://data2.manualslib.com/product_thumbs/23/115/11428/1142768_dir816l_product.png)
![how to enable mac filtering in dir-816 how to enable mac filtering in dir-816](https://des.gbtcdn.com/uploads/pdm-desc-pic/Electronic/image/2017/09/12/20170912150917_78891.jpg)
When you configure static MAC address binding, you can select the Only allow traffic sent from or to these MAC/IP addresses check box For information about MAC access control, see Restrict Network Traffic by MAC Address. This feature is similar to the MAC access control feature, except that static MAC address binding associates each MAC address with a specific IP address. You can also use this feature to block all network traffic to devices that match the MAC and IP addresses on this list. If this feature is enabled, a computer with a specified MAC address can send and receive information only if it uses the associated IP address. Grok is a better choice when the structure of your text varies from line to line. Dissect works well when data is reliably repeated. Dissect differs from Grok in that it does not use regular expressions and is faster. To use MAC address binding, you must configure the interface to associate a client IP address with a MAC address. The dissect filter plugin is another way to extract unstructured event data into fields using delimiters. This feature can protect your network from ARP poisoning attacks, in which hackers try to change the MAC address of their computers to match a real device on your network. You can control access to an interface on your Firebox by computer hardware (MAC) address.