{"id":230,"date":"2024-05-15T05:17:25","date_gmt":"2024-05-15T02:17:25","guid":{"rendered":"https:\/\/www.dchost.com\/blog\/?p=230"},"modified":"2024-10-17T14:50:39","modified_gmt":"2024-10-17T11:50:39","slug":"mac-adresi-nedir","status":"publish","type":"post","link":"https:\/\/www.dchost.com\/blog\/mac-adresi-nedir\/","title":{"rendered":"MAC Adresi Nedir?"},"content":{"rendered":"<div class=\"dchost-blog-content-wrapper\"><div id=\"toc_container\" class=\"toc_transparent no_bullets\"><p class=\"toc_title\">\u0130&ccedil;indekiler<\/p><ul class=\"toc_list\"><li><a href=\"#Giris\"><span class=\"toc_number toc_depth_1\">1<\/span> Giri\u015f<\/a><\/li><li><a href=\"#MAC_Adresinin_Temel_Ozellikleri\"><span class=\"toc_number toc_depth_1\">2<\/span> MAC Adresinin Temel \u00d6zellikleri<\/a><ul><li><a href=\"#Benzersiz_Tanimlayici\"><span class=\"toc_number toc_depth_2\">2.1<\/span> Benzersiz Tan\u0131mlay\u0131c\u0131<\/a><\/li><li><a href=\"#Donanim_Katmani_Adresi\"><span class=\"toc_number toc_depth_2\">2.2<\/span> Donan\u0131m Katman\u0131 Adresi<\/a><\/li><li><a href=\"#Sabit_ve_Degistirilemez\"><span class=\"toc_number toc_depth_2\">2.3<\/span> Sabit ve De\u011fi\u015ftirilemez<\/a><\/li><li><a href=\"#Onaltilik_Bicim\"><span class=\"toc_number toc_depth_2\">2.4<\/span> Onalt\u0131l\u0131k Bi\u00e7im<\/a><\/li><\/ul><\/li><li><a href=\"#MAC_Adresinin_Kullanim_Alanlari\"><span class=\"toc_number toc_depth_1\">3<\/span> MAC Adresinin Kullan\u0131m Alanlar\u0131<\/a><ul><li><a href=\"#Ag_Iletisimi\"><span class=\"toc_number toc_depth_2\">3.1<\/span> A\u011f \u0130leti\u015fimi<\/a><\/li><li><a href=\"#Guvenlik\"><span class=\"toc_number toc_depth_2\">3.2<\/span> G\u00fcvenlik<\/a><\/li><li><a href=\"#Ag_Yonetimi\"><span class=\"toc_number toc_depth_2\">3.3<\/span> A\u011f Y\u00f6netimi<\/a><\/li><li><a href=\"#Cihaz_Tanimlama\"><span class=\"toc_number toc_depth_2\">3.4<\/span> Cihaz Tan\u0131mlama<\/a><\/li><\/ul><\/li><li><a href=\"#MAC_Adresinin_Avantajlari_ve_Sinirlamalari\"><span class=\"toc_number toc_depth_1\">4<\/span> MAC Adresinin Avantajlar\u0131 ve S\u0131n\u0131rlamalar\u0131<\/a><ul><li><a href=\"#Avantajlari\"><span class=\"toc_number toc_depth_2\">4.1<\/span> Avantajlar\u0131<\/a><\/li><li><a href=\"#Sinirlamalari\"><span class=\"toc_number toc_depth_2\">4.2<\/span> S\u0131n\u0131rlamalar\u0131<\/a><\/li><\/ul><\/li><li><a href=\"#Sonuc\"><span class=\"toc_number toc_depth_1\">5<\/span> Sonu\u00e7<\/a><\/li><\/ul><\/div>\n<h2><span id=\"Giris\">Giri\u015f<\/span><\/h2>\n<p>MAC (Media Access Control) adresi, a\u011f donan\u0131m\u0131n\u0131n benzersiz bir kimli\u011fini temsil eden bir tan\u0131mlay\u0131c\u0131d\u0131r. Her a\u011f cihaz\u0131na \u00fcretim s\u0131ras\u0131nda atan\u0131r ve bu cihaz\u0131n a\u011f \u00fczerinden tan\u0131nmas\u0131n\u0131 sa\u011flar. MAC adresi, genellikle alt\u0131 \u00e7ift onalt\u0131l\u0131k say\u0131dan olu\u015fur ve cihaz\u0131n \u00fcreticisi ve donan\u0131m\u0131n benzersiz kimli\u011fini i\u00e7erir. \u00d6rne\u011fin, bir MAC adresi \u015f\u00f6yle g\u00f6r\u00fcnebilir: <code>00:1A:2B:3C:4D:5E<\/code>.<\/p>\n<h2><span id=\"MAC_Adresinin_Temel_Ozellikleri\">MAC Adresinin Temel \u00d6zellikleri<\/span><\/h2>\n<h3><span id=\"Benzersiz_Tanimlayici\">Benzersiz Tan\u0131mlay\u0131c\u0131<\/span><\/h3>\n<p>Her MAC adresi benzersizdir ve d\u00fcnyada sadece bir cihaz\u0131 tan\u0131mlar. Bu benzersizlik, a\u011f ileti\u015fiminin d\u00fczg\u00fcn ve hatas\u0131z bir \u015fekilde yap\u0131lmas\u0131n\u0131 sa\u011flar. Benzersiz MAC adresleri, cihazlar aras\u0131nda \u00e7ak\u0131\u015fmalar\u0131 ve ileti\u015fim sorunlar\u0131n\u0131 \u00f6nler.<\/p>\n<h3><span id=\"Donanim_Katmani_Adresi\">Donan\u0131m Katman\u0131 Adresi<\/span><\/h3>\n<p>MAC adresi, OSI modelinin ikinci katman\u0131 olan veri ba\u011flant\u0131 katman\u0131nda (Data Link Layer) \u00e7al\u0131\u015f\u0131r. Bu katman, a\u011f donan\u0131mlar\u0131 aras\u0131ndaki ileti\u015fimi y\u00f6netir ve MAC adresleri, bu donan\u0131mlar\u0131n birbirini tan\u0131mas\u0131n\u0131 ve veri paketlerini do\u011fru hedefe y\u00f6nlendirmesini sa\u011flar.<\/p>\n<h3><span id=\"Sabit_ve_Degistirilemez\">Sabit ve De\u011fi\u015ftirilemez<\/span><\/h3>\n<p>Genellikle, bir cihaz\u0131n MAC adresi \u00fcretici taraf\u0131ndan atan\u0131r ve donan\u0131m seviyesinde sabittir. Bu adres genellikle cihaz\u0131n a\u011f kart\u0131na (NIC) veya a\u011f aray\u00fcz\u00fcne g\u00f6m\u00fcl\u00fcd\u00fcr. Ancak, baz\u0131 durumlarda yaz\u0131l\u0131m arac\u0131l\u0131\u011f\u0131yla MAC adresini de\u011fi\u015ftirmek m\u00fcmk\u00fcnd\u00fcr, bu i\u015fleme MAC adresi spoofing denir.<\/p>\n<h3><span id=\"Onaltilik_Bicim\">Onalt\u0131l\u0131k Bi\u00e7im<\/span><\/h3>\n<p>MAC adresleri, genellikle alt\u0131 \u00e7ift onalt\u0131l\u0131k say\u0131 olarak g\u00f6sterilir ve her \u00e7ift, iki nokta veya tire ile ayr\u0131l\u0131r. \u00d6rne\u011fin: <code>00:1A:2B:3C:4D:5E<\/code> veya <code>00-1A-2B-3C-4D-5E<\/code>. \u0130lk \u00fc\u00e7 \u00e7ift, \u00fcreticiyi tan\u0131mlayan OUI&#8217;yi (Organizationally Unique Identifier) temsil ederken, son \u00fc\u00e7 \u00e7ift, cihaz\u0131n benzersiz kimli\u011fini tan\u0131mlar.<\/p>\n<h2><span id=\"MAC_Adresinin_Kullanim_Alanlari\">MAC Adresinin Kullan\u0131m Alanlar\u0131<\/span><\/h2>\n<h3><span id=\"Ag_Iletisimi\">A\u011f \u0130leti\u015fimi<\/span><\/h3>\n<p>MAC adresleri, yerel a\u011f (LAN) ileti\u015fiminde temel bir rol oynar. Veri paketleri, g\u00f6nderici ve al\u0131c\u0131 MAC adreslerini i\u00e7erir ve bu adresler, paketlerin do\u011fru cihazlara y\u00f6nlendirilmesini sa\u011flar. Switch&#8217;ler ve y\u00f6nlendiriciler, MAC adreslerini kullanarak a\u011f trafi\u011fini y\u00f6netir ve optimize eder.<\/p>\n<h3><span id=\"Guvenlik\">G\u00fcvenlik<\/span><\/h3>\n<p>A\u011f g\u00fcvenli\u011fi uygulamalar\u0131nda, MAC adresleri cihazlar\u0131n tan\u0131mlanmas\u0131 ve izlenmesi i\u00e7in kullan\u0131l\u0131r. MAC filtreleme, belirli MAC adreslerine sahip cihazlar\u0131n a\u011fa eri\u015fimini s\u0131n\u0131rlamak i\u00e7in yayg\u0131n bir y\u00f6ntemdir. Bu, yetkisiz cihazlar\u0131n a\u011fa eri\u015fimini engelleyerek g\u00fcvenli\u011fi art\u0131r\u0131r.<\/p>\n<h3><span id=\"Ag_Yonetimi\">A\u011f Y\u00f6netimi<\/span><\/h3>\n<p>A\u011f y\u00f6neticileri, cihazlar\u0131n a\u011f \u00fczerindeki konumunu ve durumunu izlemek i\u00e7in MAC adreslerini kullan\u0131r. A\u011f haritalama ve izleme ara\u00e7lar\u0131, her cihaz\u0131n MAC adresini kaydeder ve bu adresleri kullanarak a\u011f trafi\u011fini analiz eder. Bu, a\u011f sorunlar\u0131n\u0131n tespit edilmesini ve \u00e7\u00f6z\u00fclmesini kolayla\u015ft\u0131r\u0131r.<\/p>\n<h3><span id=\"Cihaz_Tanimlama\">Cihaz Tan\u0131mlama<\/span><\/h3>\n<p>MAC adresleri, a\u011f \u00fczerindeki cihazlar\u0131n benzersiz bir \u015fekilde tan\u0131mlanmas\u0131n\u0131 sa\u011flar. Bu, \u00f6zellikle \u00e7ok say\u0131da cihaz\u0131n bulundu\u011fu b\u00fcy\u00fck a\u011flarda \u00f6nemlidir. A\u011f y\u00f6neticileri, cihazlar\u0131n MAC adreslerini kullanarak hangi cihaz\u0131n hangi porta ba\u011fl\u0131 oldu\u011funu ve hangi trafi\u011fin hangi cihazdan geldi\u011fini belirleyebilir.<\/p>\n<h2><span id=\"MAC_Adresinin_Avantajlari_ve_Sinirlamalari\">MAC Adresinin Avantajlar\u0131 ve S\u0131n\u0131rlamalar\u0131<\/span><\/h2>\n<h3><span id=\"Avantajlari\">Avantajlar\u0131<\/span><\/h3>\n<ol>\n<li><strong>Benzersizlik<\/strong>: Her MAC adresi benzersizdir ve bu, a\u011f trafi\u011finin do\u011fru cihazlara y\u00f6nlendirilmesini sa\u011flar.<\/li>\n<li><strong>Donan\u0131m Tabanl\u0131<\/strong>: MAC adresleri donan\u0131m seviyesinde atan\u0131r ve de\u011fi\u015ftirilemez, bu da g\u00fcvenilir bir tan\u0131mlama y\u00f6ntemi sunar.<\/li>\n<li><strong>Kapsaml\u0131 Kullan\u0131m<\/strong>: MAC adresleri, t\u00fcm a\u011f cihazlar\u0131 taraf\u0131ndan kullan\u0131l\u0131r ve bu da onlar\u0131 evrensel bir tan\u0131mlama standard\u0131 yapar.<\/li>\n<\/ol>\n<h3><span id=\"Sinirlamalari\">S\u0131n\u0131rlamalar\u0131<\/span><\/h3>\n<ol>\n<li><strong>Gizlilik Sorunlar\u0131<\/strong>: MAC adresleri, cihazlar\u0131 benzersiz bir \u015fekilde tan\u0131mlad\u0131\u011f\u0131 i\u00e7in gizlilik sorunlar\u0131na neden olabilir. K\u00f6t\u00fc niyetli ki\u015filer, MAC adreslerini izleyerek cihaz hareketlerini ve kullan\u0131m\u0131n\u0131 takip edebilir.<\/li>\n<li><strong>MAC Spoofing<\/strong>: MAC adresleri yaz\u0131l\u0131m arac\u0131l\u0131\u011f\u0131yla de\u011fi\u015ftirilebilir. Bu, MAC spoofing ad\u0131 verilen bir sald\u0131r\u0131 t\u00fcr\u00fcne yol a\u00e7abilir ve a\u011f g\u00fcvenli\u011fini tehdit edebilir.<\/li>\n<li><strong>Yerel Kapsam<\/strong>: MAC adresleri, yaln\u0131zca yerel a\u011flarda kullan\u0131l\u0131r. \u0130nternet gibi geni\u015f alan a\u011flar\u0131nda (WAN), IP adresleri kullan\u0131l\u0131r ve MAC adresleri genellikle y\u00f6nlendirilmez.<\/li>\n<\/ol>\n<h2><span id=\"Sonuc\">Sonu\u00e7<\/span><\/h2>\n<p>MAC adresleri, a\u011f ileti\u015fiminde temel bir rol oynayan benzersiz tan\u0131mlay\u0131c\u0131lard\u0131r. Donan\u0131m seviyesinde atan\u0131r ve a\u011f cihazlar\u0131n\u0131n birbirini tan\u0131mas\u0131n\u0131 sa\u011flar. Yerel a\u011flarda veri paketlerinin do\u011fru hedefe y\u00f6nlendirilmesinde kullan\u0131l\u0131r ve a\u011f g\u00fcvenli\u011fi, y\u00f6netimi ve cihaz tan\u0131mlama gibi \u00e7e\u015fitli alanlarda \u00f6nemli bir rol oynar. Ancak, MAC adreslerinin gizlilik sorunlar\u0131 ve MAC spoofing gibi g\u00fcvenlik tehditleri de g\u00f6z \u00f6n\u00fcnde bulundurulmal\u0131d\u0131r.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u0130&ccedil;indekiler1 Giri\u015f2 MAC Adresinin Temel \u00d6zellikleri2.1 Benzersiz Tan\u0131mlay\u0131c\u01312.2 Donan\u0131m Katman\u0131 Adresi2.3 Sabit ve De\u011fi\u015ftirilemez2.4 Onalt\u0131l\u0131k Bi\u00e7im3 MAC Adresinin Kullan\u0131m Alanlar\u01313.1 A\u011f \u0130leti\u015fimi3.2 G\u00fcvenlik3.3 A\u011f Y\u00f6netimi3.4 Cihaz Tan\u0131mlama4 MAC Adresinin Avantajlar\u0131 ve S\u0131n\u0131rlamalar\u01314.1 Avantajlar\u01314.2 S\u0131n\u0131rlamalar\u01315 Sonu\u00e7 Giri\u015f MAC (Media Access Control) adresi, a\u011f donan\u0131m\u0131n\u0131n benzersiz bir kimli\u011fini temsil eden bir tan\u0131mlay\u0131c\u0131d\u0131r. Her a\u011f cihaz\u0131na \u00fcretim s\u0131ras\u0131nda [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":234,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,1,26],"tags":[75,76,74,73],"class_list":["post-230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nedir","category-genel","category-teknoloji","tag-agguvenligi","tag-agyonetimi","tag-mac","tag-macadresi"],"_links":{"self":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/comments?post=230"}],"version-history":[{"count":7,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/230\/revisions"}],"predecessor-version":[{"id":608,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/230\/revisions\/608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media\/234"}],"wp:attachment":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media?parent=230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/categories?post=230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/tags?post=230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}