Skip to main content
Skip table of contents

Impacted MAC Address

The MAC Address that was affected by the activity.

Data Type

String

Aliases

UseAlias

Client Console Full Name

MAC Address (Impacted)

Client Console Short Name

Not applicable

Web Console Tab/Name

MAC Address (Impacted)

Elasticsearch Field Name

impactedMac

Rule Builder Column Name

DMAC

Regex Pattern

<dmac>

NetMon Name

DestMAC

Field Relationships

  • SIP
  • SIPv4
  • SIPv6
  • SIPv6E
  • Origin Hostname
  • Origin Hostname or IP
  • Origin NAT IP
  • DIP
  • DIPv4
  • DIPv6
  • DIPv6E
  • Impacted Hostname
  • Impacted Hostname or IP
  • Impacted NAT IP
  • Origin Port
  • Origin NAT Port
  • Impacted Port
  • Impacted NAT Port
  • Origin MAC Address
  • Origin Interface
  • Impacted Interface
  • Origin Domain
  • Impacted Domain
  • Origin Login
  • Impacted Account
  • IANA Protocol Number
  • IANA Protocol Name

Common Applications

  • Firewall
  • IDS/IPS
  • Vulnerability scanners

Use Case

  • Differentiating hosts and interfaces.
  • Detecting MAC ID cloning.

MPE/Data Masking Manipulations

Not applicable.

Usage Standards

  • Can be in any format of MAC address
    • MM:MM:MM:SS:SS:SS
    • MM-MM-MM-SS-SS-SS
    • MMM.MMM.SSS.SSS
    • MM MM MM SS SS SS
  • Impacted is Server (In Client-Server Model)
  • Impacted is Target (In Attacker-Target Model)

Examples

  • FireEye Web MPS

02 01 2016 17:13:19 1.1.1.1 <LOC4:WARN> fenotify-609081.warning: CEF:0|FireEye|MPS|1.1.1.1875|IM|infection-match|1|rt=Feb 01 2016 23:13:10 UTC src=1.1.1.1 cn3Label=cncPort cn3=80 cn2Label=sid cn2=84575103 shost= USABLDRRECFLOW01proto=tcp spt=51997 dst=1.1.1.1 cs5Label=cncHost cs5=1.1.1.1 dvchost= USABLDRRECFLOW01dvc=1.1.1.1 smac=00:00:00:00:00:00 cn1Label=vlan cn1=0 dpt=80 externalId=609081 cs4Label=link cs4=THINGS dmac=00:00:00:00:00:00 cs1Label=sname cs1=Exploit.Kit.AnglerDIPv4

smac= in this log is the target MAC Address (impacted).

  • Brocade Switch

03 01 2017 02:08:41 1.1.1.1 <LOC6:NOTE> Mar  1 02:08:38 ch3p1gw4 dataplane[2287]: fw rule INTERNAL-IN:10000 block udp(17) src=dp0p160p1/0:50:56:9a:ea:e8/fe80::e9c4:f7f6:e72c:2029(546) dst=/33:33:0:1:0:2/ff02::1:2(547) len=159 hoplimit=1 len=119

dst= with a possible destination hostname followed by destination (impacted) MAC Address.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.