1. [1] Apple Inc. (2011, July 18). "Uniquely Identifying a Macintosh Computer". https://developer.apple.com/library/mac/technotes/tn1103/_index.html
2. [2] Cardenas, D.E. (2018). MAC Spoofing: An Introduction [White Paper]. GIAC Security Essentials Certification (GSEC). https://www.giac.org/paper/gsec/3199/mac-spoofing-an-introduction/105315
3. [3] Chad, F. (2017, May 3). "IP Authentication vs. Username and Password Login". https://www.proxykey.com/ip-authentication-vs-username-password-login
4. [4] Chiradeep, B. (2021, June 28). "What Is Network Access Control? Definition, Key Components, and Best Practices". https://www.toolbox.com/it-security/network-security/articles/what-is-networkaccess-control
5. [5] Cisco. (2018, August 14). "Configuring MAC-Based Authentication on a Switch". https://www.cisco.com/c/en/us/support/docs/smb/switches/cisco -350-series-managedswitches/smb5836-configuring-mac-based-authentication-switch.html