Wi-Fi access points use MAC filtering for security, though it's easily spoofed. Validate MAC lists to ensure typos don't accidentally lock out administrators or fail to block unwanted devices. Document that MAC filtering provides minimal security.
Switch port security limits MACs allowed per port to prevent MAC flooding attacks. Validate configured addresses and set appropriate violation actions. Invalid MACs in port security configs cause legitimate traffic to be dropped.
Virtual networking requires MAC address assignment to VMs and containers. Hypervisors generate MACs automatically, but manual assignment requires validation to avoid conflicts. Overlapping MACs cause network chaos with unpredictable routing.
OUI lookup databases map MAC prefixes to manufacturers. After validating format, the first six digits identify the vendor. This helps with asset discovery, inventory management, and identifying rogue devices on networks.