How to get a unique Macaddress

Posted on 2002-07-22
Last Modified: 2013-12-27
Dear Sir,

We are developing a GPRS modem device that needs to connect to the network in a stand-alone environment.
How can we get a large block of unique MAC addresses?

Question by:paulwauters
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Accepted Solution

thoffman earned 50 total points
ID: 7189072
Try this site for more information.

Expert Comment

ID: 7518459

 OR generate your own MAC's addresses. Please note that a portion of the MAC involves the producer's unique string. That could be your's and the rest doesn't matter, because your brand it's unique.


Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Internet bottleneck? 11 143
AIX Power 5 server - cfgmgr is not able update ent0 & ent1 adapter to an available state. 1 183
using BGP Attributes 2 133
ASA 5505 latency problem 8 71
When posting a question about a Cisco ASA, Cisco Router or Cisco Switch, it can aid diagnosis if a suitably sanitised copy of the config is provided. It is much better to leave as much of the configuration as original as possible, as it could be tha…
Hi there, This article summarizes what you need if you are going to set up your home or small business Network Attached Storage (NAS) to be accessible from the internet. Of course there are configuration differences based on your NAS or router ma…
In an interesting question ( here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question