A method of restricting access to a computer network through setting device permissions based on the MAC address, the unique identifier of the network card. Information security experts note that MAC filtering does little to increase network security, since the identifier can be changed for the duration of the current session (MAC spoofing). A request with a fake MAC address is processed by the router as legitimate, even if sent from a device whose permanent MAC address is stop-listed.