In network management, IP address fraudulent usage is frequent, 涓嶄粎 normal use of the network impact, and because the address of the unauthorized use of authority is often high, thus causing a large number of users of economic loss and potential security hidden. What measures have the greatest possible to avoid such phenomena happen? In order to prevent IP address theft, you can assign the proxy server IP address, the IP address and network card address binding.
For dynamic allocation IP, do a DHCP server to bind the user network card MAC address and IP address, and then set according to different IP rights. For static IP, if using three switches, you can switch ports on each IP address so limited, if someone changes their IP address, then his network was unreasonable. We are now bound for the static IP address to explain an example.
View Network Card MAC Address
Click on "Start", select "Run" and then enter winipcfg command inside, which you can find out your network card address.
Record before the proxy server, allowing network administrators to a static IP address of your Internet records and the address of the computer's network card bundle. Specific command is:
ARP-s 192.168.0.4 00-EO-4C-6C-08-75
This will be your static IP address of the Internet (assuming that 192.168.0.4) and network card address (assuming a 00-EO-4C-6C-08-75) bound with a computer, even if your IP address stolen 192.168.0.4 can not access through a proxy server. One should note that this command only in the LAN Internet proxy server useful, but also a static IP address, like normal dial-up Modem is a dynamic IP address on does not work.
ARP function of each parameter Introduction
ARP 顨?s 顨?顨?d 顨?顨?a 顨?br />
-S - to the corresponding IP address and physical address of the bundle.
-D - delete the given IP address and physical address of the bundle.
-A - Arp protocol by querying the table to display the IP address and physical address corresponding to the situation.
As a network manager, if the MAC address and IP on the binding flexibility in the use of skilled, it will create a very safe environment conducive to security risks can be greatly reduced.
相关链接:
Whirlpool eventually favored by the United States and Thailand was DESIGNATED as the optimum board b
PHOTOSHOP make a pretty live with goldfish
FLV to M4V
Simple Security AND Privacy:
The face of OOXML, how can we do?
Mr. Wu: I have a 600 million U.S. dollars in cash
Notebook computer repair Experience hidden rules
Sogou Pinyin input method and how to do conflict game?
Trace to its source: Do not forget the quality of THE
News About Web Development
Recode flv to qt
3GP to MOV
SWF To MPEG4
Sina's brilliant and bleak: 5 CEO change
Directory Gallery And Cataloging Tools
No comments:
Post a Comment