亚洲AV无码专区国产|日本不卡一级片一区视频|亚洲日韩视频欧美|五月天色网站av|在线视频永久免费|五级黄色视频免费观看性|女人看黄色视频的链接|黄网络在线看三级图片|特级一级少妇亚洲有码在线|日本无码高清免费

Home >

Prevent Others From Stealing Your IP.

2008/6/24 14:47:00 23

Prevent Others From Stealing Your IP.

If someone changes the MAC address, you can successfully embezzle your internet account.

In order to prevent embezzlement of IP Internet access, network management should take the following countermeasures:



1. bind the user's IP and MAC address together.



The network management is configured on switches and routers or enters the "MS-DOS mode", and the command address is input into the command prompt: ARP -S 202.201.101.01 00-01-02-03-04-05, which can bind the MAC address (00-01-02-03-04-05) and IP address (202.201.101.01) together.



Note: the ARP command is useful only for LAN proxy servers, and for static IP addresses. If Modem dial up or dynamic IP address is used, it will not work.



2. IP-MAC-PORT three party binding



The above IP and MAC binding methods do not really solve the problem of IP embezzlement. In fact, the most effective solution is to bind the port (PORT) on the basis of IP and MAC binding, that is, the IP-MAC-PORT three are bound together.



Operation procedure:



When wiring, it is recommended that each switch port be connected to only one host. The network management should correspond to the ports of the junction box and switch on the user wall and do the registration work. Then, the MAC address of the user will be added to the corresponding switch port, and then bind to IP together to achieve the three party binding of IP-MAC-PORT.

In this way, even if the embezzled person owns the IP corresponding MAC address, it is impossible to embezzle IP Internet because it is impossible to have the port on the wall as well.

In addition, network management can adopt other methods to prevent embezzlement of IP Internet access, such as configuring VLAN of switches, using user authentication, and so on. Due to the limited space, the network will no longer be deployed.

  • Related reading

12 Problems Must Be Considered Before Choosing Saas.

Market network
|
2008/6/24 14:47:00
13

Focus On Domain Name Security

Market network
|
2008/6/24 14:46:00
18

Preparations For Enterprises To Do Web Sites

Market network
|
2008/6/24 14:45:00
17

What Is Human Flesh Search (2)

Market network
|
2008/6/24 14:45:00
18

What Is Human Flesh Search (1)

Market network
|
2008/6/24 14:44:00
24
Read the next article

Nine Possibilities Of High Occupancy Rate Of CPU

Nine possibilities of high occupancy rate of CPU