• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Prevent Others From Stealing Your IP.

    2008/6/24 14:47:00 23

    Prevent Others From Stealing Your IP.

    If someone changes the MAC address, you can successfully embezzle your internet account.

    In order to prevent embezzlement of IP Internet access, network management should take the following countermeasures:



    1. bind the user's IP and MAC address together.



    The network management is configured on switches and routers or enters the "MS-DOS mode", and the command address is input into the command prompt: ARP -S 202.201.101.01 00-01-02-03-04-05, which can bind the MAC address (00-01-02-03-04-05) and IP address (202.201.101.01) together.



    Note: the ARP command is useful only for LAN proxy servers, and for static IP addresses. If Modem dial up or dynamic IP address is used, it will not work.



    2. IP-MAC-PORT three party binding



    The above IP and MAC binding methods do not really solve the problem of IP embezzlement. In fact, the most effective solution is to bind the port (PORT) on the basis of IP and MAC binding, that is, the IP-MAC-PORT three are bound together.



    Operation procedure:



    When wiring, it is recommended that each switch port be connected to only one host. The network management should correspond to the ports of the junction box and switch on the user wall and do the registration work. Then, the MAC address of the user will be added to the corresponding switch port, and then bind to IP together to achieve the three party binding of IP-MAC-PORT.

    In this way, even if the embezzled person owns the IP corresponding MAC address, it is impossible to embezzle IP Internet because it is impossible to have the port on the wall as well.

    In addition, network management can adopt other methods to prevent embezzlement of IP Internet access, such as configuring VLAN of switches, using user authentication, and so on. Due to the limited space, the network will no longer be deployed.

    • Related reading

    12 Problems Must Be Considered Before Choosing Saas.

    Market network
    |
    2008/6/24 14:47:00
    13

    Focus On Domain Name Security

    Market network
    |
    2008/6/24 14:46:00
    18

    Preparations For Enterprises To Do Web Sites

    Market network
    |
    2008/6/24 14:45:00
    17

    What Is Human Flesh Search (2)

    Market network
    |
    2008/6/24 14:45:00
    18

    What Is Human Flesh Search (1)

    Market network
    |
    2008/6/24 14:44:00
    24
    Read the next article

    Nine Possibilities Of High Occupancy Rate Of CPU

    Nine possibilities of high occupancy rate of CPU

    主站蜘蛛池模板: 日韩美女在线视频网站免费观看| 人人澡人人澡人人看添欧美| 特级做a爰片毛片免费看| 好吊操视频在线| 全日本爽视频在线| www.色中色| 男人一进一出桶女人视频 | 色婷婷久久综合中文久久蜜桃| 日韩小视频在线| 国产主播在线看| 中文字幕影片免费在线观看| 美国式禁忌4桥矿超棒| 成人中文字幕一区二区三区| 内射人妻视频国内| av在线手机播放| 毛茸茸bbw亚洲人| 国产精品免费av片在线观看| 亚洲AV综合AV一区二区三区| 成人羞羞视频国产| 日日AV拍夜夜添久久免费| 品色堂永久免费| h小视频在线观看| 欧美黑人巨大3dvideo| 国产精品人成在线播放新网站| 亚洲AV成人片色在线观看高潮| 两个人一上一下剧烈运动| 精品久久久久久久免费加勒比| 天天干天天操天天做| 亚洲日韩精品A∨片无码| 视频二区调教中字知名国产| 日韩精品无码一区二区三区AV| 国产一级毛片在线| 一区二区三区在线| 永久免费毛片手机版在线看| 国产精品亚洲专区无码唯爱网| 久久精品国产99久久无毒不卡| 色多多免费视频观看区一区| 性做久久久久久蜜桃花| 亚洲精品成人片在线播放| 一个色中文字幕| 日本乱子伦xxxx|