Home >

Prevent Others From Stealing Your IP.

2008/6/24 14:47:00 23

Prevent Others From Stealing Your IP.

If someone changes the MAC address, you can successfully embezzle your internet account.

In order to prevent embezzlement of IP Internet access, network management should take the following countermeasures:



1. bind the user's IP and MAC address together.



The network management is configured on switches and routers or enters the "MS-DOS mode", and the command address is input into the command prompt: ARP -S 202.201.101.01 00-01-02-03-04-05, which can bind the MAC address (00-01-02-03-04-05) and IP address (202.201.101.01) together.



Note: the ARP command is useful only for LAN proxy servers, and for static IP addresses. If Modem dial up or dynamic IP address is used, it will not work.



2. IP-MAC-PORT three party binding



The above IP and MAC binding methods do not really solve the problem of IP embezzlement. In fact, the most effective solution is to bind the port (PORT) on the basis of IP and MAC binding, that is, the IP-MAC-PORT three are bound together.



Operation procedure:



When wiring, it is recommended that each switch port be connected to only one host. The network management should correspond to the ports of the junction box and switch on the user wall and do the registration work. Then, the MAC address of the user will be added to the corresponding switch port, and then bind to IP together to achieve the three party binding of IP-MAC-PORT.

In this way, even if the embezzled person owns the IP corresponding MAC address, it is impossible to embezzle IP Internet because it is impossible to have the port on the wall as well.

In addition, network management can adopt other methods to prevent embezzlement of IP Internet access, such as configuring VLAN of switches, using user authentication, and so on. Due to the limited space, the network will no longer be deployed.

  • Related reading

12 Problems Must Be Considered Before Choosing Saas.

Market network
|
2008/6/24 14:47:00
13

Focus On Domain Name Security

Market network
|
2008/6/24 14:46:00
18

Preparations For Enterprises To Do Web Sites

Market network
|
2008/6/24 14:45:00
17

What Is Human Flesh Search (2)

Market network
|
2008/6/24 14:45:00
18

What Is Human Flesh Search (1)

Market network
|
2008/6/24 14:44:00
24
Read the next article

Nine Possibilities Of High Occupancy Rate Of CPU

Nine possibilities of high occupancy rate of CPU