In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
There is a spear and a shield in this world, and since there is IP-MAC binding technology, there will always be someone who will try to break this binding. Generally speaking, it is nothing more than "modify the IP address" and "modify the MAC address".
1. The modification of IP address is very simple. In "Local connection", you can modify the attributes of TCP/IP, as shown in the figure:
two。 Most people do not know, in fact, the computer can also change the "MAC address". As shown below:
3. Therefore, in order to prevent clients from breaking the IP-MAC binding strategy by modifying IP addresses and mac addresses, we should not only disable the IP addresses outside the binding list, but also block the MAC addresses outside the list. It is best not to assign IP addresses to MAC addresses outside the list. In this way, even if the MAC address is modified, not only can not get on the network, but also can not get IP. The configuration is as follows:
As shown in the figure above, modifying the IP address will directly cause the client to lose access to the network, while modifying the MAC address will not get the IP. Thus effectively prevent clients from bypassing bindings by modifying IP and MAC. Of course, it is best to issue corresponding administrative orders to punish the behavior of self-modification of IP and MAC, which can ensure the network order of the company.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.