Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Can manual modification of MAC address break IP-MAC binding?

2025-02-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

There is a spear and a shield in this world, and since there is IP-MAC binding technology, there will always be someone who will try to break this binding. Generally speaking, it is nothing more than "modify the IP address" and "modify the MAC address".

1. The modification of IP address is very simple. In "Local connection", you can modify the attributes of TCP/IP, as shown in the figure:

two。 Most people do not know, in fact, the computer can also change the "MAC address". As shown below:

3. Therefore, in order to prevent clients from breaking the IP-MAC binding strategy by modifying IP addresses and mac addresses, we should not only disable the IP addresses outside the binding list, but also block the MAC addresses outside the list. It is best not to assign IP addresses to MAC addresses outside the list. In this way, even if the MAC address is modified, not only can not get on the network, but also can not get IP. The configuration is as follows:

As shown in the figure above, modifying the IP address will directly cause the client to lose access to the network, while modifying the MAC address will not get the IP. Thus effectively prevent clients from bypassing bindings by modifying IP and MAC. Of course, it is best to issue corresponding administrative orders to punish the behavior of self-modification of IP and MAC, which can ensure the network order of the company.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report