In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article introduces the knowledge of "how to prevent Ping attacks manually". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!
The ping command is the most commonly used DOS command. As we all know, the ping command can not only query their own IP address, but also check the response speed of the website. It is a useful network diagnostic tool. Ping works on end-to-end queries. You can ping other people's computers locally, and others can also ping your computer. Generally speaking, any computer that can be accessed by ping is not very safe. Some virus Trojans will force a large number of remote ping commands to seize your network resources, causing the system to slow down and the network speed to slow down. Ping intrusion is strictly prohibited as a basic function of most firewalls to provide users with choices. Basically, current security software can prevent ping attacks, but you can also manually complete the ping command to shut down to protect your network security.
1. Start execution-run-Open Group Policy command
2. Expand computer configuration-windows Settings-Security Settings-IP Security Policy
3. Right-click and select create IP security policy.
4. Enter ip security policy
Similar trick: how to use the Ping command to check the network failure method using the Ping command.
5. Fill in the ip Security Policy Wizard
The name can be filled in as follows: ping is prohibited, and the description can be filled in at will
6. Activate the default response rule
7. Set the initial authentication method for this security rule
8. When prompted and warned, choose to ignore
9. Select the "Edit" attribute
10. Add editing attributes
11. Create IP Security Rule Wizard
12. Tunnel terminal selection does not specify a tunnel
13. The network type selects all network connections, which means that no one can access it.
14. Authentication or default value remains unchanged
15. Choose Yes and continue to ignore the warning
16. Assign security policy
The forbidden ping we added appears in the security policy, but it has not been activated yet. You must right-click the assignment to respond to the activation policy. If there is no assignment, then the rules will not take effect.
This is the end of "how to prevent Ping attacks manually". Thank you for reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.