The current work environment cannot be connected to the Internet, but there are some wireless hotspots around, use a laptop to connect to the wireless network, you can access the Internet, but if you connect to the Intranet, you can not connect to the Internet, this is very troublesome, so I try to find some ways to solve this problem, so that the Intranet and the Internet can be connected at the same time
First, peanut shell installation (before installation needs in the Peanut Shell website registration to get a free domain name, with this domain name, behind the outside network through access to this domain name to achieve SSH login Intranet Linux host)[[email protected] desktop]# wget http://download.oray.com/peanuthull/linux/phddns-2.0.6.el6.x86_64.rpm--2014-10-27 20:11:30--http://download.oray.com/peanuthull/linux/phddns-2.0.6.el6.x86_64.rpmParsin
regional molecular network, that is, the IP phase is different when the subnet mask is not the same.
Add to
Using Command 2
Route Add-p Network Address mask Subnet Mask gateway address
You can add a route that you add to your path in a permanent route (also known as a static route)
Use the command effect chart as follows:
Delete
Using Command 3
Rotue Delete network Address
You can delete a route
In general, the system will automatically add a static route to all the networ
Apt Local source build (can be used for LAN Apt-get source or local source) This document describes the use of Apt-mirror software to build apt local source requirements: Intranet development environment for its specific reasons can not Sisu network, So we need the local intranet source to make it easy for developers to download and install software recommendations: Use a single disk to store source files o
Because the company in the computer room hosting server IP is not enough, but also for security considerations, so that a number of virtual nodes can not directly access the Internet, so I xenserver physical nodes through the use of iptables NAT function made a simple implementation
[Root@xenserver-cukxsegi ~]# sysctl net.ipv4.ip_forward=1 #开启转发[Root@xenserver-cukxsegi ~]# Echo ' net.ipv4.ip_forward=1 ' >>/etc/sysctl.conf #让重启不失效[Root@xenserver-cukxsegi ~]# iptables-p FORWARD DROP #将FORWARD链的策略
Reference Address: http://www.nat123.com/Pages_8_266.jspThe methods in this article are as follows:(1) Install and enable nat123 on the intranet, add mappings, and use other app types. Intranet address port is the LAN MSSQL address port, the network address port customization.(2) After the mapping succeeds, the external network access connection MSSQL uses the mapped extranet address domain name port. Note
A simple introduction of squid
Through Squid Proxy server to achieve intranet users to share the Internet, configure Squid cache and basic access control to accelerate and restrict access to Web services.
For web users, squid is a high-performance proxy caching server that speeds up the intranet browsing the Internet and increases the client's access hit rate. Squid not only supports HTTP protocol, but al
Objective:Sometimes we want to access the local area network SQL Server server, such as test environment database in the company intranet, back home or at the customer site to connect to the database in the intranetThe first step: if you can connect to the local area network database 192.168.150.129, remote also can connect itThe second step: Add a TCP port in the intranet pangolin, the IP of the local IP,
"Three-Point Technology and seven-point management" is a famous saying in the Intranet security field. Large enterprises and organizations, small to each of us, are dealing with management all the time. outstanding management is the starting point of enterprise competition and a necessary choice for enterprise success, this has become the consensus of the industry.
With the further development of office information technology, enterprises have establi
Firewalls and switches are still commonly used. What will happen to the cooperation between the two? I would like to share it with you here and hope it will be useful to you. With the maturity and rapid development of network and Internet technologies, more and more enterprises and institutions have begun to set up networks to automate office work and share Internet information. However, security issues have also emerged. iMaxNetworks (memory network company) proposed a solution based on the cha
Public network IP and intranet IPFirst, let's take a look at the IP address Division:Class A address:0.0.0.0------127.255.255.255Where 127.255.255.255 is the broadcast address and cannot be assignedClass B Address:128.0.0.0------191.255.255.255Class C Address:192.0.0.0------223.255.255.255Class D Address:224.0.0.0-----239.255.255.255Class E Address:240.0.0.0------255.255.255If you want to see how much IP you have on your machine, you can view it like
I encountered Intranet ARP several times at work. The search method is analyzed as follows:
When several servers in a CIDR block cannot access the Internet, it may be an intranet ARP attack. telnet to the layer-3 switch immediately (the layer-2 switch does not work) and use show arp (dis arp for Huawei devices) you can see that the MAC addresses of several IP addresses are the same. After you write down th
Ubuntu installs squid as the Proxy of the intranet. I have a machine named UbuntuLinux, which has a wireless network card and can be used on the Internet. I want to set it as a proxy server so that other machines in the intranet can use it as a proxy for Internet access. 1. install squid in Ubuntu as the Proxy of the intranet. I have a Ubuntu Linux machine that h
Deploying Intranet proxy servers in CentosEnvironment and requirements
10 internal network worker machines, all of which are win7, with the network segment 192.168.1./24, 1 server, and CentOS6 System (dual Nic ). One vro (Dynamic IP, accessing the Internet through the PPPOP account password) and one vswitch with 48 ports. To deploy a CentOS server as a proxy server, the Intranet worker must connect to the n
Make an application that automatically logs on to Windows Server Based on the MAC address in the Intranet. The function is as follows:
Make an application that automatically logs on to Windows 2003 based on the MAC address in the Intranet. The function is as follows:
The Code is as follows:
Function ce_getmac ()
{
If (PHP_ OS = 'winnt ')
{
$ Return_array = array ();
$ Temp_array = array ();
$ Mac_addr
Here is just a way of thinking, the Fool-style method occasionally will be more affordable.Sometimes, when you are in an Internet café, the computer room is used in the intranet. Generally speaking, the security of the intranet is poor, in those 3389 ports open, there is no Group Policy restrictions, we can use the following methods to hack the other machine inside the
Come t00ls a few days, also have no time to write original. --(I started the toast.) )Recently saw a foreigner an article, feel very good.Test a bit of this thing to share the process to the guys, hope that everyone do not step on, busy these days to write originalCall a JS, scan the intranet for bash vulnerabilities, and then bounce back a small thing from the shell. Apt should be used.Test process:A POC from a foreigner my
. network Environment: wired: can connect to the company intranet, cannot connect to the Internet wireless: can connect to the Internet, cannot connect to the company intranet default gateway is 192.168.0.1 our goal is to connect to both networks at the same time, and automatically select a route to allow access from both the Intranet and the Internet. Www.2cto.c
When a website is built on the Intranet, the IP address of the server is dynamic. Is there any good way to make it easy for everyone to access? I thought of the method: original method: Ask the administrator, but this is not necessarily the original egg. : Send an Email to instruct the group to use cmd and then ping the host. After you get the IP address, paste it to... the Intranet to create a website. The
The internal network security idea centered on data security management has been gradually recognized by the market. In addition to the traditional military, military, and other confidential entities, due to the intensification of global competition and the enhancement of enterprises' awareness of intellectual property protection, data confidentiality is gaining popularity and attention in a wider range of fields. A large number of enterprises and design institutes have tried to deploy some
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.