Does your network often fall offline or conflict with IP addresses?
Are you worried about the monitoring of communication data (such as MSN, QQ, and email )?
Is your network speed restricted by network management software (such as jusheng network management and P2P Terminator )?
Are you suffering from various ARP attack software (such as network law enforcement officers, network scissors, and local network Terminator )?
The root cause of these problems is ARP spoofing ). Before ARP spoofing, the data flow is like this: Gateway <-> local machine. After ARP spoofing, the data flow is like this: Gateway <-> attacker ("Network Administrator") <-> local, all the communication data between the local machine and the gateway will flow through the attacker ("Network Management"), so it is inevitable to "let everyone cut.
By intercepting false ARP packets and proactively notifying the correct MAC address of the gateway on the system kernel layer, arpfirewall can ensure that the data flow is correct without going through a third party, this ensures the security of communication data, the smooth network, and the control of communication data by third parties, so as to perfectly solve all the above problems.
Nine functions of arpfirewall
1. Intercept ARP attacks.
(A) intercept external false ARP packets at the system kernel layer to ensure the system is not affected by ARP spoofing and ARP attacks, and ensure smooth network and communication security;
(B) intercept ARP attack packets from the local machine at the system kernel layer to reduce malicious infectionsProgramAfter external attacks bring troubles to users;
2. Intercept IP conflict. Intercept IP conflict packets at the system kernel layer to ensure that the system is not affected by IP conflict attacks;
3. DoS attack suppression. The system kernel layer intercepts tcp syn/udp/ICMP/arp DoS attack packets from the local computer, and locates programs that maliciously launch DoS attacks to ensure smooth network connection;
4. Security mode. In addition to the gateway, the system does not respond to ARP requests sent by other machines to achieve stealth and reduce the probability of ARP attacks;
5. ARP data analysis. Analyze all ARP packets received by the local machine, Master network dynamics, and find potential attackers or poisoned machines;
6. Monitor ARP cache. Automatically monitors the local ARP cache table. If the gateway MAC address is found to be tampered with by malicious programs, the system will trigger an alarm and automatically fix it to ensure smooth network and communication security;
7. active defense. Actively communicate with the gateway and notify the gateway of the correct MAC address to ensure smooth network and communication security;
8. Track attackers. Automatically and quickly lock the attacker's IP address after discovering the attack;
9. Scan and kill ARP viruses. Automatically locates malicious programs and virus programs infected with this machine when detecting external attacks.