In network management, IP address theft often occurs, not only affecting the normal use of the network, but also because the stolen address often has high permissions, as a result, it also causes a lot of economic losses and potential security risks to users. Are there any measures to prevent such phenomena as much as possible? To prevent IP address theft, You can bind the IP address with the NIC address when the proxy server assigns an IP address.
For dynamic IP Address Allocation, create a DHCP server to bind the MAC address and IP address of the user's Nic, and then set permissions based on different IP addresses. For a static IP address, if a layer-3 switch is used, you can limit the IP address on each port of the switch. If someone changes his IP address, the network will be disconnected. We now describe an instance for binding static IP addresses.
View Nic MAC address
Click "start" and select "run". Then, enter the winipcfg command in it to find your NIC address ,:
Record the information and then go to the proxy server to enable the network administrator to bind the static IP address of your Internet access to the NIC address of the recorded computer. The specific command is:
ARP-s 192.168.0.4 00-eo-4c-6c-08-75
In this way, you can bind the static IP address 192.168.0.4 to the computer with the NIC address 00-eo-4c-6c-08-75. Even if someone else steals your IP address 192.168.0.4, you cannot access the Internet through the proxy server. It should be noted that this command is only useful on the proxy server that accesses the internet in the LAN, but also static IP addresses. Modem dial-up Internet access does not work if it is a dynamic IP address. Next we will give a brief introduction to the functions of each parameter:
ARP-s-d-
-S -- bind the corresponding IP address to the physical address.
-D -- delete the binding between the given IP address and the physical address.
-A: query the ARP Protocol table to display the IP address and the corresponding physical address.
As a network administrator, if you can flexibly and skillfully use MAC address and IP Address binding, you will create a very secure and favorable environment, which can greatly reduce security risks.
ArticleInput: dnbm responsible editor: dnbm