Now, there are a number of companies network management or school network management, in order to realize the control of the LAN host network and confused, they find a lot of methods, such as on the router set up, these methods are either too cumbersome to operate, complex, or unsatisfactory effect. In fact, and not everyone imagined so difficult, just a software, you can easily realize the control of local area network host Internet, and simple operation, the effect is quite good. You must want to know, what software is it? Software called aggregated network management. This software, only to be installed on a single host, you can control the host local area network of all hosts on the Internet. After downloading well, install. Installation of the specific steps, I think we all know, do not introduce, then said the specific application.
A, software configuration
Before you apply, you should first configure the software.
The first time you start the software, you will be prompted to create a new monitoring network segment, please click "New monitoring network segment", follow the wizard prompts to operate. Enter the name of your new network segment, and then select the Host (Controller) network card to install the software, modify the IP address of this network card, subnet mask, etc. (if the IP address of the prompt is correct, do not modify).
Next Select your monitoring network segment of the export access bandwidth, according to the actual situation to choose. If there is no category for the local network to use, simply select a similar exit.
After you have built the monitored network segment, select the network segment that you just set up, double-click or click the "Start Monitoring" button, and enter the interface of the specific application.
Two, assigning policies
to give you a clearer idea of how the software controls the network of machines on the Internet, we demonstrate the operation process with a specific application.
After entering the monitoring page, select the Left network console, click on the right to start the network control services, and then select the left of the network host scan, click on the right side of the scan network host (only to start the network control services before the network host scan). After the scan is over, you can see all the hosts on the network segment where the control is located. But now that you don't have control over the host network segment, you must assign a policy. Assigning policies is the focus, and you can assign different policies to different hosts, depending on your needs.
Before assigning a policy, we first create a policy. First select the control policy setting on the left, then click on the New Key policy button on the right and enter the policy name to determine the build policy. Next, we want to assign the host that needs to apply this policy. Select the Scan network host on the left, then right-click the host to which you want to assign the policy (the Controlled machine), select Reassign Policy, and then select the policy name and determine the save settings. The host you are assigning the policy to now is controlled by the policy you set. Www.3lian.com
Three, policy configuration
from the above introduction you can see that the most important part of managing LAN hosts is to assign different strategies. Below we will introduce some policy management aspects of the application.
If you don't want your employees to use chat tools such as QQ, or if you don't want your employees to have peer-to-peer downloads or regular downloads, you just need to set up the appropriate options for your strategy, and you don't want to use any of the chat tools that your employees are using. For other peer-to-peer and download software use, you can enter the other corresponding tags to set.
If you want to restrict employee access to the site, you only need to switch to the "WWW restrictions" tab, to prohibit employees to visit any site, only to prohibit access to the WWW front tick, and you can set the site cannot be accessed, start IE prompts, you only need to enable the access to prevent the feedback page before the check, Then enter the prompt text, then when the employee visits the website, the prompt text that you set up will be displayed.
If you only want to restrict employee access to some sites, you are applying a restriction rule to access the WWW front tick. If you want to prohibit access to pornographic or stock-class stations, you can use the reactionary pornographic site library to filter or enable the financial, Stock site library filter before the hook.
If you want employees to have access to only certain Web sites or to certain Web sites, you will be able to hook up before activating the custom URL list URL control rules. The white list method is to enable employees to access only certain sites, the Web site to add to the whitelist way; Select Blacklist method is to make the staff can not visit some sites, the Web site to add to the blacklist way.
To prevent employees from using the proxy server for Internet access, separate the Internet host from using other HTTP proxies and prohibit the LAN host from acting as a proxy server.
Finally, if you want to avoid an individual user consuming too much bandwidth, you can go to the Bandwidth Throttling tab to set up the appropriate settings. How about
, the software is simple enough to operate. With its help, the network management staff of the machine in the computer control, manage to become relaxed.