How to use aggregated network management software

Source: Internet
Author: User
Tags ftp get ip

Aggregated network management software is one of the earliest professional network management software in China. Aggregated network management software has become the most mature, most popular network management software! Aggregated NMS is very different from other domestic network administration software, it does not need to install the client, does not need the switch port mirroring, does not need to install the hub hub, does not need the architecture proxy server, There is no need to adjust the existing network structure or to make any settings on the network device, only a common PC or server deployment on the LAN can control all the Internet behavior of all computers on the LAN. Aggregated network monitoring software core function is the most effective control Peer-to-peer software (especially can completely prohibit thunder download), limit Internet chat, control Web browsing, restrict stock software, limit network games, restrict Internet bandwidth flow, record mail content, defense ARP attack, prohibit proxy internet, isolate foreign computers and so on, can help enterprises and institutions to provide one-stop, a full range of network management and network monitoring; At the same time, aggregated management system of Internet access behavior of the user interface at a glance, all the functions of a mouse can be enabled, do not require a specific computer knowledge and specialized training, is currently using the simplest network management software, now briefly introduced, The use method of aggregated network management.

First, the Configuration tutorial:

Item 1, the first time to start the software, the system will prompt you to choose your Internet environment. The vast majority of enterprises are routers plus switch form, directly choose the default can be, public network access to bandwidth, can be selected according to their own circumstances, can also be selected by default.

Internet environment

Item 2, startup software, on the left side of the function bar, click on "Software Configuration", and then select "Please select the use of the network card", if it is a single card, directly select the bottom of the box card can be, if it is more than one card, then select the Local intranet network card, and then "Save the Configuration"; The right side of the "System settings" and "Run environment settings" You can set according to their own situation, you can not set, do not affect the use.

Software configuration

Monitor network card

Item 3, click on the "Network console" in the upper-left corner of the software and select "Start Network Control Service".

Network console

Item 4, click on the left side of the software function bar "Network host Scan", you can double-click a host, set up a control strategy for this host (that is, access rights), enter the name of the policy, and then the system will pop up a dialog box, you can follow the control needs to click on the various control items (such as flow control, Web site control, chat control, Network games, bandwidth control, time control, etc.) for control, after each control project settings, must be saved.

Control strategy

Second, the use of the tutorial:

Project 1, bandwidth management (flow rate management)

Select "Enable host bandwidth management" and set up uplink and downlink bandwidth respectively. Can control this host's public network bandwidth (that is, the public network data flow), select "Host bandwidth intelligent Control", and then set up the uplink, downlink bandwidth, the host can be intelligent control of the bandwidth, that is, the discovery of its "BT, Electric Donkey", The system will automatically limit the bandwidth of this host to your set uplink, downlink bandwidth, so as to effectively avoid the network bandwidth due to peer-to-peer download excessive consumption.

Set Bandwidth Management

Project 2, Traffic management:

The system can not only control the bandwidth of any host, that is, the flow rate, but also can control the traffic of any host on LAN. Open the "Traffic Limit" dialog box, you can set a public network for this host daily traffic or uplink, downlink daily traffic, more than this flow, the system will automatically cut off the public network connection of this host, that is, prohibit its Internet access.

In addition, you can also in the left "network host scan" inside, real-time view of this host ( the day of the accumulated amount of traffic.

Item 3, Peer-to-peer download restrictions

Open the "Peer-to-peer Download Restrictions" dialog box, where you can choose to prohibit a variety of peer-to-peer tools, such as BT, Donkey, pp Dot pass, the AU, and so on, you can choose to control a peer-to-peer tool download, you can choose to control all.

Note: Because "thunder" is a multicast HTTP download, the application of HTTP protocol rather than peer-to-peer protocol. This limit "Thunderbolt" download, is prohibited it from multiple servers to download multiple points, but can not prohibit the "Thunderbolt" from a single server download. But because even downloading from a single point can be fast. Therefore, if you want to completely prohibit the "thunder" download, you also need to "normal download Restrictions" in the corresponding file type of HTTP download. All other peer-to-peer tools except the Thunderbolt, the system can be completely intercepted.

Peer-to-peer Download Restrictions

Item 5, General download restrictions

Open the Normal Download limit dialog box, where you can restrict all HTTP downloads and FTP downloads. Limit HTTP download must enter file suffix name, and limit FTP download, you can enter the file suffix name to limit, and you can directly enter the wildcard "*" to prohibit all FTP downloads.

Item 6, web site control

Open the WWW Restrictions dialog box in the upper-left corner. Here you can not only completely prohibit the LAN host network access, but also for the LAN host set black, white list, as well as stocks, pornography and other sites. The system can also prevent LAN hosts from enabling proxy Internet or acting as a proxy, while also recording the Web site browsing of LAN hosts.

Item 7, Portal mailbox control function

Given that many small and medium-sized enterprises do not have their own independent enterprise mailboxes, the system provides a special license to the portal site mailbox features. That is, you have Web site control settings, but you can allow employees to use the portal's mailbox. For example, you prohibit the LAN host to visit Sina website (can be the Sina Web site as a blacklist or completely prohibit LAN host access to public network), as long as here to choose the license to use Sina's mailbox (ordinary mailbox, Enterprise mailbox, VIP mailbox, etc.), employees can still visit the home page of Sina, and the landing mail to receive the letter , letters, and so on all the operation of the mailbox, but can not click on the Sina website of other arbitrary connection, including all the connections inside the mailbox.

Item 8, chat control

Open the Chat Limit dialog box, the system can control any host in the LAN login using a variety of chat tools, the system can be completely blocked QQ, MSN, Sina UC, NetEase bubble and so on. In addition, you can disable any chat tool through the system-provided ACL rules.

Item 9, ACL access rules

Opens the ACL Rules dialog box, where you can set up a public network message sent by the LAN host to intercept.

With ACL rules, you can prohibit any host on the LAN from any protocol, any port, access to any IP. So you can intercept LAN host such as: Network games, including any public network message. Add ACL rule: As in rule name: "Winger Network game World", the local IP select "arbitrary", the target IP select "arbitrary", the protocol Select "TCP", the Port Select "4000". This prevents all hosts on the LAN from connecting to the winger game.

Item 10, Control time Setup

Open the Time dialog box, you can set the control time. You can set the control time (in blue).

, you can set the control working time (early 9:00-17:00). The system defaults to control all time, you can right click Cancel, and then select "Working time", also can not set control time. However, if you want all control projects to take effect, you must select the control time.

Item 11, Application strategy

After you have set up your strategy, you can also build a new strategy by double-clicking on the other "unassigned policies" host to assign a strategy that you have already built in the "Network host Scan". Double-click: system prompts you to set up a policy, you can choose to continue to create a new policy, you can choose to choose No, and directly assign the policy you have just established, or still remain "unassigned policy" status. If you choose No, a new dialog box will pop up on the system.

Item 12, Control policy settings

Click on the "Control policy setting" of the function bar on the left side of the software, click "New Policy", enter the name of the policy, then the system will pop up a dialog box, you can click each control item to control according to the control. When you are finished setting, select Save. You can also select the edited policy to change the configuration. The operation is as shown above.

Project 13, network security management

Here you can set the IP-MAC binding. First click on "Enable Ip-mac binding", then you can click "Get Ip-mac List". You can also do: host name, IP, network card triple binding. You can also be a stand-alone IP, network card to make changes, you can manually add, delete and other operations. In addition, after binding IP, you can also choose the following two control measures, such as: "Found illegal ip-mac binding time, automatic disconnect its public network connection" and "found illegal Ip-mac binding time, IP conflict to host" and so on.

Project 14, the network other host running aggregated network management records

In order to ensure the security of LAN, the system to prevent other users in the LAN using aggregated network management to disrupt the local area network, especially provide protection functions: that is, aggregated network management of the official version can be forced to exit the test version, and records running aggregated network management of the host machine name, running time, network cards, IP, and the system to deal with the results

Project 15, LAN Attack tool detection

The system can detect the most serious damage to the local area network three tools: LAN terminator, network scissors Hand and network law enforcement officer, because these three kinds of tools using Windows underlying protocol, so, can not be detected by firewalls and various anti-virus software. and aggregated network management can analyze its message, can detect its host name, IP, network card, running time and other information, so that administrators quickly take measures to deal with, reduce harm.

        Note : More attention to the computer tutorials column, Triple Computer Office Group: 189034526 welcome you to join the

Related Article

E-Commerce Solutions

Leverage the same tools powering the Alibaba Ecosystem

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.