The network is under ARP attack and cannot be connected to the Internet. How to prevent it

Updated on technology 2024-02-08
5 answers
  1. Anonymous users2024-02-05

    In general, there are generally three ways to prevent ARP spoofing:

    1) Bind IP and MAC address, and can also bind the IP address and MAC address of the gateway in a single machine, which can completely solve the ARP attack through two-way binding.

    2) Write files about processing the repair of the network.

    3) Compared with the first two, the third method is relatively simple and trouble-free, opening each to kill the soft"ARP Firewall"Just enable it, as long as there is a prompt, you don't need to care about ARP harassment. Personally, I recommend using Jinshan.

    As for the specific operation of the first two points, you can find the corresponding article by searching on the Internet.

  2. Anonymous users2024-02-04

    These problems will not occur if the internal network is well governed.

    Professional services can do the following for enterprises:

    1.High stability.

    2.Complete system and data security.

    3.Reduce IT hassles for your business.

    4.Assist in the internal administration of the enterprise.

    5.Dramatically reduce the probability cost of failure.

    6.Stable IT overhead.

    7.Improve resource utilization.

    8.Increased convenience.

    9.Extend the efficiency and life of IT equipment.

  3. Anonymous users2024-02-03

    There are many solutions, and the best way is to find out the machine that sends ARP broadcast packets indiscriminately, and the best way is to shut him up.

    1. All machine IPs are bound to MAC. (This can be done on a network device, or it can be bound on each computer).

    2. Each machine is equipped with ARP firewall.

    3. Use tools, software, and your own judgment to find out the MAC address of the machine that sends ARP broadcast packets randomly, find out the computer, antivirus, reinstall the system, etc.

  4. Anonymous users2024-02-02

    Installing Kingsoft ARP Firewall or Color Shadow ARP Firewall is free.

  5. Anonymous users2024-02-01

    Improper settings do not allow you to connect.

    Click to enter the "Network Neighbor" attribute, turn on "Wireless Network Connection", and then set "IP Address", "Subnet Mask" and "Gateway", as long as the IP address of the computer is in the same network segment as the IP address of the wireless router;

    2.Cyber attacks cause network anomalies.

    Enter the "Safe Mode with Network", change the IP address of the computer at the wireless network card attributes, and then check the check book to see if it can be connected to the Internet. In addition, buying and installing professional antivirus software and network firewall is one of the shortest ways to do it.

    3.Some of the routers are out of function and cannot be used.

    If the current software version does not support this feature, upgrade it first. Click to enter the "System Tools" option of the wireless router, select "Software Upgrade" after entering, the current software version and hardware version will be displayed in the dialog interface, and enter the pants into the "file name" in the pop-up dialog box and click "Upgrade".

    Anti-ARP spoofing software (antiarpsniffer3).

    antiarpsnifferv3forwindows98/me/2000/xp/2003

    Function introduction: % Defend against all malicious programs that use ARP technology, find suspicious and automatically rewrite ARP data.

    2. The software has the function of tracking ARP attackers, and can track the IP address of the other party.

    3. The software automatically repairs the ARP data and keeps the network uninterrupted.

Related questions
6 answers2024-02-08

ARP attacks are launched from the data link layer, and ARP firewall and 360 are all application-layer software, which cannot be prevented. In addition, ARP and other network attacks have always existed, and network attacks are sometimes not deliberately sabotage, because the Ethernet protocol has inherent vulnerabilities and difficult-to-manage defects, resulting in various intranet problems. In order to completely solve intranet attacks, the only way to prevent and control the network card of each terminal is to prevent ARP attacks from being issued. >>>More

13 answers2024-02-08

I think there should be someone in the LAN who uses ARP to spoof Trojan programs (such as: World of Warcraft, Audition and other number-stealing software, and some plug-ins have also maliciously loaded this program). >>>More

16 answers2024-02-08

Dream Ship is not worth it.

Zhou Xun is shaky. >>>More

18 answers2024-02-08

Some people say that the network is virtual, but the people on the network are real, and I never thought that there could be any real friendship on the network. But many people don't think so, they think that the Internet is the same as reality, you can make friends of the same sex and the opposite sex online, and you can also increase your knowledge, broaden your knowledge, and broaden our horizons in the process of communicating with these people. I admit this, because these days I often go to some topic rooms to listen to topics, and I do see some very good people in our lives, including academics, corporate legal persons, lawyers, corporate white-collar workers, teachers and other people from all walks of life. >>>More

9 answers2024-02-08

Tencent TT is a multi-page browser developed by Tencent that integrates multi-threading, blacklist and whitelist, intelligent shielding, mouse gestures and other functions, and has the characteristics of speed, stability and security. >>>More