Why can t I connect to the network even after installing the ARP firewall?

Updated on technology 2024-02-28
7 answers
  1. Anonymous users2024-02-06

    At present, most of the problems in dealing with ARP spoofing are that the gateway and the terminal bind the IP and MAC addresses in both directions, and then install the ARP firewall on the terminal, but this is not possible.

    Completely solve the problem of ARP.

    Just wrong. Make your ARP firewall a great one.

    Second, it cannot prevent some people in the LAN from maliciously attacking other machines, or using some software to control other machines, such as P2P terminators and poly.

    Produce network management and other software. The LAN is flooded with a large number of ARP packets, resulting in network latency, packet loss and other problems.

    At present, the most thorough solution to the ARP problem on the market is the Xinxiang immune wall router, and its unique immune network solution can completely solve it.

    ARP attack issues. The Xinxiang immune wall router has an innate immune function, and through the modification of the protocol, the NAT table and the ARP table are fused, when ARP is present

    The NAT table will be queried directly when requested, making the spoofing against the gateway ARP table completely ineffective. The terminal is equipped with an immune network card driver, which can directly read and burn.

    The MAC address on the network card is guaranteed to be correct. Filter malicious ARP packets as well as other common flood attacks to keep your network open. Monitor.

    Pull it out.

  2. Anonymous users2024-02-05

    ARP attacks are sent from each terminal, firewalls like 360 read information from the system, if the information in the system is wrong, then the information obtained by the firewall is wrong, then the firewall will intercept the correct data, release false data, so that a large number of garbage packets are transmitted in the network, a large number of data packets will occupy the traffic of your intranet is the data sent by your intranet can not be sent out or returned in time, if you want to prevent ARP, you must get the real information of each terminal, In order to truly intercept the false data sent, like the current immunity wall, it directly reads the real information from the network card by installing an immunity driver on each terminal, and then checks the sent data packets to intercept the false data packets to ensure the authenticity of the data in the network.

  3. Anonymous users2024-02-04

    Some antivirus software has added the function of ARP personal firewall, which is a measure to protect its own data from being stolen by binding the gateway to the terminal computer to ensure that it is not affected by the fake gateway in the network. ARP firewalls are widely used, and many people think that with firewalls, ARP attacks do not pose a threat, but in fact, this is not the case at all.

    ARP Personal Firewall also has big flaws: 1. It cannot guarantee that the bound gateway must be correct. If ARP spoofing has occurred in a network and someone is forging the gateway, then the ARP personal firewall will bind the wrong gateway, which is extremely risky.

    That is, Zen Jing makes the configuration not default and sends out prompts, and users who lack network knowledge may also be at a loss. 2

    ARP is a problem in the network, and ARP can both forge the gateway and intercept data, making it a "double-headed monster". Doing ARP protection on personal endpoints, regardless of the gateway end, is not a complete approach in itself. The role of ARP Personal Firewall is to prevent your data from being stolen, and the entire network problems, such as disconnection, stuck, etc., ARP Personal Firewall is powerless.

    Our company's previous network also had this problem, and later used the Xinbi Attack Flame Immune Security Gateway to upgrade the ordinary network to the immune network, and carried out anti-regret virtual control monitoring from the bottom layer of the network and each terminal, which can not only prevent the local machine from being attacked, but also intercept the external network attack of the local machine, strengthen the basic security of the network, and completely and effectively solve the problem of intranet attack.

  4. Anonymous users2024-02-03

    First of all, let's tell you how ARP attacks:

    First, the host of the intranet pretends to say: "I am the gateway, send me all the data", resulting in the traffic of the host of the intranet being sent to the virus host, resulting in the entire intranet not being able to go to the network.

    Second, host A pretends to be host B on the private network, causing host A's traffic to point to B

    These two methods are based on the ARP protocol, the ARP protocol is the intranet host resolution protocol, itself is legitimate, so no one to block it, but if it is sent spamously, it will cause network blockage, the intranet produces flood packet attacks, garbage packets block the entire network, a computer can send 80 trillion data per second, believe it or not?

    In your case, it is likely that the host on the intranet has a hidden danger of ARP, but it is not particularly obvious, and there is garbage data blocking the network port, but it does not make all the hosts in the intranet unable to go to the network, but causes slow Internet speed.

    The ARP firewall here is bound to the IP address of the LAN port of the router is the IP address of the gateway, such as the MAC address of the LAN port, but there is an ARP virus in the intranet, and he is also calling "I am, when our machine wants to send data to him, the ARP firewall checks that the MAC address for this purpose is not the LAN port MAC of the router bound before, so it is blocked, and it is recommended that you go to the immune network."

    The immunity wall is specifically for LAN security and management, and we can think of the immunity wall as such.

    1. It is a set of intranet underlying firewall: it completely solves the network attack of viruses and Trojans, disconnection and stuck problems (especially for the processing of layers). Solving the problem of ARP (Innate Immunity, ARP Exploration) is unmatched.

    2. It is a set of real identity access system: strict and effective management of the identity of the terminal computer in the network (real IP, MAC, CPU hard disk, motherboard, genetic). Completely solve IP spoofing (private cables, cloning, IP conflicts).

    3. It is a set of network bandwidth management equipment: fine intranet bandwidth management, load balancing, and traffic statistics (intranet and intranet, server, application delivery).

    4. It is a comprehensive network management software: observe the internal protocol process of the network, remote debugging management (monitoring center, audit).

    4. It is a comprehensive network management software: observe the internal protocol process of the network, remote debugging management (monitoring center, audit).

  5. Anonymous users2024-02-02

    If it is an ARP attack, it can't be solved by software alone, and many people still think that the ARP firewall is fine. Isn't this the same as shutting down your computer for a year and starving the virus to death? Can't fix it, arp

  6. Anonymous users2024-02-01

    Your ARP firewall's trust gateway is automatically acquired, right? That's not going to work. To manually get the gateway of the main router, click "Start-Run" and enter cmd, and enter arp -d in it.

    Then restart the computer, and the eight achievements are ready.

  7. Anonymous users2024-01-31

    For example, if I impersonate the server and send a large number of ARP request packets, then a large number of ARP response packets will be sent to the server, which will cause the server to crash and have problems. These are all very simple examples, they are all exploiting the inherent vulnerabilities of the Ethernet protocol, and it will be very troublesome to encounter them!! To completely solve the problem of interception from the terminal network card, the genetic terminal network card binding, strict control and audit of identity, and strict verification and envelope of any data sent to ensure your network security and stability.

Related questions
4 answers2024-02-28

Some time ago, our company was also attacked, the reason is that the employee received and clicked on the virus, which once paralyzed the company's intranet. >>>More

13 answers2024-02-28

It's normal for my ARP firewall old prompt to be attacked! You don't have to try to intercept it. What's more, hackers abound now, intercepting one, but not ten thousand. >>>More

11 answers2024-02-28

Turn off the firewall on Android phonesMethod 1.

1. If the firewall is not built by the system, but is installed by you, directly in the settings options, select Applications--Manage Applications, find the firewall program, and uninstall and restart it directly. >>>More

10 answers2024-02-28

I also found out that the path is in C: documents and settings administrator local settings temp >>>More

17 answers2024-02-28

My personal opinion, it's better to install it, Norton is an antivirus software, it's a remedy, and the firewall is for you to see the door Do you think it's better not to let the virus in or to kill it again, it's up to you to choose it, it's better to double insurance