-
If you want to completely solve the ARP problem and install a firewall, is it not possible? ARP must be controlled by the group, the firewall can only prevent your own computer from being attacked, not to mention that many ARP Trojans now ignore the firewall, fundamentally cannot be controlled, and the source of the attack cannot be found at all.
At present, the best for ARP prevention and control is the Xinxiang immune network solution, which has a gateway to ARP innate immunity through a special pair protocol, terminal.
Equipped with an immunity driver, it reads the MAC address burned on the network card, intercepts excessive ARP packets, and the gateway monitoring center can monitor each machine.
-
Indeed, LZ has done a very good job of protection there.
But why can't it be solved?
The reason for this is that your network is not an immune network, only under the immune network, all kinds of DDoS attacks such as ARP attacks on your intranet, skulls, IP fragments, etc., will be effectively intercepted, so as to ensure that your network is not difficult to manage, and fundamentally ensure the robustness of your network.
Hope to give you effective help.
-
The landlord's double binding may work when it is in the first generation of ARP, and there is nothing that can be done in the face of the second generation of ARP, and the second generation of ARP will first empty the binding and then attack, so the binding is now powerless, and then the firewall, the firewall is to read information from the system, if the information in the system is wrong, then the information obtained by the firewall is also wrong, not only can not prevent it from becoming **, there is also a restriction on QQ, MSN, BT, etc., This is only a restriction on the application layer, like ARP is a data link layer protocol, is the underlying protocol, the reason is the vulnerability of Ethernet and is not good at management, in order to prevent ARP to manage the bottom layer, now there is an immune wall, it is installed in each terminal immunity driver, read information directly from the network card, and manage the data sent, intercept false information, because ARP attack is to send a large number of false information, so it can be intercepted very well.
-
Maybe others are also victims The mentality should be good, and all the people in the network are insiders, and they will not toss this.
If you have to contact your network manager, there must be a solution and it's not difficult, but it's very troublesome.
For example, use a fixed IP, bind an IP address to a Mac, or kill your or a friend's computer at the same time.
ARP can be divided into as many as 7 at the moment.
1. ARP spoofing (gateway, PC). >>>More
Aesthetic Critique 6 Achievements and Influences.
The software is not good, why not negotiate directly with the landlord, please set it on the route, the landlord can't always look at his LAN attack, unless he deliberately makes it difficult for you Personally, I think it must be multiple people competing for network bandwidth Using some means, no one will have nothing to do with the sabotage, it is recommended that everyone discuss the speed limit for everyone** Try to watch less network TV Or inform the other party so as not to attack each other and cause inconvenience to yourself and others.
The LAN is always unstable, and the network is disconnected one after another. The ARP virus killing process is carried out in the local area network. To find out the root cause of the virus, first open all the computers in the local area network, and then ** a tool called "antiarpsniffer", which is an ARP firewall software, which obtains the IP address and MAC address of the poisoned computer by intercepting fake ARP packets at the system kernel layer. >>>More
In general, the final solution is to statically set your IP address with the physical address of your computer, because a network card has a unique MAC address. >>>More