-
Is there a route? Bind with MAC address and IP address, brother.
-
Next software. That's it. It's like an internet café.
-
You're going to change your Mac just to keep them from surfing the internet. Make a ** server. MAC+IP+hostname triple confirmation.
Use**. Give them access to the Internet. Unless someone doesn't let themselves get online.
Give it to others. Such. He can't do it. ,
-
Set it to allow only Macs from the list to access the Internet.
-
Did you change the network card on your computer?
This is due to the MAC address of your previous network card recorded on the router, and you can react with the school's network administrator!
-
This problem also exists in our company, we bind the MAC to the IP in the firewall, but someone modifies the MAC address to surf the Internet. I think there are two ways: 1. Using management software, we use NetAsia.
If you modify the MAC address, you will be prompted in the software. 2. You can add a device, and this device will have the permission of a third party to access the Internet. In this way, even if you change the MAC address, you will not get the permission of the third party.
As for modifying the registry, I've tried it before. It can only prevent the network connection from being opened, but cannot change the IP address.
If you have new ideas, we hope to exchange them with each other.
-
MAC is the NIC address. There is only one setup per setup, and it is assigned by the manufacturer at the time of production. We, the users, can't change it.
-
If you configure an IP-MAC binding on the switch, if you change the MAC address, you can't even connect to the LAN.
-
The MAC address needs to be masked by a switch with network management function... It's not clear through the server. If you are not in the same network segment, you should be able to know his IP address. Blocking him via IP is also possible.
-
Solve it with the arp command!
For example, mac: 11-22-33-44-55-66arp -s as long as it's not 111) 11-22-33-44-55-66
arp -s 11-22-33-44-55-xx (as long as it's not the same as 66).
If not, you can only wait for the master downstairs!
-
Choose any computer in a Layer 2 switched network to run the Cyber Enforcement Officer:
Cyber Enforcement Officer Operating Environment.
1. Network environment.
This software can be applied to a variety of local area networks, compatible with a variety of hubs, servers and most of the switches, but in some of the switching networks with the "layer three switching" function turned on will not be able to monitor normally, this software can not be cross-network by the machine, server, gateway and other equipment to monitor another LAN.
Second, the hardware environment.
For example, if the number of users is 255, it is recommended that the machine running this software should have no less than the following configurations: PII800 CPU, 128M memory, and 100M NIC (10M 100M adaptive NIC is commonly used on the market, usually running in 100M state). If you want to monitor more users, you need to increase the machine configuration accordingly.
3. Software environment.
This software supports Microsoft Windows 9X versions, Windows 2000 versions, and Windows XP versions. It is recommended to use the Windows 2000 operating system, and it is recommended not to run large service programs on the machine at the same time, especially those that occupy a large amount of network bandwidth, so as not to cause monitoring delays.
3. Miscellaneous. It is recommended not to run this software on multiple network card machines such as servers and gateways. Since this software will not refuse the connection between each user and itself, when running on the ** server or gateway, it will connect to the local area network and the external network, so it will not be able to block illegal users from the external network.
Batch IP-MAC binding.
The registered version can specify the IP used by multiple users at once. Select multiple users in the "User List", then right-click and select "IP-MAC Binding" from the context menu. This function has the same effect as setting the restricted IP address for each user on a case-by-case basis, and is suitable for quickly assigning permissions to multiple users.
Note that this will change the IP and time slot settings of the selected user.
Locking is when an administrator temporarily disconnects a user from a critical host or all other hosts. There are three lockout states for each user: unlocked, semi-locked (disabling connection with key hosts), and full locking (disabling connection with all hosts). You can also change the user's lock status in the "Lock Unlock" item in the right-click menu; If multiple users are selected, you can also change the lock status of users in bulk in the "Lock Unlock" item in the context menu.
-
Run Cyber Enforcer on a server.
-
Because of the binding MAC address, you change the computer or change the network card, there is no account, I don't know your network environment, and the network administrator or operator will react. You can also try to manually change the MAC address, right-click on the desktop "My Computer" - Properties - Hardware - Device Manager - Network Adapter - Properties of the network card - Advanced - Network Address - There is a value on the right, manually change the MCA address, and then OK, it will take effect after restarting.
-
The reason why this information appears is because the network administrator of your unit has long blocked this idea of yours! People have already bound your MAC address to the legal IP address you applied for! The best thing to do is:
Don't be obsessed, be frank and lenient, and be an honest man! Admit your mistake to your webmasters and ask for their forgiveness!
-
Router... Set up the NIC binding...
This kind of problem arises. It's you who changed the host.。。 Or the network card is changed.
You can change the MAC address by ... to solve this problem.
-
LZ means that you have done MAC address binding and only allow your Macs to go on, but he takes advantage of the fact that you are not pretending to be your MAC address to surf the Internet.
1. In addition to binding your MAC, you'd better set your IP address manually, and bind it together with your IP address.
In this way, even if the MAC is the same, the IP is different, it still can't be used.
Second, there is also the password of all your computers and not let him know.
Third, the router also didn't let him in, and changed the login address of the router so that I didn't believe what the address was that he guessed; You can think of one of your own addresses, and after changing it, your machine must be equipped with the same network segment before you can log in to the router! This is more important, don't you yourself not be able to enter.
Oh oh and, buy a box and lock the router so that he can't touch it if he wants to restore the factory settings, hahaha.
-
It's so simple, since you can ban certain MAC addresses, then you will also let certain MAC addresses pass, right? That's easy: you record the MAC addresses of your machines, log in to the router, and set only these MAC addresses to be accessible, and it won't be useful for him to change the MAC, unless, of course, he knows the MAC address code of one of your machines, and then disguises it.
Don't say anything, let's engage in cyber law enforcement officers.
-
Yes, you can filter Macs, ban only that Mac, and set a password for the route, but there is no lock in the world that cannot be broken. After resetting, the password is gone.
P2P can limit the speed of the Internet and disconnect the network, however, there are also anti-P2P locks, which are basically anti-gentlemen, and cannot prevent villains.
-
Since there is a ban, there should be a permission, you can set the MAC of several of your network cards to allow, and the rest will be automatically banned!
-
Buy one that supports OpenWrt and ban Thunderbolt, BT, eMule and other link networks in it!
-
Respond directly to the administrator, you are not the administrator, and you will not be able to use it if you tell you the method.
-
You try to check your IP address and the MAC address of the network card first, you need to enter "ipconfig all" in the command prompt, and the "physicaladdress" in the display list is the MAC address, and "ipaddress" is the IP address.
To bind the two, enter "arp-sip address mac address", such as "I can only bind the IP and MAC address of one of my own computers, if it is a lot, it is recommended to do IP and MAC address binding on the router, if there is a switch, it is recommended to tie the port as well, which is the safest!"
MAC addressIt is also called a physical addressHardware addressor link address, which is written inside the hardware when produced by a network equipment manufacturer. IP addressThe MAC address is represented in binary in the computer, the IP address is 32 bits, and the MAC address is 48 bits. >>>More
The first three digits of MAC address represent the manufacturer, not the device (e.g., network card, smart switch, router, etc.).
The MAC address is the hardware'A unique identifier on the compilation', which cannot be modified, can only be cloned, and the cloning method is to bind the MAC address on the authentication server. In this case, you can first connect the computer bound to the MAC address to the LAN port of the router (but the router should not connect the wiring provided by the modem or ISP), and then use the MAC address cloning function of the router to copy the MAC address of the NIC to the WAN port of the broadband router. >>>More
The MAC address is the physical address of the NIC, which translates to an IP address? There is no such statement, it can only be said that MAC address and IP address are bound, it is really troublesome to encounter this problem, there are always some people in the residential area network who use some software to engage in ARP fraud, there are many tools to prevent ARP fraud on the Internet, such as anti ARP sniffer, go to Baidu to find it, you can prevent ARP fraud, But now some tools are becoming more and more powerful, and there are many types, each with its own characteristics, it is a little difficult to prevent, and I am also learning about this aspect. Sometimes when I'm annoyed, I fight with them, and I kill this person, I really despise this kind of person, the garbage on the Internet.
Summary. Yes (win7), right-click on the network icon to open the Network and Sharing Center. >>>More