找回密码
 立即注册
邮电通讯系统 2022-06-24 64 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
"网络执法官"是一款局域网管理辅助软件,采用网络底层协议,能穿透各客户端防火墙对网络中的每一台主机(本文中主机指各种计算机、交换机等配有IP的网络设备)进行监控;采用网卡号(MAC)识别用户,可靠性高;软件本身占用网络资源少,对网络没有不良影响。<br>软件不需运行于指定的服务器,在网内任一台主机上运行即可有效监控所有本机连接到的网络(支持多网段监控),主要功能如下:<br>一、实时记录上线用户并存档备查<br>网络中任一台主机,开机即会被本软件实时检测并记录其网卡号、所用的IP、上线时间、下线时间等信息,该信息自动永久保存,可供查询,查询可依各种条件进行,并支持模糊查询。利用此功能,管理员随时可以知道当前或以前任一时刻任一台主机是否开机、开机多长时间,使用的是哪一个IP、主机名等重要信息;或任一台主机的开机历史。<br>二、自动侦测未登记主机接入并报警<br>管理员登记完或软件自动检测到所有合法的主机后,可在软件中作出设定,拒绝所有未登记的主机接入网络。一旦有未登记主机接入,软件会自动将其MAC、IP、主机名、上下线时段等信息作永久记录,并可采用声音、向指定主机发消息等多种方式报警,还可以根据管理员的设定,自动对该主机采取IP冲突、与关键主机隔离、与网络中所有其它主机隔离等控制措施。<br>三、限定各主机的IP,防止IP盗用<br>管理员可对每台主机指定一个IP或一段IP,当该主机采用超出范围的IP时,软件会判定其为"非法用户",自动采用管理员事先指定的方式对其进行控制,并将其MAC、IP、主机名作记久记录备查。管理员可事先指定对非法用户实行IP冲突、与关键主机隔离、与其它所有主机隔离等管理方式。<br>四、限定各主机的连接时段<br>管理员可指定每台主机在每天中允许与网络连接的时段或不允许与网络连接的时段(可指定两个时段,如允许每天8:30-12:00和13:30-5:00与网络连接),并可指定每一用户是否被允许在每个周六、周日与网络连接。对违反规定的用户,软件判其为非法用户,自动记录并采用管理员事先指定的方式进行管理。管理方式同样可为IP冲突、与关键主机隔离、与其它所有主机隔离等。<br><br>总之,本软件的主要功能是依据管理员为各主机限定的权限,实时监控整个局域网,并自动对非法用户进行管理,可将非法用户与网络中某些主机或整个网络隔离,而且无论局域网中的主机运行何种防火墙,都不能逃避监控,也不会引发防火墙警告,提高了网络安全性。管理员只需依据实际情况,设置各主机的权限及违反权限后的管理方式,即可实现某些具体的功能,如禁止某些主机在指定的时段访问外网或彻底禁止某些主机访问外网;保护网络中关键主机,只允许指定的主机访问等等。本资料共包含以下附件:
精选最实用最易用的10GB软件
精选最实用最易用的10GB软件....

(& amp; quot; Network law enforcement officer & amp; quot; It is a LAN management assistant software, which adopts the network bottom layer protocol and can penetrate each client firewall to monitor each host in the network (in this paper, the host refers to various computers, switches and other network equipment equipped with IP); Network card number (MAC) is used to identify users, with high reliability; The software itself occupies less network resources and has no adverse impact on the network& amp; amp; lt; br& amp; gt; The software does not need to run on the specified server. Running on any host in the network can effectively monitor all networks connected to the computer (support multi network segment monitoring). The main functions are as follows: & amp; lt; br& amp; gt; 1、 Record online users in real time and archive for future reference & amp; lt; br& amp; gt; Any host in the network will be detected and recorded by the software in real time upon startup. The network card number, IP used, online time, offline time and other information will be automatically and permanently saved for query. The query can be conducted according to various conditions, and fuzzy query is supported. With this function, the administrator can know at any time whether any host is powered on, how long it is powered on, which IP, host name and other important information is used; Or the boot history of any host& amp; amp; lt; br& amp; gt; 2、 Automatically detect unregistered host access and alarm & amp; lt; br& amp; gt; After the administrator registers or the software automatically detects all legitimate hosts, it can make settings in the software to deny all unregistered hosts access to the network. Once an unregistered host is accessed, the software will automatically make permanent records of its MAC, IP, host name, online and offline time periods and other information, and can use voice, send messages to the designated host and other methods to alarm. It can also automatically take control measures for the host, such as IP conflict, isolation from key hosts, isolation from all other hosts in the network, according to the settings of the administrator& amp; amp; lt; br& amp; gt; 3、 Limit the IP of each host to prevent IP theft & amp; lt; br& amp; gt; The administrator can specify an IP or a segment of IP for each host. When the host adopts an IP that is out of range, the software will determine it as & amp; quot; Illegal user & amp; quot;, It is automatically controlled in the way specified by the administrator in advance, and its MAC, IP and host name are recorded for future reference. The administrator can specify in advance such management methods as IP conflict, isolation from key hosts and isolation from all other hosts for illegal users& amp; amp; lt; br& amp; gt; 4、 Limit the connection period of each host & amp; lt; br& amp; gt; The administrator can specify the time period that each host is allowed to connect to the network or is not allowed to connect to the network every day (two time periods can be specified, such as 8:30-12:00 and 13:30-5:00 every day to connect to the network), and can specify whether each user is allowed to connect to the network every Saturday and Sunday. For users who violate the regulations, the software will judge them as illegal users, automatically record them and manage them in the way specified by the administrator in advance. The management mode can also be IP conflict, isolation from key hosts, isolation from all other hosts, etc& amp; amp; lt; br& amp; gt;& amp; amp; lt; br& amp; gt; In a word, the main function of this software is to monitor the whole LAN in real time according to the authority limited by the administrator for each host, and automatically manage the illegal users. It can isolate the illegal users from some hosts in the network or the whole network, and no matter what kind of firewall the hosts in the LAN run, it can not escape the monitoring, nor cause firewall warnings, which improves the network security. The administrator only needs to set the permissions of each host and the management method after violating the permissions according to the actual situation to realize some specific functions, such as prohibiting some hosts from accessing the Internet within a specified period of time or completely prohibiting some hosts from accessing the Internet; Protect the key hosts in the network, allow only the specified hosts to access, and so on. This document contains the following attachments:
Select the most practical and easy-to-use 10GB software
Select the most practical and easy-to-use 10GB software)

[下载]09555888027.rar




上一篇:局域网速传数据软件
下一篇:远程协助软件