(& amp; quot; Network law enforcement officer & amp; quot; It is a LAN management assistant software, which adopts the network bottom layer protocol and can penetrate each client firewall to monitor each host in the network (in this paper, the host refers to various computers, switches and other network equipment equipped with IP); Network card number (MAC) is used to identify users, with high reliability; The software itself occupies less network resources and has no adverse impact on the network& amp; amp; lt; br& amp; gt; The software does not need to run on the specified server. Running on any host in the network can effectively monitor all networks connected to the computer (support multi network segment monitoring). The main functions are as follows: & amp; lt; br& amp; gt; 1、 Record online users in real time and archive for future reference & amp; lt; br& amp; gt; Any host in the network will be detected and recorded by the software in real time upon startup. The network card number, IP used, online time, offline time and other information will be automatically and permanently saved for query. The query can be conducted according to various conditions, and fuzzy query is supported. With this function, the administrator can know at any time whether any host is powered on, how long it is powered on, which IP, host name and other important information is used; Or the boot history of any host& amp; amp; lt; br& amp; gt; 2、 Automatically detect unregistered host access and alarm & amp; lt; br& amp; gt; After the administrator registers or the software automatically detects all legitimate hosts, it can make settings in the software to deny all unregistered hosts access to the network. Once an unregistered host is accessed, the software will automatically make permanent records of its MAC, IP, host name, online and offline time periods and other information, and can use voice, send messages to the designated host and other methods to alarm. It can also automatically take control measures for the host, such as IP conflict, isolation from key hosts, isolation from all other hosts in the network, according to the settings of the administrator& amp; amp; lt; br& amp; gt; 3、 Limit the IP of each host to prevent IP theft & amp; lt; br& amp; gt; The administrator can specify an IP or a segment of IP for each host. When the host adopts an IP that is out of range, the software will determine it as & amp; quot; Illegal user & amp; quot;, It is automatically controlled in the way specified by the administrator in advance, and its MAC, IP and host name are recorded for future reference. The administrator can specify in advance such management methods as IP conflict, isolation from key hosts and isolation from all other hosts for illegal users& amp; amp; lt; br& amp; gt; 4、 Limit the connection period of each host & amp; lt; br& amp; gt; The administrator can specify the time period that each host is allowed to connect to the network or is not allowed to connect to the network every day (two time periods can be specified, such as 8:30-12:00 and 13:30-5:00 every day to connect to the network), and can specify whether each user is allowed to connect to the network every Saturday and Sunday. For users who violate the regulations, the software will judge them as illegal users, automatically record them and manage them in the way specified by the administrator in advance. The management mode can also be IP conflict, isolation from key hosts, isolation from all other hosts, etc& amp; amp; lt; br& amp; gt;& amp; amp; lt; br& amp; gt; In a word, the main function of this software is to monitor the whole LAN in real time according to the authority limited by the administrator for each host, and automatically manage the illegal users. It can isolate the illegal users from some hosts in the network or the whole network, and no matter what kind of firewall the hosts in the LAN run, it can not escape the monitoring, nor cause firewall warnings, which improves the network security. The administrator only needs to set the permissions of each host and the management method after violating the permissions according to the actual situation to realize some specific functions, such as prohibiting some hosts from accessing the Internet within a specified period of time or completely prohibiting some hosts from accessing the Internet; Protect the key hosts in the network, allow only the specified hosts to access, and so on. This document contains the following attachments:
Select the most practical and easy-to-use 10GB software
Select the most practical and easy-to-use 10GB software)