如何设置ip策略使别人ping不通自已Howto set IP strategy tomake others Ping impassability
By default, all Internet control message protocol (ICMP)options are disabled. If the ICMP option is enabled, yournetwork will be visible in Internet and vulnerable to attack.If you want to enable ICMP, must be as an administrator or amember of the Administrators group on computer, right-click onthe "network neighborhood", on the shortcut menu, select"properties" to open the "network connection", selectedconnection enabled the Internet connection firewall, open theproperties window, and switch to the "advanced" tab. Click the"Settings", then the "advanced settings" dialog window, in the"ICMP" tab, check that type of response to a request forinformation from your computer, check the box next to the tableto enable this type of request, such as to disable thecorresponding request please clear the type of information canbe.
Two, use network firewall to block Ping
Usingfirewalls to blockPing is the simplest andmost effectiveway, and now basically all firewalls have enabled ICMPfiltering by default. Here, with Kingsoft net 2003 and Skynetfirewall 2.50 edition for blue, originally explained.For the use of Kingsoft Internet Security 2003 users, pleaseright-clickmouse Kingsoft 2003 icon in the system tray, selectthe "utility" in the "custom IP rules editor on the shortcutmenu, select the type of ICMP attack defense rules" in the
window that appears, allowing others to eliminate "thedetection" rules with the ping command to save the applicationafter effect.
If you are using a Skynet firewall, in the main screen clickon "custom IP rules", and then uncheck "to prevent others fromusing the ping command detection rule, check the" defense ICMPattack"rules, and then click" save/application"to IP rules.Three, enable IP security policy, prevent Ping
The IP security mechanism (IP Security) , that is, the IPSecpolicy, is used to configure IPSec security services. Thesepolicies provide various levels of protection for mostcommunication types in most existing networks. You canconfigure IPSec policies to meet the security needs of yourcomputer, application, organization, unit, domain, site, orglobal enterprise. You can use the Windows XP in the "IPsecurity policy management unit for Active Directory in thecomputer (for domain members) or the local computer (for do notbelong to the domain of computer) definition of IPSec strategy.Here, for example, WINDOWS XP, through the "control panel" -"management tool" to open the "local security policy", selectthe IP security policy, where we can define their own IPsecurity policy. A IP security filter consists of twocomponents: filtering policies and filtering operations. Tocreate anew IP security filter, youmust create a newfilteringstrategy and filtering operation of its own, right click on theleft sideof thewindowof the"IP securitypolicies on the localmachine", select "create IP security strategy" on the shortcut
menu, click next, and then enter the name and description ofstrategy strategy. Click next to select the activate thedefault response rule check, and then click next". Startsetting response rule authentication method, select the stringused to protect key exchange (pre shared key) "option, and thenenter some characters (these characters will be used later) ,click"next ", itwill prompt the completed IP security strategy,confirm select the check box, click edit properties the" finish"button, the dialog box will open.
Next, you will configure the new security policy. In "GoodbyePing properties" dialog window "rules" in the options page,click the Add button, and in turn the Safety Rules Wizard, clicknext to the end of the tunnel set here, "this rule does notspecify the tunnel". Click next, and select all networkconnections to make sure that all computers are Ping blocked.Click next to set authentication mode,
As above, select the third option. This string is used toprotect the key exchange (pre shared key) and fill in the samecontent as before. Click "next" to open the "IP filter list"window"in the IP filter list" and select "new IP filter list,click on the right side of the" Edit ", click" in the windowthat appears to add ", click" next ", " set the source addressfor "my IP" address ", click"next ", set up the target addressfor any" IP address ", click" next ", select the protocol typefor ICMP, click" finish "and then click" OK "to return to thewindow as shown in Figure 9, click next, select the filteraction for" safety requirements "option, and then click" next", " complete ", " OK ", " close "button to save the settingsrelated to the return management console.
Finally, in the local security settings, right-click theconfiguration of the "Goodbye Ping" strategy, select
"assigned" command on the shortcut menu to apply thisconf igurat ion.
After the settings above, when other computers Ping thecomputer, there is no Ping connection. But if you are Ping localcomputer, you can still Ping. In Windows 2000, the operationis basically the same.
Four, modify the TTL value, prevent Ping
Many invaders love to judge the operating system by the TTLvalue, they will first Ping of your machine, such as see theTTL value of 128 that your system is Windows NT/2000, if theTTL value of 32 is that the target host operating system forWindows 95/98, if 255/64 is that UNIX/Linux operating systemfor the TTL value. Since the intruder believes in the resultof the TTL value, then we might as well modify the TTL valueto deceive the intruder and achieve the purpose of protectingthe system. Method is as follows:
Open the Notepad program that comes with Windows, and write thebatch command as follows:
@echo REGEDIT4>>ChangeTTL.reg
@echo.>>ChangeTTL.reg
@echo
[HKEY_LOCAL_MACHINESystemCurrentControl SetServicesTcpipParameters]>>ChangeTTL.reg
@echo DefaultTTL=dword:000000ff>>ChangeTTL.reg
@REGEDIT /S /C ChangeTTL.reg
In order to save as a.Bat extension of the batch file, clickon the file, the default value of the TTL operating system youwill be modified for FF, 255 decimal, namely your operatingsystem artificially changed to UNIX system!
DefaultTTL=dword:000000ff is used to set the default value ofthe TTL system, if you want to own the TTL operating system toother operating system of the ICMP echo reply, please changethe DefaultTTL key, should pay attention to its value as 16hexadecimal.
How to prohibit others Ping own host (2000 comes)
My computer-control panel -management tools-local securitypolicy, -ip security policy
This is the 2000 to our configuration IP management tool, I'mhere to say only how to ban others, Ping my host.
There are four steps:
1. Set up a no Ping rule
2. Establish a rule of prohibition / permission
3. Tie the two rules together
4. Assign
Detail:
1. Right click the IP security policy management IP filter listsand filter -ip filter list - added: Name: Ping; Ping;Description: (check"use addWizard") , -added-the next step:Specifies the source / destination IP, protocol type (ICMP) ,the next step to complete, closed this dialog box.
2. Manage the IP filter list and filter operations - managefilter actions-add (check the use of add wizard) -next: Name:refuse; Description: refuse--, next: stop - next, untilcomp let ion.
3. Right click the IP Security Policy- create the IP SecurityPolicy - next: Name: Ping; next: deactivate the defaultresponse rule - next: select the edit attribute selected -finish.
Then add the attribute Ping "" no - (check "use add Wizard")-the next step until the "authentication method"; choose third,enter a shared string - the next step: in the IP filter listand choose "ping-- the next step:" the next step to completerefuse-.
This is your "local security settings" on the right, you willsee "Ping forbid" this rule, but now he has not worked.
4. Right click "no Ping" -- assign.
This time, a IP strategy for banning others from Ping' s ownmachines has been completed.
Try to find a machine, your machine does not work. Will prompt:request timeout (timeout)
The above is only a small IP filter. You can make other IPstrategies yourself
港云网络官方网站商家简介港云网络成立于2016年,拥有IDC/ISP/云计算资质,是正规的IDC公司,我们采用优质硬件和网络,为客户提供高速、稳定的云计算服务。公司拥有一流的技术团队,提供7*24小时1对1售后服务,让您无后顾之忧。我们目前提供高防空间、云服务器、物理服务器,高防IP等众多产品,为您提供轻松上云、安全防护。点击进入港云网络官方网站港云网络中秋福利1元领【每人限量1台】,售完下架,活...
俄罗斯vps速度怎么样?俄罗斯vps云主机节点是欧洲十大节点之一,地处俄罗斯首都莫斯科,网络带宽辐射周边欧洲大陆,10G专线连通德国法兰克福、法国巴黎、意大利米兰等,向外连接全球。俄罗斯vps云主机速度快吗、延迟多少?由于俄罗斯数据中心出口带宽充足,俄罗斯vps云主机到全球各地的延迟、速度相对来说都不错。今天,云服务器网(yuntue.com)小编介绍一下俄罗斯vps速度及俄罗斯vps主机推荐!俄...
ZJI原名维翔主机,是原来Wordpress圈知名主机商家,成立于2011年,2018年9月更名为ZJI,提供香港、日本、美国独立服务器(自营/数据中心直营)租用及VDS、虚拟主机空间、域名注册业务。ZJI今年全新上架了台湾CN2线路服务器,本月针对香港高主频服务器和台湾CN2服务器提供7折优惠码,其他机房及产品提供8折优惠码,优惠后台湾CN2线路E5服务器月付595元起。台湾一型CPU:Inte...