Does your network often fall off, and does IP conflicts often occur?
Are you worried that communication data will be monitored (such as MSN, QQ, EMAIL)?
Is your network speed limited by network management software (such as Jusheng Network Management and P2P Terminator)?
Are you suffering from various ARP attack software (such as network law enforcement officers, network scissors hands, LAN terminators)?
The root of the above problems is ARP spoofing (ARP attack). Before ARP spoofing, the data flow was like this: the gateway <->native machine. After ARP spoofing, the data flow is as follows: the gateway attacker ("network management")<->Native machine, all communication data between the local machine and the gateway will flow through the attacker ("network management"), so it is inevitable that "at the slaughter of others".
By intercepting false ARP data packets at the system kernel layer and actively notifying the correct MAC address of the gateway unit, the ARP firewall can ensure the correct data flow without going through a third party, thus ensuring the security of communication data, ensuring the smooth network, and ensuring that the communication data is not controlled by the third party, thus perfectly solving all the above problems.
Nine functions of ARP firewall
1. Intercept ARP attacks.
(A) Intercept external false ARP data packets at the system kernel layer to ensure that the system is not affected by ARP spoofing and ARP attacks, and keep the network smooth and communication secure;
(B) Intercept the local ARP attack packets external to the machine at the core layer of the system to reduce the trouble caused by external attacks to users after infecting malicious programs;
2. Intercept IP conflicts. Intercept IP conflict data packets at the system kernel layer to ensure that the system is not affected by IP conflict attacks;
3. Dos attack suppression. Intercept the external TCP SYN/UDP/ICMP/ARP DoS attack packets from the local machine at the core layer of the system, and locate programs that maliciously launch DoS attacks to ensure the smooth operation of the network;
4. Safe mode. Except for the gateway, it does not respond to ARP Requests sent by other machines, achieving stealth effects and reducing the chance of ARP attacks;
5. ARP data analysis. Analyze all ARP packets received by the machine, grasp network dynamics, and find potential attackers or poisoned machines;
6. Monitor ARP cache. Automatically monitor the ARP cache table of the native machine. If it is found that the gateway MAC address is tampered with by malicious programs, it will be alarmed and automatically repaired to keep the network smooth and communication secure;
7. Active defense. Actively maintain communication with the gateway and inform the gateway of the correct MAC address to keep the network smooth and communication secure;
8. Track the attacker. After the attack behavior is discovered, the attacker's IP address will be automatically and quickly locked;
9. Check and kill ARP virus. When it is discovered that the machine has external attacks, it will automatically locate malicious programs and virus programs infected by the machine.
Are you worried that communication data will be monitored (such as MSN, QQ, EMAIL)?
Is your network speed limited by network management software (such as Jusheng Network Management and P2P Terminator)?
Are you suffering from various ARP attack software (such as network law enforcement officers, network scissors hands, LAN terminators)?
The root of the above problems is ARP spoofing (ARP attack). Before ARP spoofing, the data flow was like this: the gateway <->native machine. After ARP spoofing, the data flow is as follows: the gateway attacker ("network management")<->Native machine, all communication data between the local machine and the gateway will flow through the attacker ("network management"), so it is inevitable that "at the slaughter of others".
By intercepting false ARP data packets at the system kernel layer and actively notifying the correct MAC address of the gateway unit, the ARP firewall can ensure the correct data flow without going through a third party, thus ensuring the security of communication data, ensuring the smooth network, and ensuring that the communication data is not controlled by the third party, thus perfectly solving all the above problems.
Nine functions of ARP firewall
1. Intercept ARP attacks.
(A) Intercept external false ARP data packets at the system kernel layer to ensure that the system is not affected by ARP spoofing and ARP attacks, and keep the network smooth and communication secure;
(B) Intercept the local ARP attack packets external to the machine at the core layer of the system to reduce the trouble caused by external attacks to users after infecting malicious programs;
2. Intercept IP conflicts. Intercept IP conflict data packets at the system kernel layer to ensure that the system is not affected by IP conflict attacks;
3. Dos attack suppression. Intercept the external TCP SYN/UDP/ICMP/ARP DoS attack packets from the local machine at the core layer of the system, and locate programs that maliciously launch DoS attacks to ensure the smooth operation of the network;
4. Safe mode. Except for the gateway, it does not respond to ARP Requests sent by other machines, achieving stealth effects and reducing the chance of ARP attacks;
5. ARP data analysis. Analyze all ARP packets received by the machine, grasp network dynamics, and find potential attackers or poisoned machines;
6. Monitor ARP cache. Automatically monitor the ARP cache table of the native machine. If it is found that the gateway MAC address is tampered with by malicious programs, it will be alarmed and automatically repaired to keep the network smooth and communication secure;
7. Active defense. Actively maintain communication with the gateway and inform the gateway of the correct MAC address to keep the network smooth and communication secure;
8. Track the attacker. After the attack behavior is discovered, the attacker's IP address will be automatically and quickly locked;
9. Check and kill ARP virus. When it is discovered that the machine has external attacks, it will automatically locate malicious programs and virus programs infected by the machine.