Quantcast
Channel: Question and Answer » network-access-control
Browsing latest articles
Browse All 15 View Live

How can I set up DHCP so that domain devices get a certain block of IP...

Is there a way for me to set up DHCP so that only domain devices get an IP Address from a certain subnet, say 192.168.12.x, and other non-domain devices would be assigned to a different subnet? Edit:...

View Article


Such a thing as too much network segregation?

One of the biggest points of friction I see between networking teams, security teams, and users is around the idea of network segregation. For instance, the network team wants to isolate everyone...

View Article


Deny attacker access to my router

I was experiencing very low connectivity on my wireless, so I checked the router logs. Here’s what I saw: Jul 09 11:07:24 Per-source ACK Flood Attack Detect (ip=74.125.130.129) Packet Dropped Jul 09...

View Article

How to restrict access to the internet for some computers on the network?

I’d like to differentiate machines (or, possibly, users) on my small business network so that only some of them have access to the internet. The solution I’ve been using to this day is quite terrible:...

View Article

Prevent fake gateway device attached to PC's network card

Office. Several PCs with Linux. Internet is limited on gateway level, so nobody could do POST-requests over HTTP. We prepared several measures to prevent data leakage on infrastructure level, but...

View Article


What is East-West traffic [closed]

I’ve heard the terms East-West and North-South mentioned in respect to network traffic or network design. What does it refer to and in what scenarios is it relevant?

View Article

What's the best way to block all external proxy IP's which could be used for...

At the simplest form – the question is to block external proxy due to an emergency situation due to which management have forced technical teams to get a solution to block all the external proxy or...

View Article

How well is 802.1x-2010 generally supported?

I have often come across 802.1x (2004) deployments in internal company networks. The problem with that protocol is that after the handshake, the network traffic is not encrypted. This means that, for...

View Article


Could this piece of code be harmful ?

I just wrote these 2 functions in C#.net and it can get any user’s system IP and MAC address. Isn’t this harmful since I got help from microsoft documentation. Could these lead to potential damage or...

View Article


Using Digital Signatures in isolated networks

Is it possible to use Digital signatures in isolated environments which do not have access to internet and work only on internal network. How does the certificate authentication happen in such case

View Article
Browsing latest articles
Browse All 15 View Live