Computer a dozen small companies and the current situation is any cable insert any computer company, DHCP server to assign IP router and can connect to the Internet, need to manage the Internet computer, prohibited without permission, if not on the router Settings, can use other equipment or software, solutions,
CodePudding user response:
Why not use the router Settings?
In theory with the router Settings is the cheapest, the most simple, the fastest solution,
Can get this done in https://item.jd.com/4619251.html that was the 699 other methods would tell you about a half a day
Tired!
CodePudding user response:
reference 1/f, the gray Wolf immature response: why not use the router Settings? In theory with the router Settings is the cheapest, the most simple, the fastest solution, Can get this done in https://item.jd.com/4619251.html that was the 699 other methods would tell you about a half a day Tired! Router is a huawei, can bind the MAC, but not very humanized interface, such as which MAC is who's name is not, still have to another record, want to find a third party and subsequent monitoring can do, even if in the routers can also be used CodePudding user response:
refer to the second floor lee0623 response: Quote: refer to 1st floor wolves immature response: Why not use the router Settings? In theory with the router Settings is the cheapest, the most simple, the fastest solution, Can get this done in https://item.jd.com/4619251.html that was the 699 other methods would tell you about a half a day Tired! Router is a huawei, can bind the MAC, but not very humanized interface, such as which MAC is who's name is not, still have to another record, want to find a third party and subsequent can do monitoring and so on, even if in the router can also use the Now that can bind to the MAC, then close the MAC IP by DHCP only allow binding then every computer macip binding also creates uniqueness because no binding IP impassability Oneself use electronic files to save a copy of a computer and IP belong to a post or staff use good So you can just compare the You said, who's name Methods more additional registration is actually the most simple and rapid By the way, 100-500 small and medium-sized enterprises to control the whole way 1. The username configuration control uniqueness can only use your AD domain assigned account password to log in and you can register who this man was and he couldn't make system change to install the software to change the IP need to find you 2. The file server involved in the company's related documents must be stored on the server retained (document control process plan, your company planning) as to put him not to put your computer not to interfere in Walk by - AF behavior management 3. Network equipment - layer 3 switches (AF can do vlan, three layers can be cancelled, on-demand) IP subnet with 255.255.254.0 plan such as 192.168.1.10-192.168.1.20 necessarily purchasing to use and only binding MAC address can ping Finish above has completed the system user configuration register using personnel requirements such as document control network access IP MAC uniqueness and then made qos personal AF for department PS: remember, you bind the MAC but not enable MAC filtering does not make sense as long as the MAC and IP binding and then open the MAC filtering (can only through the binding of MAC) Then with AF control web behavior huawei has a 6101 can CodePudding user response:
The easiest way for me the way to control oneself make a demand Please professional network debugging results give a good 300 dollars went Why so trouble ~ ~ ~ ~ CodePudding user response:
MAC address binding, or also can do a web page certification, CodePudding user response:
reference wolves immature reply: 3/f Quote: refer to the second floor lee0623 response: Quote: refer to 1st floor wolves immature response: Why not use the router Settings? In theory with the router Settings is the cheapest, the most simple, the fastest solution, Can get this done in https://item.jd.com/4619251.html that was the 699 other methods would tell you about a half a day Tired! Router is a huawei, can bind the MAC, but not very humanized interface, such as which MAC is who's name is not, still have to another record, want to find a third party and subsequent can do monitoring and so on, even if in the router can also use the Now that can bind to the MAC, then close the MAC IP by DHCP only allow binding then every computer macip binding also creates uniqueness because no binding IP impassability Oneself use electronic files to save a copy of a computer and IP belong to a post or staff use good So you can just compare the You said, who's name Methods more additional registration is actually the most simple and rapid By the way, 100-500 small and medium-sized enterprises to control the whole way 1. The username configuration control uniqueness can only use your AD domain assigned account password to log in and you can register who this man was and he couldn't make system change to install the software to change the IP need to find you 2. The file server involved in the company's related documents must be stored on the server retained (document control process plan, your company planning) as to put him not to put your computer not to interfere in Walk by - AF behavior management 3. Network equipment - layer 3 switches (AF can do vlan, three layers can be cancelled, on-demand) IP subnet with 255.255.254.0 plan such as 192.168.1.10-192.168.1.20 necessarily purchasing to use and only binding MAC address can ping Finish above has completed the system user configuration register using personnel requirements such as document control network access IP MAC uniqueness and then made qos personal AF for department PS: remember, you bind the MAC but not enable MAC filtering does not make sense as long as the MAC and IP binding and then open the MAC filtering (can only through the binding of MAC) Then with AF control web behavior huawei has a 6101 can Monitoring the 6101 can do, and see what has seen online, blocking access to which sites, banned what program on the Internet such as qq CodePudding user response:
reference 5 floor weixin_45732535 reply: MAC address binding can also, or to do a web page also can certification, Web authentication words what solution is better CodePudding user response:
Make a web page in routing authentication or real-name binding Mac address or make a soft routing, can, only a few people actually very simple management, CodePudding user response:
refer to the eighth floor weixin_45778687 response: in routing a web authentication or real-name binding Mac address or make a soft routing, can, only a few people, actually very simple management routing in the certification of router resources consumption big, web page if the mobile end CodePudding user response:
Routing resource consumption is not big, web authentication of PC and mobile phone, after the authentication can normal Internet access, note: what is the need to see your certification style) CodePudding user response:
refer to 6th floor lee0623 response: Quote: refer to the third floor wolves immature response: Quote: refer to the second floor lee0623 response: Quote: refer to 1st floor wolves immature response: Why not use the router Settings? In theory with the router Settings is the cheapest, the most simple, the fastest solution, Can get this done in https://item.jd.com/4619251.html that was the 699 other methods would tell you about a half a day Tired! Router is a huawei, can bind the MAC, but not very humanized interface, such as which MAC is who's name is not, still have to another record, want to find a third party and subsequent can do monitoring and so on, even if in the router can also use the Now that can bind to the MAC, then close the MAC IP by DHCP only allow binding then every computer macip binding also creates uniqueness because no binding IP impassability Oneself use electronic files to save a copy of a computer and IP belong to a post or staff use good So you can just compare the You said, who's name Methods more additional registration is actually the most simple and rapid By the way, 100-500 small and medium-sized enterprises to control the whole way 1. The username configuration control uniqueness can only use your AD domain assigned account password to log in and you can register who this man was and he couldn't make system change to install the software to change the IP need to find you 2. The file server involved in the company's related documents must be stored on the server retained (document control process plan, your company planning) as to put him not to put your computer not to interfere in Walk by - AF behavior management 3. Network equipment - layer 3 switches (AF can do vlan, three layers can be cancelled, on-demand) nullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnull