当前位置:网站首页>What is the principle of Ping? How does the server disable Ping?

What is the principle of Ping? How does the server disable Ping?

2022-06-24 04:32:00 User 8715145

The study found that , Now many attackers can penetrate enterprise content by scanning , Steal information resources by destroying servers , The network system of small and medium-sized enterprises is not perfect , The internal and external networks have not made a perfect layout , This leads to frequent network attacks , that Ping What is the principle of ? How the server prohibits ping

Ping What is the principle of

Ping Is based on ip Agreement to work , It usually sends a data report to the target host first , Once the host sends the feedback report , That means ping The network of the target host can be interconnected , From this feedback report ,ping Can get the information of the target host ip Address and other controllable information , In this way, data packets can be created , Change program , attack , How can the enterprise server prohibit ping?

How to prohibit ping

How to disable the enterprise server ping? It can be forbidden through the firewall , First you need to get into “ Control panel ”, find “ Management tools ” Back entry “ Advanced security firewall ”, After clicking on “ Inbound rules ”, It is forbidden to ping function , Make the system unable to respond to service requests , The effect of this rule change is , Outside the station ping When you initiate an induction to an enterprise , Internal computers do not send feedback reports , In this way, the resource security of the enterprise is protected .

How the server prohibits ping? The above has been briefly introduced to you , Whatever the size of the enterprise , Are facing the possibility of being attacked , To ensure that the enterprise network is in a secure state , To prevent attacks by external hackers , It is suggested that enterprises prohibit ping, And regularly invite professional network operation and maintenance companies to check and optimize , So as not to lure hackers with expired data such as encoding .

原网站

版权声明
本文为[User 8715145]所创,转载请带上原文链接,感谢
https://yzsam.com/2021/09/20210910105548744T.html