由 husong9 在 01-06-2004 21:35 发表:
电信到底是如何控制只让一台电脑上ADSL的?
我是湖北一个城市的,我们这里电信的ADSL用户一人一个帐号和密码,而且同一时间内一个ADSL帐号只能一台电脑用。现在想一条ADSL线路带多台电脑上网,可是安装了ADSL宽带路由器也不行,安装SYGATE和WINGATE等软件也不行,把ADSLmomden调试成PPPOE自动拨号也不行,用以上办法共享上网经常发生只能上一会就打不开网页了,但是PING电信的DNS却是通的。如果不调试成共享上网,只让一台电脑上网就没问题。还有就是如果找到几个ADSL的帐号和密码,让每台电脑都拨号也可以正常的多台一起上网,可是到哪里找的到那么多的帐号和密码呢。
电信局的到底是安装了什么控制软件或其他的控制方法?
如何解决,请全国的高手回答。
这个问题虽说和linux无关,但我想这里高手多,请斑主不要删除我的问题。
由 terminator 在 01-07-2004 03:50 发表:
Which of the following have you tried?
Internet - ADSL Modem - Router as NAT - Multiple computers
or
Internet - ADSL Modem - Computer with NAT software - Hub - Multiple computers
Proud Slacker since Slackware 3.4
由 husong9 在 01-07-2004 22:22 发表:
!!!!!《网络尖兵》说明书
l 可以精确检测出NAT(路由)/Proxy(代理服务器)后的计算机数目 看这里!!
2 可以按客户计算机数目需求不同,为客户提供不同等级的服务
3 可以选择进行自动阻止网络连接,检测并封堵非的代理服务器(Proxy)或非的网络地址转换器(NAT) 看这里!!!
4 可以选择生成检测日志,提供详细检测日志供网管分析
5 支持MAC地址与IP地址的绑定
6 支持对MAC地址盗用的检测,可以阻止盗用MAC地址的行为 看这里!!
7 不影响内部用户之间的相互通讯
8 不影响对用户的带宽分配和流量限制
9 无需改变网络现有的设置和网络结构
l0 与用户的配置无关,无需修改用户计算机的设置
l1 支持单模光纤、多模光纤和双绞线介质的千兆网络接口
l2 支持IEEE802.1Q标准
l3 提供单独的网管/日志接口,数据采集接口无需分配IP地址
l4 检测代理服务器的准确度和可靠性高
l5 提供给用户较为方便、简单的日志管理界面
l6 集中网管,维护简单
l7 使用方便,高度可靠
http://www.glorysoft.com.cn/index.htm
由 mycltt 在 01-08-2004 10:34 发表:
哇塞不会吧你们的电信这样。。。。。。
还好,我们这没这样。
我们能用的,而且给的宽带猫就可以直接调成ROUTE,加个HUB就好了多人一起上
┏━━━━━━━━━━━━━━>
┃我已经爱上了她>>>>>>>>>>>>
┃>>>>>>>>>------永远的Linux Go!
┗━━━━━━━━━━━━━━>
由 mycltt 在 01-08-2004 10:35 发表:
晕啊
3 可以选择进行自动阻止网络连接,检测并封堵非的代理服务器(Proxy)或非的网络地址转换器(NAT) 看这里!!!
┏━━━━━━━━━━━━━━>
┃我已经爱上了她>>>>>>>>>>>>
┃>>>>>>>>>------永远的Linux Go!
┗━━━━━━━━━━━━━━>
由 网事无痕 在 01-09-2004 15:20 发表:
哪位大虾可以从技术角度分析一下,他们是怎么实现这些功能的么?
由 netdigger 在 01-09-2004 15:39 发表:
好像不行,至少ip,tcp,udp協議肯定不行
LFS ID: 6226
Name: netdigger
First LFS version: 5.0
由 terminator 在 01-09-2004 16:50 发表:
http://project.honeynet.org/papers/finger/
Notice the following paragraph in this paper:
Passive fingerprinting can be used for several other purposes. It can be used by the bad guys as 'stealthy' fingerprinting. For example, to determine the Operating System of a 'potential victim', such as a webserver, one only needs to request a webpage from the server, then analyze the sniffer traces. This bypasses the need for using an active tool that can be detected by various IDS systems. Also, Passive Fingerprinting may be used to identify remote proxy firewalls. Since proxy firewalls rebuild connection for clients, it may be possible to ID the proxy firewalls based on the signatures we have discussed. Organizations can use Passive Fingerprinting to identify 'rogue' systems on their network. These would be systems that are not authorized on the network. For example, a Microsoft or Sun shop can quickly identify 'rogue' Linux or FreeBSD systems that mysteriously appeared on their network. Passive Fingerprinting can be used to quickly inventory an organizations operating systems without touching or imapcting any systems or network performance. You would be surprised how may organizations do not know what systems they have on their internal network. For individuals conducting security assessment, Passive Fingerprinting also allows one to quickly identify critical systems (such as Unisys Mainframe). This method can also be used to identify rogue or unautorized systetms or OS types within an organization, a possible indication of 'blackhat' activity.
Proud Slacker since Slackware 3.4
由 terminator 在 01-09-2004 16:56 发表:
Anyway, this company ( www.glorysoft.com.cn ) sucks! China telecom sucks! I wonder if there is any law/regulation that states sharing connection is ILLEGAL. These companies often consider something to be "ILLEGAL" because it hurts their interests. But in fact, there is NOT any law/regulation about the so-called "ILLEGAL" things at all. I think there should be a law/regulation to punish these companies for creating FAKE law/regulations!!!
Damn www.glorysoft.com.cn and China telecom!