TP-Link 13dBi CPE510 V1 UG - Page 58

IP&MAC Binding, IP Range, Port Range

Page 58 highlights

Bandwidth Control Chapter 5 Network Tab Check the Enable box to use the bandwidth control function. To use the bandwidth control: 1. Click Add in the table of bandwidth control. 2. Enter the IP Range of the target hosts which need to be controlled of bandwidth, for example 192.168.0.12-192.168.0.25. 3. Enter the Port Range through which the target hosts visit external server, for example 1-63258. 4. Choose one of the protocols used for this application: TCP, UDP, or TCP/UDP. 5. Enter the minimum ingress, maximum ingress, minimum egress and maximum egress of these IP addresses. 6. Click OK after finishing the configuration. Select the added entries, you can edit or delete them. IP&MAC Binding We can effectively prevent ARP attack and IP embezzlement by enabling the IP&MAC binding. Within the local network, the device transmits IP packets to the certain target identified by the MAC address. Therefore, the IP and MAC address should be one-to-one correspondence and their corresponding relations are maintained by the ARP table. ARP attack can use forged information to renewal the ARP table, and destroy the corresponding relations between IP and MAC addresses, which would prevent the communication between the device and the corresponding host. When the IP&MAC Binding function is enabled, the IP and MAC relations in the ARP table won't be expired and renewed automatically, which effectively prevents the ARP attack. Some functions such as access control and bandwidth control, are based on the IP addresses to identify the access clients. The network administrator can allocate every client a static IP, according to which he makes the access and bandwidth rules to control the clients' online behavior and the bandwidth they've used. Some illegal users may change the IP address in order to get higher Internet access. Enabling IP & MAC binding function can effectively prevent the IP embezzlement. NOTE: After IP&MAC binding function is enabled, the IP bound to the MAC cannot be used by other MACs. However this MAC can use other IPs within the same segment, which are not bounded by other MACs, to access the network. - 55 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95

Chapter 5 Network Tab
Bandwidth Control
Check the
Enable
box to use the bandwidth control function.
To use the bandwidth control:
1.
Click
Add
in the table of bandwidth control.
2.
Enter the
IP Range
of the target hosts which need to be controlled of
bandwidth, for example 192.168.0.12-192.168.0.25.
3.
Enter the
Port Range
through which the target hosts visit external server,
for example 1-63258.
4.
Choose one of the protocols used for this application: TCP, UDP, or
TCP/UDP.
5.
Enter the minimum ingress, maximum ingress, minimum egress and
maximum egress of these IP addresses.
6.
Click
OK
after finishing the configuration.
Select the added entries, you can edit or delete them.
IP&MAC Binding
We can effectively prevent ARP attack and IP embezzlement by enabling the IP&MAC binding. Within the
local network, the device transmits IP packets to the certain target identified by the MAC address.
Therefore, the IP and MAC address should be one-to-one correspondence and their corresponding
relations are maintained by the ARP table. ARP attack can use forged information to renewal the ARP table,
and destroy the corresponding relations between IP and MAC addresses, which would prevent the
communication between the device and the corresponding host.
When the IP&MAC Binding function is
enabled, the IP and MAC relations in the ARP table won’t be expired and renewed automatically, which
effectively prevents the ARP attack.
Some functions such as access control and bandwidth control, are based on the IP addresses to identify
the access clients. The network administrator can allocate every client a static IP, according to which he
makes the access and bandwidth rules to control the clients’ online behavior and the bandwidth they’ve
used. Some illegal users may change the IP address in order to get higher Internet access. Enabling IP &
MAC binding function can effectively prevent the IP embezzlement.
NOTE:
After IP&MAC binding function is enabled, the IP bound to the MAC cannot be used by other MACs.
However this MAC can use other IPs within the same segment, which are not bounded by other MACs, to
access the network.
- 55 -