How To Restrict A User From The Network

Table of contents:

How To Restrict A User From The Network
How To Restrict A User From The Network

Video: How To Restrict A User From The Network

Video: How To Restrict A User From The Network
Video: How to block access to internet for a specific user 2024, December
Anonim

A local network provides a huge number of opportunities for users: the transfer of information, the sharing of resources and technology, as well as the organization of access to the Internet. But sometimes it becomes necessary to set restrictions for certain users.

How to restrict a user from the network
How to restrict a user from the network

Necessary

  • - computer;
  • - the local network;
  • - system administration skills.

Instructions

Step 1

Choose a method to restrict access to the local network and the Internet to specific users, depending on how the peer-to-peer network connects to the Internet. If using one of the computers that are a member of a one-time network, then disable routing on it (it is disabled by default) so that no one can use it as a default gateway. Alternatively, install a proxy server on this computer and configure it. You can even use the built-in server available in the Windows operating system to do this.

Step 2

Configure the browser and other applications to work through the installed proxy server on all computers in the local network. On the computer to which you want to set the network restriction, do not write settings in restricted applications.

Step 3

Configure the restriction of users on the network using a switch or hub. First, install a router between the switch / hub or replace it. Configure it to pass traffic only to specific computers on the network for more control over users. You can also configure the switch to only allow traffic to one computer. In addition, you can install a proxy server on it.

Step 4

Use software proxy servers, they provide more opportunities for managing network access, collecting statistics and differentiating user rights. The router works autonomously, does not depend on the state of the PC and does not require individual configuration of applications on each individual computer in the network.

Step 5

Limit user access by creating rules. You can also do this using the computer address (IP or MAC), addresses of the requested resources, time of day, traffic volume, protocols.

Recommended: