Using network identification and subnet masks Network identifiers and subnet masks can be used to deny or grant access to a group of computers. The network ID is the IP address of the host, which is usually the router of the "subnet". The subnet mask determines which part of the IP address is the subnet identifier and which part is the host ID. All computers in the subnet have the same subnet ID and their own unique host ID. You can select a group of computers by specifying a network ID and subnet mask. For example, if the host has an IP address of 172.16.16.1 and a subnet mask of 255.255.0.0, all computers in the subnet will have an IP address starting with 172.16. To select all computers in the subnet, enter 172.16.16.1 in the "Network ID" box and enter 255.255.0.0 in the "Subnet Mask" box. Grant or deny access to a group of computers In IIS Manager, expand the local computer, right-click a website, directory, or file, and then click “Properties”. Click the “Directory Security” or “File Security” tab. In the "IP Address and Domain Name Restrictions" section, click “Edit”. Click “Authorize Access” or “Deny Access”. When you select <;Deny access", access to all computers and domains is denied, except for computers and domains that you specifically grant access to. When you select “Authorize Access", all computers and domains are granted access, except for computers and domains that you specifically deny. Click “Add”. Click “A group of computers”. In the "Network ID" box, type the IP address of the host. In the "Subnet Mask" box, type the subnet ID of the computer you want to grant or deny. Click “OK” three times.
According to the above explanation, I set the directory security ——IP address and domain name restrictions in the book website iis in the 87 server as follows:
Select a group of computers —— Access denied —— except for the following: Add
Network ID Subnet Mask
145.48.51.1 255.255.255.0
145.48.52.1 Same as above
The following analogy. . .
There is no doubt that MDaemon developed by Alt-n of the United States is an excellent mail server s
Problem: The lack of .net2.0 and vc9 caused some software to be uninstalled. Phenomenon: Users canno
In the current economic climate, most IT companies are beginning to accelerate th
What is the most regrettable thing for intranet users? Of course, it
Unreasonable configuration of Apache in WDCP
Win2K server-side setup Raiders
Continuous cooling solutions for high-density data centers
Server Load Balancing Solution
What is a remote access server, what does a remote access server mean?
Under centos nginx+mysql+bugfree+php install
Cloud computing is at risk Virtual machine security needs to be carefully protected
Seven newbie skills Deadly server security maintenance
What is the difference between the IMAP protocol and the POP protocol?
CA (Certificate Authority) Configuration Overview
What is the difference between Windows 8.1 Professional, Standard and Core?
Win8 Encyclopedia 49: Download the application stores the rest of
Windows 10 officially released Windows Insider in 2015 or will continue to retain
How to organize the Win7 system Recent folder? How to clean redundant files of Win7 system?
The correct way to execute PHP programs with crontab under Linux
What should I do if the Win10 system input method icon is missing?
Microsoft says it takes at least two weeks to adapt to Windows 8 systems
Virtual CD-ROM usage method Daquan
Win7 Ultimate Windows Security Center can not open the solution