Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to only access controllers thru one pc.

Posted on 2016-09-18
6
Medium Priority
?
22 Views
Last Modified: 2016-10-07
I have a situation where I have some IP based hardware that controls a electric motor board.   I do not want my network clients to be able to see or access those IP address of those devices.  But I would like only 1 PC on my network to access them.    How can I restrict access to them by the only one PC?
0
Comment
Question by:Kevin Caldwell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 2000 total points (awarded by participants)
ID: 41803671
Use another subnet for that motor board, and either add a 2nd NIC to your PC for that subnet and connect it directly to the PC, or configure a 2nd IP for the NIC you are on that is a member of that new subnet.
0
 

Author Comment

by:Kevin Caldwell
ID: 41803682
Wow.  Yes, adding the 2nd IP to the PC that is the same as the other devices would work.
By doing that, PC's that are on the main network, would not even be able to ping the motor boards, correct?
0
 
LVL 88

Expert Comment

by:rindi
ID: 41803693
If the users know the ip, and they have admin rights (which should be the case), they could setup their NIC for that a 2nd IP in that other subnet, and then they would be able to Ping. For that reason a 2nd NIC would be more secure.
0
 

Author Comment

by:Kevin Caldwell
ID: 41803695
But those IP's would never be pubished to the users.   Even if they did an IP scan, you would have to know the subnet to see what they are.
0
 
LVL 88

Expert Comment

by:rindi
ID: 41803768
Of course not. But if the users were knowledgeable enough, and had the necessary rights and access to systems, they could access the device.
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A Wildcard Certificate means all of your sub-domains will resolve to the same location, regardless of the non-SSL Document-Root specification. A user will need to purchase a wildcard SSL from a vendor or a reseller that supplies them. Similar to ha…
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question