999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Application Analysis of ACL Technology in Small and Medium Sized Network Security Management

2019-09-25 07:10:56JiangJunhua
中阿科技論壇(中英文) 2019年3期

Jiang Junhua

(Yixing Higher Vocational and Technical School,Wuxi,Jiangsu 214200)

Abstract:The progress of computer hardware and software technology has promoted the rapid development of network technology,and attacks on the Internet are increasing.In order to ensure network security,network administrators must ensure the security of data and resources by restricting users'permissions while opening enough network permissions.In view of this situation,although network administrators can use a lot of security technology means,due to the limitations of various aspects of the small and medium-sized network conditions,we can only switch to the idea of using access control list(ACL)instead of expensive hardware firewalls to achieve the control and filtering of network data flow.In addition,the simple configuration of ACL can also realize the filtering of some common viruses,and finally achieve the basic and low-cost network security goal.

Keywords:network security;ACL;router;interchanger;virus filter

In recent years,with the rapid development of computer hardware and software technology,network technology has also developed rapidly,and attacks on the Internet are increasing.How to guarantee network security has become one of the problems that seriously trouble the network administrators of small and medium-sized network.Because of the demand of consolidating and expanding the business,the network administrator must open enough permissions to allow users access to network resources;in addition,network administrators must ensure the security of data and resources by strictly restricting users'rights.In the face of various kinds of network attacks,although network management can use a lot of network security technology,but due to the limitations of conditions,small and mediumsized network can use limited funds.We can switch to the idea of considering the use of access control list(ACL)to replace the expensive hardware firewall to achieve the control and filtering of network data flow,and finally achieve the basic and cost controllable network security goals.

I.Summarize of ACL

(i) ACL Technology

Access control lists is called ACL,it is a network security technology based on packet filtering mechanism,which filters packets passing through the interface according to pre-set conditions to de-termine whether it is allowed to pass.ACL can can be widely used on the router or layer 3 switches,by reading the information in the third and fourth layers such as the source address,destination address,source port,destination port,etc.,and combining with the preset conditions to allow or deny specific packets in and out of the network so as to achieve the control of network access,thus ensuring the safe operation of the network effectively.Users can tailor a series of access rules based on specific information in the packet.Each rule describes the corresponding action to be taken for a packet that matches specific information:Allow or deny passage,and then apply these user-preset rules to the entry or exit directions of the corresponding port,so that the data flows in a particular direction on particular ports must be in and out the routers or switches according to the specified ACL rules.By using ACL technology,network administrators can achieve the purpose of restricting the illegal network activities of a specific IP address or a certain network segment of PC[1].

(ii) Classification of ACL

ACL can be divided into many kinds,and the most commonly used ones are mainly two categories.

1.Standard ACL

The standard ACL is the simplest,it filters only by using the source IP address in the IP packet,the table number range is 1-99 or 1300-1999.

The grammatical structure of standard ACL statements:

router_config#ip access-list standard name

router_config_std_nacl#permit/deny 172.16.1.0 255.255.255.0

2.Extended ACL

Extended ACL provides more matches than standard ACL,so it has more refined and powerful functionality,and can filter for source address,destination addresses,source ports,destination ports,TCP connections,protocol types,etc.,the table number range is 100-199 or 2000-2699.

The grammatical structure of extended ACL statements:

router_config#ip access-list extended name

router_config_ext_nacl#permit/deny tcp 172.16.1.0 255.255.255.0 2.2.2.2 255.255.255.255 eq port

While using access control lists,pay special attention to the following points:1.The“1”in wildcard mask means to ignore the corresponding bits in the IP address,and“0”means that the bits must match.The two special wildcard masks are'255.255.255.255'and'0.0.0.0',the former represents the keyword“any”,and the later represents the keyword“host”.2.Inbound and outbound interfaces.When an access control list is applied to the corresponding interface,the user must indicate whether the access control list is applied to the data inflow or outflow direction.3.Whenever possible,consider placing the extended ACL close to the filter source so that the filter rules created do not adversely affect the normal data flow on other interfaces;put the standard ACI close to the destination,because the standard access control lists can only use the source address,and if move it close to the filter source,legitimate packets will be prevented from flowing to other ports.4.After the ACL is opened,whether configured or not,an implicit'deny'will negate all addresses,so there must be at least one'permit'statement in the ACL[2].

II.Application Case Study of ACL Technology in Small and Medium-Sized Networks

The application of ACL technology is widely used.We take the topology of a small and mediumsized network(router:Digital China DCR-2655)as an example to briefly analyze the basic application configuration of ACL on this basis.

1.Request for denying PC2 segment access to router R2.Create a standard ACL configuration that meets the requirements:

R2_config#ip access-list standard P2ToR2

R2_config_std_nacl#deny 172.16.1.0 255.255.255.0

2.Request for only allowing hosts in the PC2 segment to access router R2's WWW service.Through analysis,create an extended ACL configuration that meets the requirements.

R1_config#ip access-list extended P2ToR2

R1_config_ext_nacl#permit tcp 172.16.1.0 255.255.255.0 2.2.2.2

3.Only allow hosts in the PC3 to access router R2's WWW service from 8:00 to 18:00 each day.Create time-based access control list configuration:

R3_config#time-range P3ToR2

R3_config_time_range#periodic daily 8:00 to 18:00

III.Application Analysis of ACL Technology in Antivirus

At one time,virus such as Blaster,Sasser have brought a heavy blow to the entire Internet.So far,the Internet we use still has a large number of viruses and their variants every day,they are everywhere,looking to harm the security of the network.Therefore,when configuring network devices such as routers or switches,network administrators can consider filtering these viruses through simple configuration of ACL(access control list)to keep them out and ensure the stable operation of the network.By querying relevant public information,we can obtain the commonly used network port numbers–Blaster virus and its variants:corresponding TCP port number 135,139,445 and 593,UDP port number 69,135,137 and 138;shell programs involving remote command:corresponding TCP port numbers 4444,135,139,445,4444,UDP port number 69,135,137 and 138.Sasser virus and its variants:corresponding TCP port 5554,445,9996.SQL worm virus:corresponding TCP port number 1433,UDP port number 1434[3].

ACL filters configuration for specific viruses:

switch(config)#ip access-list extended acl

switch(Config-IP-Ext-Nacl-acl)#deny tcp host-source 192.168.1.1 s-port

445 any-destination

IV.Conclusion

In general,if ACL technology can be properly used,it will become a powerful filtering tool in the hands of network administrators.In addition to filtering the traffic through the network,it can also further improve the security of the network by preventing and controlling virus attacks and restricting Internet access.But like a double-edged sword,poorly designed access control list configurations can backfire,placing a heavy additional burden on routers and switches and,in the worst cases,causing the entire network to go down.Therefore,only by properly planning and configuring ACL can we give full play to its ability to efficiently manage small and medium-sized networks.

主站蜘蛛池模板: 日韩在线影院| 婷婷六月综合| 久久九九热视频| 91视频首页| 国产成人1024精品| AV熟女乱| 另类综合视频| 99re这里只有国产中文精品国产精品| av天堂最新版在线| 国产一区二区福利| 天天视频在线91频| 91蜜芽尤物福利在线观看| 毛片免费视频| 国产精品成人不卡在线观看| 精品综合久久久久久97超人该| 亚洲免费三区| 欧美日韩国产在线观看一区二区三区| 福利在线一区| 亚洲欧美成人在线视频| 欧美不卡二区| 99久久精品国产麻豆婷婷| 亚洲欧美综合另类图片小说区| 亚洲欧洲自拍拍偷午夜色无码| 国产女同自拍视频| 日本三级欧美三级| 婷婷亚洲最大| 亚洲午夜国产片在线观看| 国产亚洲高清视频| 2021国产精品自拍| 一级看片免费视频| 成人噜噜噜视频在线观看| 黄色国产在线| 欧美日韩北条麻妃一区二区| 一本大道香蕉中文日本不卡高清二区| 国产91特黄特色A级毛片| 久久这里只有精品免费| 一级在线毛片| 亚洲视频无码| 中文字幕在线日本| 国产精品久久久久久久久久98| 在线观看国产精品日本不卡网| 成人午夜天| 欧美亚洲第一页| 国产乱子精品一区二区在线观看| 亚洲最大福利网站| 色播五月婷婷| 98超碰在线观看| 波多野结衣视频网站| 午夜视频免费一区二区在线看| 国产成人欧美| 国产99在线观看| 精品丝袜美腿国产一区| 丰满人妻一区二区三区视频| 国产极品嫩模在线观看91| 97se亚洲综合在线| 精品国产网| 日韩黄色在线| 日本人妻一区二区三区不卡影院| 日韩专区第一页| 久久久久人妻一区精品色奶水| 在线中文字幕日韩| 日本一区二区不卡视频| 精品人妻系列无码专区久久| 精品国产91爱| 久久黄色免费电影| 久久精品中文字幕免费| 国产美女无遮挡免费视频网站| 国产精品护士| 国产激情国语对白普通话| 色欲色欲久久综合网| 99久久人妻精品免费二区| 综1合AV在线播放| 国产一区二区三区在线精品专区 | 在线精品亚洲国产| 国产精品蜜臀| 国产精品一区二区久久精品无码| 久操线在视频在线观看| 亚洲成人动漫在线观看| 无码人妻免费| 国内精品九九久久久精品| 久久伊人操| 一级爆乳无码av|