1. ACL Introduction Communication between information points and between internal and external networks are both essential business requirements in enterprise networks. However, in order to ensure the security of the intranet, security policies are needed to ensure that unauthorized users can only access specific network resources, thereby achieving the purpose of access control. In short, ACL (Access Control List) is a network technology that can filter traffic in the network and control access.
In fact, the essence of ACL is to describe a collection of several characteristics of an IP data packet or Ethernet data frame. Then, the traffic in the network (consisting of a large number of data packets) is matched according to these sets, and "allowed" or "forbidden" according to the policy. effect:
2. Classification of ACL (based on IP) 1. Standard ACL Standard ACL can only match source IP addresses. There are three matching methods in the application:
Configuration commands:
2. Extended ACL Extended ACL can match multiple entries. Common items include source and destination IP, source and destination port numbers, and IP protocol number (type), etc., which can be used to meet the needs of most applications. In a condition, the order of these items is as follows: protocol number, source IP address, source port number, destination IP address, destination port number. Configuration commands:
3. ACL matching rules Which ACL is executed on a port is determined by the execution order of the conditional statements in the list. If the header of a data packet matches a conditional statement in the table, the following statements will be ignored and no longer checked. Only when the data packet does not match the first condition will it be sent to the next conditional statement in the ACL for comparison. If a match is found (assuming that sending is allowed), the data will be immediately sent to the destination interface regardless of whether it is the first or last statement. If all ACL judgment statements are checked and there is still no matching statement exit, the data packet will be regarded as rejected and discarded (implicit rejection: deny any). Please note that ACL cannot control the data packets generated by itself. 4. Calling ACL Different modules will play different roles when called, which is the fundamental reason why ACL is widely used. Common modules that call ACL are:
The more commonly used one is access-group, and its calling method requires two factors to be determined:
Call an ACL entry. Configuration command:
V. Experiment Experiment 1: Use extended ACL to achieve the situation where the PC cannot ping the router, but the router can ping the PC
Experiment 2: In a certain network, all users are prohibited from pinging, telnet, or http accessing a server (dns Server, ip is 192.168.1.253), but it needs to provide normal services
Experiment 3: In a certain network, except for normal web access and email sending and receiving, all other applications are prohibited
|
<<: Comparison of several mainstream wireless technologies in the Industrial Internet of Things
European regulators have been facing increasing p...
I believe everyone can feel that using multithrea...
On August 3, 2021, CyberDefense Magazine, a world...
With the Internet and the Internet of Things high...
Like most emerging IT trends, "edge computin...
Gartner, the world's leading information tech...
[[250378]] 1. WiFi Penetration Through Walls: Que...
5G mobile phones are divided into NSA and SA dual...
Not long ago, a foreign artist "made" a...
DogYun (狗云) released a discount plan for the May ...
At present, despite the rapid rise of new energy ...
The tribe has shared the server information of sp...
Today, digital transformation has become a global...
The summer of 2022 is coming, and the person to t...
TmhHost is a regular domestic company with ISP\IC...