摘要
访问控制列表ACL有多种,不同场合应用不同种类的ACL。本文以实际场景为例,为实现不同的网络连接目的,而做的相应的配置,并分析了各种配置的适用范围和优劣。这些ACL技术从简到繁、从网络层到应用层,为网络的边界安全提供了灵活的解决方案。
There are many types of access control lists(ACL).Different kinds of ACL were suitable for different occasions.According to the different purpose of network connection,the corresponding configurations were completed.Also,this text analyzed the applicable range and advantages and disadvantages of various kinds of configuration.The ACL technology from simple to complex,during the network layer to application layer,provided a flexible solution for the boundary of the network security.
出处
《电子世界》
2014年第21期84-85,共2页
Electronics World
基金
武汉职业技术学院校级课题“基于IBX1000的局域网VoIP的设计与实践(项目编号2013LX049)”。
关键词
ACL
访问控制
路由器配置
ACL
ACL
Access control
The router configuration