Preview

Access Control List

Satisfactory Essays
Open Document
Open Document
330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control List
Access Control List
Your Name
University
Professor
Date

Access Control List
An ACL is a configuration script of a router that manages whether a router denies or permits packets to pass founded on criteria placed in the packet header. It is also employed in selecting forms of traffic to be processed, forwarded, or analyzed in other ways. As every packet passes through an interface with a related ACL, the ACL is analyzed, one line at a time from top to bottom, searching for a pattern corresponding to the incoming packet. The ACL inflicts one or more policies of the corporate security by applying deny or permit rule to establish the fate of the packet. ACLs can be configured to manage access to subnet or network. ACL is a router firewall. It is applied on a router based on the three Ps, where one ACL can be configured as per interface, per direction and as per protocol. Per protocol configuration controls the flow of traffic on an interface. In this case each protocol must be defined to facilitate an interface. Per direction configuration wheels traffic in one direction at a go, on an interface. Per interface configuration controls interface traffic for instance fast Ethernet.
Security Policy
To ensure maximum security in our system, the following security policies will be observed.
No packets whose source is not recognized will be allowed into the company’s network. This will be ensured by use of per protocol interface where packet’s IP will be retrieved to establish the source.
All network users will be required to be authorized. This will be established by use of password and access restriction levels.
System configuration must ensure that no loopholes are left to protect the network from all forms of vulnerabilities
Standard antivirus and antispyware should be employed to ensure all devices in the system are free from virus and spywares.

References
Vachon, B., & Graziani, R. (2008). Accessing the WAN CCNA exploration



References: Vachon, B., & Graziani, R. (2008). Accessing the WAN CCNA exploration companion guide. Indianapolis, IN: Cisco Press.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    6. IP packet is sent to forwarding host by addressing it to the resolved MAC address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Best Essays

    Hell, Hans. (2010). LAN, MAN,WAN: An Overview of the Three Basic Types of Networks. http://voices.yahoo.com/lan-man-wan-overview…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    In the WAN domain, we need to have firewalls set up to filter all incoming traffic. A firewall will stop all traffic not wanted on the Richman Investments network.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control list (ACL) A collection of access control entries that defines the access that all users and groups have to an object.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    A good antivirus program and have all devices scanned as soon as they are plugged in.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    An ACL is a Control list which will allow or deny traffic or devices based on specifications defined in the ACL. This ACL generally is applied and configured on Firewalls. It is useful in a layered security approach because from an External standpoint it become the first line of defense when hosts attempt to connect to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    anti virus, anti-spy ware and malware programs are recommended and in turn use up resources…

    • 438 Words
    • 2 Pages
    Good Essays