【文件属性】:
文件名称:访问列表的应用-CCNA中文版PPT
文件大小:10.75MB
文件格式:PPT
更新时间:2021-04-25 17:53:01
CCNA
访问列表的应用
允许、拒绝数据包通过路由器
允许、拒绝Telnet会话的建立
没有设置访问列表时,所有的数据包都会在网络上传输
虚拟会话 (IP)
端口上的数据传输
*
Slide 1 of 1
Purpose: This figure illustrates common uses for IP access lists.
Emphasize: While this chapter focuses on IP access lists, the concept of access lists as mechanisms to control traffic in a network applies to all protocols.
Note: An improved security solution is the lock-and-key access feature, which is available only with IP extended access lists. Lock-and-key access allows you to set up dynamic access lists that grant access per user to a specific source/destination host through a user authentication process. You can allow user access through a firewall dynamically, without compromising security restrictions.
Transition: The following figure is the first of a 3-layer build that presents other uses of access lists specific to Cisco IOS features.