文件名称:访问列表的应用-CCNA中文版PPT
文件大小:10.75MB
文件格式:PPT
更新时间:2024-05-15 11:39:41
CCNA
访问列表的应用 允许、拒绝数据包通过路由器 允许、拒绝Telnet会话的建立 没有设置访问列表时,所有的数据包都会在网络上传输 虚拟会话 (IP) 端口上的数据传输 * Slide 1 of 1 Purpose: This figure illustrates common uses for IP access lists. Emphasize: While this chapter focuses on IP access lists, the concept of access lists as mechanisms to control traffic in a network applies to all protocols. Note: An improved security solution is the lock-and-key access feature, which is available only with IP extended access lists. Lock-and-key access allows you to set up dynamic access lists that grant access per user to a specific source/destination host through a user authentication process. You can allow user access through a firewall dynamically, without compromising security restrictions. Transition: The following figure is the first of a 3-layer build that presents other uses of access lists specific to Cisco IOS features.