JOURNAL BROWSE
Search
Advanced SearchSearch Tips
The case study to verify of a network based on router applying an ACL(: Access List)
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
The case study to verify of a network based on router applying an ACL(: Access List)
Kim, No-Whan;
  PDF(new window)
 Abstract
An ACL(: Access List), a list that determines network access, is used for the security of the network. An ACL if applied to a interface of router can filter particular packets. Also it can block or allow the access of certain unauthorized IPs or ports, based on the source address, destination address, and TCP/UDP port. This paper presents a simulation case to verify the effect of a router-based network applying Standard ACL or Extended ACL. The network was created through designing topology and then making a common virtual network using a Packet Tracer.
 Keywords
Standard ACL;Extended ACL;Router;Virtual Network;Packet Tracer;
 Language
Korean
 Cited by
 References
1.
G. Jin, CISCO Networking, vol. 2, Seoul, Korea, Sung An Dang, March 2011, pp. 132.

2.
D. Eck, "Access Control Lists to Protect a Network from Worm/DoS Attacks,"GSEC(:GIAC(:Global Information Assurance Certification) Security Essentials Certification) Practical Assignment, ver. 1.4, Option 1, Dec 4, 2003, pp. 1-22.

3.
R. Tolani, "Better Security through Access-List Management," Global Knowledge Training LLC(:Limited Liability Company), Jan. 2007, pp. 1-8.

4.
N. Navato, "Easy Steps to Cisco Extended Access List," GSEC(:GIAC(:Global Information Assurance Certification) Security Essentials Certification) Practical Assignment, ver. 1.2e, June 2001, pp. 1-10.

5.
S. Kaushik, A. Tomar, and Poonam, "Access Control List Implementation in a Private Network," International Journal of Information & Computation Technology. vol. 4, no. 14, 2014, pp. 1361-1366.

6.
K. Kim and S. Park, "Access-Control List research on the impact on performance MPLS GE," Conf. of the Korea Information Processing Society, Seoul, Korea, vol. 12, no. 1, May 2005, pp. 1397-1400.

7.
N. Kim, "The case study for verification of ACL(Access List)," Conf. of the Korea Institute of Electronic Communication Sciences, Sokcho, Korea, vol. 9, no. 2, Nov. 2015, pp. 164-167.

8.
W. Seo and M. Jun, "A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area," J. of The Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, Dec. 2010, pp. 625-630.

9.
C. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, Aug. 2012, pp. 797-803.

10.
C. Lee, "A Routing Security Authentication using S-EKE in MANET Environments," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 11, Apr. 2014, pp. 433-438. crossref(new window)