ACCESS CONTROL LIST: LINKAGES WITH SECURITY ON ROUTERS
Apurv Goel
Vol. 2, Issue 1, Jan-Dec 2016
Page Number: 42 - 45
Abstract:
In Existing systems, a user can access any website without any network blocking that creates the problem of network congestion. To reduce the problem of network congestion, a network blocking or filtering is required. This paper comprehends the idea of access control rundown and CISCO IOS firewalls like inbound, outbound and how it can be proficiently utilized with the end goal of gets to limitation between various frameworks and administrations having a place with various VLAN mapped with various offices.
References
- Harshita B, N Ramesh, “A Survey of Different Types of Network Security Threats and its Countermeasures”, International Conference on Electrical, Electronics and Computer Engineering, May 2013. Mysore, ISBN: 978-81-927147-3-8.
- A. Velte and T. Velte, “Cisco: A Beginner's Guide”, McGrawHill Inc, 3rd edition (2004).
- A.Bobyshev, P.DeMar, D.Lamore, Fermilab, Batavia, “Effect of Dynamic ACL (Access Control List) Loading on Performance of CISCO Routers”.
- Liu Zhian, “Study of Network Optimization Method Based on ACL”, Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011].
- William Mahoney, James Harr, “A Linux Implementation of Windows ACLs”, International Journal of Computer Science and Network Security, VOL.10 No.7, July 2010
- Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn, “Visualization-based policy analysis for SELinux: framework and user study”, Int. J. Inf. Secur. (2013). Published online: 8 November 2012, Springer-Verlag Berlin Heidelberg 2012
- V.Grout, J. McGinn, and J.Davies, “Real-Time Optimization of Access Control Lists for Efficient Internet Packet Filtering”, Journal of Heuristics, Vol. 12, 2006
- V. Grout, J. McGinn, “Optimisation of Policy-Based Internet Routing using Access-Control Lists”, Centre for Applied Internet Research (CAIR), University of Wales.
- Pankaj Rakheja et al. Performance Analysis of RIP, OSPF, IGRP and EIGRP Routing Protocols in a network (International Journal of Computer Applications (0975 – 888) Volume 48– No.18, June 2012) Pankaj Rakheja
- Zhe Chen, ShizeGuo, and Rong Duan. Research on the anomaly discovering algorithm of the packet filtering rule sets. In Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference on, pages 362-366, Sept. 2010
- Ibrahim M. Al Abdulmohsin, “Techniques and Algorithms for Access Control List Optimization Efficient Internet Packet Filtering”. Computers & Electrical Engineering 01/2009; 35:556-566.
- S. Pozo, A.J.Varela-Vaca, and R.M. Gasca. A quadratic, complete, and minimal consistency diagnosis process for firewall ACL's. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, pages 1037-1046, April 2010.
Back Download