- 1、本文档共32页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Cisco Device Hardening Mitigating Threats and Attacks with Access Lists Standard and Extended ACLs Cisco routers support two basic types of IP ACLs: Standard IP ACL: Filters IP packets based on the source address only Extended IP ACL: Filters IP packets based on several attributes, including: Protocol type (IP, ICMP, UDP, TCP, or protocol number) Source and destination IP addresses Source and destination TCP and UDP ports Identifying ACLs Cisco routers can identify ACLs using two methods: ACL number: The number of the ACL determines which protocol it is filtering: 1 to 99 and 1300 to 1999: Standard IP ACLs 100 to 199 and 2000 to 2699: Extended IP ACLs ACL name: You provide the name of the ACL: Names contain alphanumeric characters. Names cannot contain spaces or punctuation and must begin with an alphabetic character. Guidelines for Developing ACLs Base ACLs on the security policy. Write ACL out: Write out what you want this ACL to accomplish. This is the time to think about potential problems. Set up a development system: This allows you to copy and paste statements easily. It also allows you to develop a library of ACLs. Store the files as ASCII text files. Apply ACL to a router and test: If at all possible, run your ACLs in a test environment before placing them into production. Applying ACLs to Router Interfaces Inbound (in): Data flows toward router interface Outbound (out): Data flows away from router interface Traffic Filtering Use ACLs to filter ingress and egress from routers and firewall appliances. Use ACLs to disable and limit services, ports, and protocols. IP Address Spoofing Mitigation: Inbound IP Address Spoofing Mitigation: Outbound DoS TCP SYN Attack Mitigation:Blocking External Access DoS TCP SYN Attack Mitigation:Using TCP Intercept DoS Smurf Attack Mitigation Filtering Inbound ICMP Messages Filtering Outbound ICMP Messages Filtering UDP Traceroute Messages Basics of Distributed DoS Attacks Distributed DoS attacks exploit specific ports. AC
您可能关注的文档
- FTTH系统ODN网络建设方案.ppt
- FTTH语音承载网介绍.ppt
- FTTH语音业务开通流程.ppt
- FTTH语音业务组网和流程介绍.ppt
- FTTx设备硬件单板介绍.ppt
- FTTx网络规划和网络部署.ppt
- FTTx运维解决方案.ppt
- GD3113培训手册最终.ppt
- Gemtek WLAN产品及解决方案.ppt
- Google AdWordsTM全球推广策划书实例.ppt
- 2023咸阳职业技术学院招聘笔试真题参考答案详解.docx
- 2023四川化工职业技术学院招聘笔试真题及参考答案详解.docx
- 2023哈尔滨职业技术学院招聘笔试真题及参考答案详解.docx
- 2023商洛职业技术学院招聘笔试真题及答案详解1套.docx
- 2023呼伦贝尔职业技术学院招聘笔试真题参考答案详解.docx
- 2023南阳农业职业学院招聘笔试真题参考答案详解.docx
- 2023天津公安警官职业学院招聘笔试真题带答案详解.docx
- 2023年上海电机学院招聘笔试真题参考答案详解.docx
- 2023年四川艺术职业学院招聘笔试真题参考答案详解.docx
- 2023安徽体育运动职业技术学院招聘笔试真题及答案详解一套.docx
文档评论(0)