- 1、本文档共32页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Mitigating Threats and Attacks with Access Lists参考
Cisco Device Hardening Mitigating Threats and Attacks with Access Lists Standard and Extended ACLs Cisco routers support two basic types of IP ACLs: Standard IP ACL: Filters IP packets based on the source address only Extended IP ACL: Filters IP packets based on several attributes, including: Protocol type (IP, ICMP, UDP, TCP, or protocol number) Source and destination IP addresses Source and destination TCP and UDP ports Identifying ACLs Cisco routers can identify ACLs using two methods: ACL number: The number of the ACL determines which protocol it is filtering: 1 to 99 and 1300 to 1999: Standard IP ACLs 100 to 199 and 2000 to 2699: Extended IP ACLs ACL name: You provide the name of the ACL: Names contain alphanumeric characters. Names cannot contain spaces or punctuation and must begin with an alphabetic character. Guidelines for Developing ACLs Base ACLs on the security policy. Write ACL out: Write out what you want this ACL to accomplish. This is the time to think about potential problems. Set up a development system: This allows you to copy and paste statements easily. It also allows you to develop a library of ACLs. Store the files as ASCII text files. Apply ACL to a router and test: If at all possible, run your ACLs in a test environment before placing them into production. Applying ACLs to Router Interfaces Inbound (in): Data flows toward router interface Outbound (out): Data flows away from router interface Traffic Filtering Use ACLs to filter ingress and egress from routers and firewall appliances. Use ACLs to disable and limit services, ports, and protocols. IP Address Spoofing Mitigation: Inbound IP Address Spoofing Mitigation: Outbound DoS TCP SYN Attack Mitigation:Blocking External Access DoS TCP SYN Attack Mitigation:Using TCP Intercept DoS Smurf Attack Mitigation Filtering Inbound ICMP Messages Filtering Outbound ICMP Messages Filtering UDP Traceroute Messages Basics of Distributed DoS Attacks Distributed DoS attacks exploit specific ports. AC
您可能关注的文档
- MATLAB绘图参考.ppt
- matlab数组运算基础参考.ppt
- Maturity Value Of A Loan Or An Investment参考.ppt
- MBR膜生物反应器调试与管理参考.doc
- Matlab的图形用户界面GUI参考.ppt
- MATLAB大规模数据处理技巧参考.pptx
- Mergers and Acquisitions参考.ppt
- Measuring and Calculating Interest Rates and Financial Asset Prices参考.ppt
- Matrix Multiplication参考.ppt
- Linux交叉编译开发报告参考.doc
文档评论(0)