首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 156 毫秒
1.
在路由器中配置访问列表可以完成网络对数据包的过滤,合理的使用基于时间的访问列表可以更有效的、更方便的管理网络。合理有效的利用基于时间的访问控制列表,可以更有效、更安全、更方便的使用我们的内部网络,可以让网络管理员轻松、灵活、高效地完成工作。  相似文献   

2.
基于时间的访问控制列表的应用   总被引:4,自引:0,他引:4  
访问控制列表是网络防御的前沿阵地,它提供了一种可以控制通过路由器和交换机不同接口的信息流的机制。通过访问控制列表来管理信息流,以达到指定相应的网络策略。这种策略通过描述安全、时间等条件来反映流量的优先权。本文首先介绍了基于时间的访问控制列表的概念和语法,然后通过两个具体的应用实例来具体分析基于时间的访问控制列表的用法。  相似文献   

3.
在路由器或三层交换机上,可以通过使用访问控制列表(ACL,Access Control List)来执行数据包过滤。访问控制列表可用来控制网络上数据包的传递、限制虚拟终端的通信量或者控制路由选择更新,限制网络访问特定的用户和设备。细节决定成败,我们在配置访问控制列表时往往因忽视一些细节,导致访问控制列表不起作用。为充分发挥访问控制列表强大功能,提高运行效率,在配置过程中应着重把握以下几个关节点。  相似文献   

4.
访问控制列表ACL(access control list)是一种对经过路由器的数据流进行分类和过滤的技术,在网络安全中发挥着重要的作用。文中介绍了访问控制列表的基本原理、作用和特征,并举例说明了如何在网络安全中应用访问控制列表。  相似文献   

5.
本文通过对比基本访问控制列表与高级访问控制列表在内联网中应用的差异,为高级访问控制列表在内联网中的应用提供了有益的探讨。  相似文献   

6.
本文将详细介绍利用访问控制列表对Intranet进行管理.  相似文献   

7.
王尊 《电子世界》2014,(18):256-257
访问控制列表作为网络防御外来攻击的重要控制策略,对整个网络的安全防护起着至关重要的作用。在高校校园网的管理过程中,人们可以结合高校教学工作的自身特点,根据不同功能场所对网络及数据安全的不同要求,灵活运用访问控制列表的相关技术来构建相应的网络安全策略。  相似文献   

8.
针对动态IP地址配置方式下出现的伪DHCP对校园网用户的影响问题,研究了DHCP的工作原理,剖析了伪DHCP影响校园网用户的原因,提出了通过调整网络结构并利用访问控制列表和PVLAN等技术联合解决问题的方案.  相似文献   

9.
使用访问控制特性,可以控制在访问时根据特定的时间间隔进行缓存、访问特定站点或一组站点等。Squid访问控制有两个要素:ACL元素和访问列表。访问列表可以允许或拒绝某些用户对此服务的访问。本文是笔者使用访问控制方法的一些实例。  相似文献   

10.
随着Internet的普及,网络安全越来越重要。实现网络安全的方法有很多,配置路由器访问控制列表便是其中的一种。  相似文献   

11.
无人机自主控制等级的研究现状   总被引:2,自引:1,他引:1  
简要介绍了无人机自主控制等级(ACL)出现的背景及目前在ACL研究中已经清楚的问题,归纳了在ACL研究中尚不十分清楚的问题,呼吁应集中全国各学科的力量对ACL进行专门研宄.  相似文献   

12.
Extended access control lists (ACLs) are used to filter packets for network security. However, in current network frameworks, ACL rules are not transferred simultaneously with devices that move across network segments. The Internet Engineering Task Force proposed the Locator/Identifier Separation Protocol (LISP), which enables routers (xTRs) to configure ACL rules for blocking immobile endpoint identifiers (EIDs). However, when an EID moves from the original xTR to a new xTR, the ACL rules at the original xTR cannot be transferred with the EID. Thus, the new xTR lacks the corresponding ACL rules to effectively block the EID, resulting in security risks. The highlights of this study are as follows. First, a method is proposed for dynamically transferring ACL rules in LISP environments and frameworks. Second, the map‐register and map‐notify protocols were combined to encapsulate and transfer the ACL rules and thus obviate an additional process required to transfer these rules. Third, the experimental results verified that the proposed method can be used to achieve synchronized security protection in an LISP environment involving cross‐segment EID movements.  相似文献   

13.
In ArF lithography for sub-80 nm L/S, amorphous carbon layer (ACL) deposition becomes an inevitable process, because thin ArF resist itself cannot provide suitable etch selectivity to sub-layers. One of the problems of the ACL hardmask is the presence of surface particles, which are more problematic in mass production. Limited capacity, high cost-of-ownership, and low process efficiency also make ACL hardmasks a dilemma, which cannot be ignored by device makers. One of the answers to these problems is using a spin-on organic hardmask (SOH) material instead of ACL hardmask. Therefore, several processes including bi-layer resist process, tri-layer resist process (TLR), and multi-layer resist process have been investigated. In this paper, we have described new SOH materials applicable to 70 nm memory devices. Applications to the TLR were investigated in terms of photo property, etch property and process compatibility. Based on the test results described in this paper, our spin-on organic hardmask materials are expected to be used in mass production.  相似文献   

14.
孙文胜  赵玉江 《电子器件》2009,32(5):981-984,988
IPv6 QACL(可靠访问控制)技术有利于解决下一代网络的可靠接入问题,其功能实现依赖于ACL(访问控制链表)模块与QoS(服务质量)模块的联动。论文给出拥塞避免、优先级标记等典型配置组网,并进行相应的系统功能测试,测试结果表明预期功能实现。  相似文献   

15.
Cognitive radio is an intelligent technology designed to help secondary users (SUs) increase their opportunity to access unused spectrum channels while avoiding interference with the primary users. In cognitive radio networks (CRNs), to find the available channels, SUs execute cooperative spectrum sensing and exchange channels-related control information, namely an available channels list (ACL), on a common control channel (CCC) before determining which channels they may transmit. However, some SUs, defined as attackers, could create a security issue by sharing false ACL information with other SUs to increase their own utilization of the available channels, which significantly decreases the performance of CRNs. In this paper, we propose an efficient detection scheme for CCC security to identify any attacker among the cooperating SUs. In the proposed scheme, all SUs share their ACL information on the CCC, with an associated reputation, which is updated according to its own behavior in each cooperation round, to cooperatively identify attackers. An attacker will be excluded from cooperating group with the result that its updated reputation value exceeds a certain threshold. Simulation results show how to further improve the performance of the proposed scheme by choosing optimized thresholds. In addition, we also illustrate that the proposed scheme can achieve considerable performance improvement compared with a attack detection technique COOPON for secure ACL information exchange.  相似文献   

16.
This work describes positive effects of using active and cooperative learning (ACL) methods to improve signal processing instruction. It provides examples, references, and assessment data that encourage other instructors to consider this approach. Conclusions are based on impressions gathered through conversations with students during office hours as well as on responses from anonymous student opinion surveys. In addition to these subjective assessments, preliminary quantitative data measured with the signals and systems concept inventory (SSCI) support the benefits of ACL techniques in signal processing courses.  相似文献   

17.
This special issue on spoken language technology (SLT) was motivated by the first SLT workshop, held in Aruba in December 2006, jointly sponsored by IEEE and ACL. Eight papers were accepted to form this special issue. The papers are summarized here.  相似文献   

18.
蓝牙分组传输性能分析与自适应分组选择策略   总被引:5,自引:0,他引:5  
杨帆  王珂  钱志鸿 《通信学报》2005,26(9):97-102
分析了蓝牙2.0+EDR新规范定义的3种调制方式在AWGN信道下的位错误率与平均接收信噪比的关系,推导了ACL分组的重传概率与平均接收信噪比的函数表达式。通过分组的重传概率与特性分析了ACL分组的传输性能,包括平均吞吐量、平均重传次数、平均传输时延等。提出了AWGN信道下的自适应分组选择策略,通过在不同的信噪比情况下选择合适的分组类型进行传输而获得最大吞吐量,给出了进行分组类型切换的信噪比门限值。分析结果与提出的策略适用于蓝牙数据传输性能的优化。  相似文献   

19.
随着计算机网络的迅速发展,中小型网络作为互联网的基本组成部分,其安全问题不容忽视。本文通过具体的网络配置实例,说明了如何利用Cisco路由器的ACL技术实现对中小型网络进行控制和管理,限制特定网络流量,提高网络性能和安全。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号