Access Control List Provides Security in Network

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
A significant component representing network security is access control list inspects values of every packet's field and come to a decision how to implement the network policy. Real-life access control list are naturally four dimensional over fields of four packets such as: IP (Internet Protocol) address of source, destination and port number of destination and type of protocol. In several access control list, the source and destination port number fields make use of a range field constraint while the internet protocol address of source and destination and protocol type fields make use of a prefix or else ternary field constraint.
Download Now

Find By Topic