Tuesday 6 February 2018

Standard Access Control List


  • Marks:- 10+5
  • Name of student: Subhendu Pal
  • Faculty Name: Priya Sawant 
  • Roll No: 1503
  • Date: 05-02-2018
  • Session Name: IP Services

  • Access control list (ACL)

    ACL is a list of conditions that are used  to filter packets they are helpful in managing  

    traffic in a network. it defines all the permissions attached to an object in the network

    it specifies which users or system processes are granted access to object as well as what


    Terms Used in Access control:-

    • Object:- A device that contains or receives information. Access to this device possible ibfers access to the data it contains.

    Ex, Server

    • Subject:- An active device generally in the forme of a person, Process,or system that leads to information flow between object.

    Ex, Users

    • Operation:- An active process stimulated by a subject.

    Ex, Users send information to servers

    • Permission:- An approved to execute some action on the system. In most computer security literature, permission denotes some arrangement of object and operation.

    Ex, Data access permission for Users.

    • Access control matrix:- A MATRIX in which each row denotes a subject, each column denotes an object, and each record is the set of access rights for that subject to that object.
    • Separation of Duty:- The norm that no user should be given abundant privileges such that they might misuse that system.

    Ex, the rules for authorised and unauthorised users.

    • Safety:- Arrangements in place to ensure that the access control confirmation.

    Ex, access control mechanisn or model.

    • Inbound:- If the access list is inbound, when a packed is delivered to the Router, the Cisco ISO check the standards statements of the access list for a match. If the packet is permissible, the software continues processing the packet. If the packet is denied, the software discards the packet.
    • Outbound:-  If the access list is outbound, when the software receives and Router a packet to the departing interface, the Cisco ISO check the standards statements of the access list for a match. If the packet is permissible, the Cisco ISO transmits the packet. If the packet is denied, the software permissible discards the packet



    Standard access lists – with standard access lists, you can filter only on the source IP address of a packet. These types of access list are not as powerful as extended access lists, but they are less processor intensive for the router.
     
    The following example describes the way in which standard access lists can be used.
     
    acl example
     
    Let’s say that server S1 holds some important documents that need to be available only to company’s management. We could configure an access list on R1 to enable access to S1 only to users from the management network. All other traffic going to S1 will be blocked. This way, we can ensure that only authorized user can access sensitive files on S1.
    Questions:-
    1. Explain Access  control Matrix
    2. Explain ACL

    No comments:

    Post a Comment