Tp-Link T1700G-28TQ V2 — настройка ACL: Обзор и Применение для Сетевой Безопасности [535/772]

Превью страниц Страница 535 / 772
Tp-Link T1700G-28TQ V2 [535/772] Supported features
Configuration Guide 510
Configuring ACL Overview
1
Overview
1.1 Introduction
The rapid growth of network size and traffic brings challenges to network security and
bandwidth allocation. Packet filtering can help prevent unauthorized access behaviors, limit
network traffic and improve bandwidth use.
ACL (Access Control List) filters traffic as it passes through a switch, and permits or denies
packets crossing specified interfaces or VLANs. It accurately identifies and processes
the packets based on the ACL rules. In this way, ACL helps to limit network traffic, manage
network access behaviors, forward packets to specified ports and more.
It is usually applied in the following situations:

To prevent various network attacks, such as attacks on IP (Internet Protocol), TCP
(Transmission Control Protocol), and ICMP (Internet Control Message Protocol) packets.

To manage network access behaviors, such as controlling access to a network or to
specific resources on your network.

To limit network traffic and improve network performance by, for example, controlling
the uploading and downloading bandwidth.
1.2 Supported Features
»
ACL Binding
To“permit” or “deny” received packets, bind the ACL to a port or a VLAN so that the ACL
takes effect on the port or VLAN. The packets that match a permit rule or deny rule will be
forwarded or dropped.
»
Policy Binding
Configure Policy if you need to further process the matched packets, through operations
such as mirroring, rate-limiting, redirecting, or changing priority. The Policy takes effect
after it is bound to a port or a VLAN.

Содержание

3073

Изучите, как ACL помогает управлять сетевым трафиком, предотвращать атаки и улучшать производительность сети. Узнайте о его функциях и применении.