Academia.eduAcademia.edu

The users in this network require access to the Internet's content for marketing purposes. This requires that TCP/IP sessions be permitted to flow in both directions through the connection to the Internet. Th users are concerned, however, about exposing their internal hosts to attack from the Intermet. Therefor access control lists can be used to exclude UDP access to ports EO and E1 from SO either universally c per application type. In this example, anyone attempting to access these ports from the SO port using tl UDP protocol will be denied access. No such restrictions are placed on ports EO and E1. The cumulati access control lists (one per port) would resemble the contents of Table 4-1.

Table 4 The users in this network require access to the Internet's content for marketing purposes. This requires that TCP/IP sessions be permitted to flow in both directions through the connection to the Internet. Th users are concerned, however, about exposing their internal hosts to attack from the Intermet. Therefor access control lists can be used to exclude UDP access to ports EO and E1 from SO either universally c per application type. In this example, anyone attempting to access these ports from the SO port using tl UDP protocol will be denied access. No such restrictions are placed on ports EO and E1. The cumulati access control lists (one per port) would resemble the contents of Table 4-1.