Experimental Simulation and Comparative Analysis of an Access Control List at Different Deployment Locations

An access control list is an important network security technology, and it is also a key point of computer network courses. Since access control lists are abstract and difficult to understand, their deployment locations are complex, diverse and hard to optimize and they are not easy to explain in ex...

Full description

Saved in:
Bibliographic Details
Published in2022 IEEE 2nd International Conference on Computer Communication and Artificial Intelligence (CCAI) pp. 115 - 120
Main Authors Cao, Yuanqing, Ai, Lisina
Format Conference Proceeding
LanguageEnglish
Published IEEE 06.05.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An access control list is an important network security technology, and it is also a key point of computer network courses. Since access control lists are abstract and difficult to understand, their deployment locations are complex, diverse and hard to optimize and they are not easy to explain in experimental teaching. First, the basic working principle and classification standard of an access control list is introduced. Then, experimental cases are designed in the Cisco Packet Tracer simulation platform, the experimental results of a standard IP access control list and an extended IP access control list in different deployment locations are compared and analyzed, and the experimental steps and configuration commands are given. Finally, this paper summarizes the optimization methods for the deployment locations of a standard IP access control list and an extended IP access control list. The experimental teaching process shows that the comparative experimental analysis of an access control list in a virtual environment not only deepens students' understanding and mastery of the working principle of access control lists and their deployment rules in different locations but also improves students' skills in solving engineering practice problems by using access control lists.
DOI:10.1109/CCAI55564.2022.9807771