南阳理工学院本科生毕业设计(论文)学院(系):软件学院专业:网络工程学生:指导教师:完成日期2012年04月南阳理工学院本科生毕业设计(论文)基于ACL的校园网络安全策略的设计与实现BasedonDesignandImplementationofthecampusnetworksecuritypolicyinACL总计:毕业设计(论文)21页表格:3个图片:6个基于ACL的校园网络安全策略的设计与实现南阳理工学院本科毕业设计(论文)基于ACL的校园网络安全策略的设计与实现BasedonDesignandImplementationofthecampusnetworksecuritypolicyinACL学院(系):软件学院专业:网络工程学生姓名:学号:指导教师(职称):讲师评阅教师:完成日期:2012年04月14日南阳理工学院NanyangInstituteofTechnology基于ACL的校园网络安全策略的设计与实现基于ACL的校园网络安全策略的设计与实现网络工程[摘要]随着网络的高速发展,网络的普及也越来越平民化,在人们的学习和生活的方方面面,网络无孔不入,给人们的学习和生活带来了极大的便利,但随之而来的网络安全问题也越来越引起人们的重视。高校校园网的安全是一个庞大的系统工程,需要全方位的防范。防范不仅是被动的,更要主动进行。ACL(访问控制列表)是网络安全防范和保护的主要策略,网络管理员通常首选ACL策略来完成对所管理网络的安全配置。由此可见ACL在网络中的重要性。本文通过在校园网中配置ACL实现对网络安全策略的应用,论文首先论述了ACL的发展和应用,详细介绍ACL的概念、作用、工作流程、分类和局限性,然后介绍了各种类型的访问控制列表的具体配置,最后搭建配置校园网的环境,具体配置校园网的控制访问列表,实现校园网运作在一个安全稳定的环境中。[摘要]ACL;校园网;网络安全策略基于ACL的校园网络安全策略的设计与实现BasedonDesignandImplementationofthecampusnetworksecuritypolicyinACLNetEngineeringMajorAbstract:Withtherapiddevelopmentofthenetwork,thepopularityofthenetworkmoreandmorecivilianspervasiveinpeople'slearningandallaspectsoflife,thenetworkhasbroughtgreatconveniencetopeople'slearningandlife,buttheaccompanyingnetworkthesecurityissuehasdrawnincreasingattention.CampusNetworksecurityisahugeproject,afullrangeofprevention.Preventionisnotonlypassive,butalsototaketheinitiative.ACL(AccessControlList)isthemainstrategyofpreventionandprotectionofnetworksecurity,networkadministratorsoftenpreferredtheACLpolicytocompletethesecurityconfigurationonthemanagementnetwork.ThisshowstheimportanceofACLinthenetwork.ThisarticlethroughinthecampusnetworkconfigurationACLtoachieveintheapplicationofnetworksecuritypolicy,thispaperfirstdiscussesthedevelopmentandapplicationoftheACL,detailedintroducestheconcept,function,ACLworkingprocess,andtheclassificationandlimitations,andthenintroducesvarioustypesofaccesscontrollistofthespecificconfiguration,buildenvironmentofcampusnetworklastconfiguration,andthespecificconfigurationofthecampusnetworkaccesscontrollist,realizecampusnetworkoperatinginasafeandstableenvironmentKeywords:ACL;CampusNetwork;NetworkSecurityPolicy基于ACL的校园网络安全策略的设计与实现目录1.ACL的发展和应用...............................................................................................................11.1ACL发展......................................................................................................................11.2ACL的应用..................................................................................................................12.ACL的概述...........................................................................................................................22.1ACL的定义..................................................................................................................22.2ACL的作用..................................................................................................................22.3ACL基本原理..............................................................................................................22.4ACL的工作过程..........................................................................................................32.5ACL的分类..................................................................................................................42.6ACL的局限性..............................................................................................................42.7ACL的匹配顺序..........................................................................................................42.8通配符掩码..................................................................................................................52.9正确放置ACL.............................................................................................................53.ACL的各种应用配置...........................................................................................................63.1标准ACL的配置........................................................................................................63.2扩展ACL的配置........................................................................................................73.3命名ACL.....................................................................................................................83.4基于时间段的ACL配置............................................................................................93.5ACL的显示调试和删除............................................................................................104.校园网ACL应用实例.......................................................................................................114.1搭建配置环境............................................................................................................124.2ACL在院系机构的应用............................................................................................124.3ACL在教学机房中作用............................................................................................144.3.1屏蔽特定端口防范病毒与攻击......................................................................144.3.2通过ACL限制上网行为....................................................................