CORPORATE NETWORK SECURITY USING EXTENDED ACCESS CONTROL LIST (ACL) IN A SIMULATION ENVIRONMENT

  • Aliyu Rabiu Karmanje
  • Oyenike Mary Olanrewaju
  • Shamsuddeen Falalu
Keywords: Ping of Death, Zombie, DoS, DDoS, Smurf Attack

Abstract

Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is achieved by determining whether packets to be forwarded are authorized to get to their desired destination. This action can be carried out by exploiting misconfigured ACL (Access Control List). ACL is a list of rules that determine whether and how to forward or discard a packet on a network i.e. it filters packets. ACL can also be used for implementing network policies such as NAT (Network address Translation). A correct ACL configured on a router examines each packet to determine whether to forward or drop the packet, this decision is based on the rules specified within the access lists leading to secure network and packet flow. In corporate organizations sometimes there is an interconnection between various LANs but not all devices are allowed to access a device on particular LAN because of the nature of the resources on that device, hence in such scenario ACL is a good choice when looking for the appropriate tool to control the device access. In this paper we have designed a model of a corporate network with 3 Local Area Networks (LANs), and packets traverse the devices on the LANs). After applying the correct ACL configurations on the LAN 2 Router access is restricted on LAN 2 server, which now only receives packets from an authorized device, this greatly enhances the security 

References

Bansal R. and Sharma P. (2016), Implementation of Privilege Level and Access - Control Mechanism for Network Security, International Journal of Advance Research and Innovative Ideas in Education, Vol-2 Issue-4, p 957-962 ISSN(O) - 2395-4396

Balchunas A. (2014), CCNA Study Guide v2.71.

Bobyshev A., DeMar P., Lamore D., Fermilab, and Batavia (n.d), Effect of Dynamic ACL (Access Control List) Loading on Performance of CISCO Routers.

Javid R. (2014), Role of Packet Tracer in learning Computer Networks, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, pp 2278-1021 www.ijarcce.com 6508

Kaushik S., Tomar A, and Poonam (2014), Access Control List Implementation in a Private Network, International Journal of Information & Computation Technology, Vol. 4, No. 14, pp. 1361-1366.

Rinehart J. (2013), Demystefying Switch-based ACLs, Global Knowledge Expert Reference Series of White Papers.

Suman S. and Agrawal A. (2016), IP Traffic Management With Access Control List Using Cisco Packet Tracer, International Journal of Science, Engineering and Technology Research (IJSETR) Volume 5, Issue 5,p 1556-1561 ISSN: 2278 – 7798

Todd T. (2013), Cisco Certified Network Associate Study Guide, Wiley Publishing, Inc., 8th Edition.

Tomar K. and Tyagi S. S. (2014), Enhancing Network Security And Performance Using Optimized ACLs, International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6 pp 25-35

Velte A. and Velte T. (2014), Cisco - A Beginner’s Guide, McGrawHill Inc, 5th edition. Cisco Systems Inc. http://www.cisco.com

Zhian L. (2011), Study of Network Optimization Method Based on ACL, Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS]. Procedia Engineering Journal, Vol. 15, p 3959-3963

Published
2023-04-10
How to Cite
KarmanjeA. R., OlanrewajuO. M., & FalaluS. (2023). CORPORATE NETWORK SECURITY USING EXTENDED ACCESS CONTROL LIST (ACL) IN A SIMULATION ENVIRONMENT . FUDMA JOURNAL OF SCIENCES, 3(3), 264 - 269. Retrieved from https://fjs.fudutsinma.edu.ng/index.php/fjs/article/view/1568