DES-7200 Configuration Guide Chapter 1 Access Control List
Configuration
1-2
1.1.2 Why to Configure Access
Lists
There are many reasons why we need configure access lists. Some of them are as
follows:
Restrict route updating: Control where to send and receive the route updating
information.
Restrict network access: To ensure network security, by defining rules, make
users unable to access some services. (When a user only need access the WWW
and E-mail services, then other services like TELNET are disabled). Or, allow
users to access services only during a given period or only allow some hosts to
access networks.
Figure 1 is a case. In the case, only host A is allowed to access Finance Network, while
Host B is disallowed to do so. See Figure 1.
Figure 1 Using Access List to Control Network Access
1.1.3 When to Configure Access
Lists
Depending on your requirements, you can select the basic access list or dynamic
access list. In general, the basic access list can meet the security
requirement.However, experienced hackers may use some software spoof source
address and cheat the devices so as to gain accesses. Before the user can access the
network, the dynamic access list requires the pass of authentication so that the
hackers are difficult to invade the network. So, in some sensitive areas the dynamic
access list can be used to ensure the network security.