{"title":"Experimental Simulation and Comparative Analysis of an Access Control List at Different Deployment Locations","authors":"Yuanqing Cao, Lisina Ai","doi":"10.1109/CCAI55564.2022.9807771","DOIUrl":null,"url":null,"abstract":"An access control list is an important network security technology, and it is also a key point of computer network courses. Since access control lists are abstract and difficult to understand, their deployment locations are complex, diverse and hard to optimize and they are not easy to explain in experimental teaching. First, the basic working principle and classification standard of an access control list is introduced. Then, experimental cases are designed in the Cisco Packet Tracer simulation platform, the experimental results of a standard IP access control list and an extended IP access control list in different deployment locations are compared and analyzed, and the experimental steps and configuration commands are given. Finally, this paper summarizes the optimization methods for the deployment locations of a standard IP access control list and an extended IP access control list. The experimental teaching process shows that the comparative experimental analysis of an access control list in a virtual environment not only deepens students’ understanding and mastery of the working principle of access control lists and their deployment rules in different locations but also improves students’ skills in solving engineering practice problems by using access control lists.","PeriodicalId":340195,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Communication and Artificial Intelligence (CCAI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 2nd International Conference on Computer Communication and Artificial Intelligence (CCAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCAI55564.2022.9807771","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
An access control list is an important network security technology, and it is also a key point of computer network courses. Since access control lists are abstract and difficult to understand, their deployment locations are complex, diverse and hard to optimize and they are not easy to explain in experimental teaching. First, the basic working principle and classification standard of an access control list is introduced. Then, experimental cases are designed in the Cisco Packet Tracer simulation platform, the experimental results of a standard IP access control list and an extended IP access control list in different deployment locations are compared and analyzed, and the experimental steps and configuration commands are given. Finally, this paper summarizes the optimization methods for the deployment locations of a standard IP access control list and an extended IP access control list. The experimental teaching process shows that the comparative experimental analysis of an access control list in a virtual environment not only deepens students’ understanding and mastery of the working principle of access control lists and their deployment rules in different locations but also improves students’ skills in solving engineering practice problems by using access control lists.