Access control lists (ACLs) are mechanisms available on different network devices (e.g., routers, switches, firewalls, servers, etc.) and are used to restrict access based on a series of parameters:
- Source MAC address
- Destination MAC address
- Source IP address
- Destination IP address
- Port numbers or services
- Time of day
Modern networks allow communication of remote or mobile devices to enterprise resources to improve productivity. One of the challenges of using this approach is ensuring that you provide a secure connection from the external location to the . . .
The content below this message is for members only.