Network Security Using Access Control Lists - Avaya G250 Administration

Media gateways
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Configuring policy

Network security using access control lists

The primary use of access control lists is to act as a component of network security. You can
use access control lists to determine which applications, networks, and users can access hosts
on your network. Also, you can restrict internal users from accessing specific sites or
applications outside the network. Access control lists can be based on permitting or denying
specific values or groups of IP addresses, protocols, ports, IP fragments, or DSCP values.
Figure 49: Network Security using access control lists
control lists are used to control traffic into and out of your network.
Figure 49: Network Security using access control lists
Server
User Workstation
Server
532 Administration for the Avaya G250 and Avaya G350 Media Gateways
Internal Network
Router
Unwanted Inbound Traffic
Unwanted Inbound Traffic Blocked by
Unwanted Outbound Traffic
Unwanted Outbound Traffic Blocked by
Access Control List
on page 532 illustrates how access
External Network/Internet
External Network/Internet
Access Control List
Foreign Host
Foreign Application
Server
Foreign Network Router
Foreign
Foreign
Network Host
Network Host
Network Host
Foreign

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents