'Dkuwm0Ef Ta& Ohk Yg : Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm
'Dkuwm0Ef Ta& Ohk Yg : Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm
'Dkuwm0Ef Ta& Ohk Yg : Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm Jynfolyoabmxm
jynfolYoabmxm;
I J
X
bk 7 m;
I w7m; J
I oH C m J
I wdt
Œk m; OD;xdyyf efqif &Scd ;kd uefawmhyg.?
J
I
( azaz )/ ( arar )
w,fw,f/ rmrm;
q7m udknDnDaxG;
( ud_k zdK; )
wkt
Œd m; Tpmtky-f zifh uefawmhyg.?
aZmfvif; (YOUTH Computer Co., Ltd) rS
a&;om;xkwfa0NyD;aompmtkyfrsm;
apwemrsm;pGmjzifh
aZmfvif;
pma&;ol
rmwdum
CHAPTER 1 Introduction
C HAPTE R 2 IOS
CH A P T E R 7 Switching
CHAPTER 8 VLAN
9.1 SecurityESiAccess-List
hf wd\
Yk tajccHoabmw&m;rsm; - 178
9.1.1 Secured Network wpfctk wGi;f ½StoH
d ;k tESKe;f rsm; - 179
9.1.2 Cisco IOS Firewall - 182
9.1.3 Basic and Advanced Traffic Filtering - 184
9.2 Access Lists rsm;taMumif; - 186
9.2.1 Access Lists tvkyfvkyfyHk - 186
9.2.2 Traffic \ Direction trsdK;tpm;rsm; - 187
9.2.3 Access List aqmuf&mwGivd f u
k ef moifah omtcsurf sm; - 190
9.2.4 ACL aMumifa h vsmuh somG ;Edik af omSecurity Threats rsm; - 191
9.2.5 ACL udo k ;kH r,fq&kd if'gawGurjkd zpfraevkyaf y;zdv
Yk ykd gw,f - 192
9.3 Basic Access List rsm;taMumif; - 192
9.3.1 Standard Access List - 192
9.3.2 Wildcard Mask - 195
9.3.3 Block Size, Wildcard wdkYeJYywfowfírSwfp&mrsm; - 196
9.3.4 Create vkyfNyD;om; Standard Access List udkInterface
ay:wiG Apply
f vkyjf cif; - 198
9.3.5 Extended Access List - 202
9.3.6 Client rsm;rSTelnet jzifAccess
h vkycf iG yhf rmPtm;uefo
Y wfjcif; - 209
9.4.1 Advanced Access List rsm;taMumif; - 210
9.5.1 aqmufNyD;oGm;aomAccess List rsm;udjk yefvnfMunf½h jI cif; - 217
9.6 IOS Firewall ESiProxy
hf Server - 218
9.6.1 Cisco IOS Firewall (Context-Based Access Control) - 218
9.6.2 Authentication Proxy - 220
C H A P T E R 10 NAT