SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3902
IMPLEMENTATION OF NETWORK SECURITY AND TRAFFIC FILTERING
USING ACCESS CONTROL LIST
R.Suganthi1, V.Nivetha2, D.Narmadha3 , O.R.Meenakumaari4
1Associate professor, Electronics and communication Engg. Panimalar Institute of Technology, Chennai, India
2,3,4B.E. Electronics and communication Engg. Panimalar Institute of Technology, Chennai, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Nowadays we are living in modern society, where
we use internet everywhere and major issue faced by
corporate world is the security. This project provides the
network security where authorized persons are allowed to
access the network and unauthorized persons aredenied. This
methodology is implemented using Access Control List in
VLAN.
Key Words: Network security, IP address, Access control
list, VLAN, router, host .
1.INTRODUCTION
Basically ACL is sequence or group of statements which
permit or deny access to the network and perform packet
filtering to control the network traffic. The third layer of the
OSI model transfer the packets. The packets contain source
address, destination address and so on . The packets are
matched with the conditional statementspecifiedintheACL.
By matching this condition the network security isachieved.
Router is used to route the packet to the destination based
on the static routing. In Static routing the configuration is
done manually to the routers. In this project router permits
or denies the access to the server using IP address. Here we
combine ACL and VLAN to provide better security for the
LAN network and to improve the QOS. VLAN is a group of
LAN network which provides security for each single LAN
network and also increases the overall performances of the
network. VLAN is formed by interfacing the network
elements to the ports of the switches.
2. TYPES OF ACL
We probably know that ACL there are different types of ACL
is present. We have types based on the versions of IP
version4, IP version6, Appletalk etc., IP version 4 access
control lists into two different types, standardandextended.
2.1 STANDARD ACL:
Checks source IP address. Permits or denies the entire
protocol. The IP address is 1-99. The main disadvantage in
standard is that we cannot remove single line of coding, if
there is error in the coding whole program should be
rewritten.
2.2 EXTENDED ACL:
Extended ACL is used to filter packets on cisco packettracer
based on source and destination IP address 100–199.
Extended ACL provides more flexibility and matching traffic
than standard ACL
2.3 TYPES OF STANDARD AND EXTENDED ACL:
 Numbered Access Control List
 Named Access Control List
2.3.1 NUMBERED ACL:
Numbers between 1 and 99, 1300and1999.Inthecommand
section the numbered is given as the command instead of
using names.
Syntax:
router(config)#access-list access-list-number {permit |
deny}{source [source-wildcard] | host hostname | any
E.g: Router(config)# access-list 1 permit 11.0.3.0 0.0.0.255
2.3.2 NAMED ACL:
The only difference between numbered and named is the
name, number is not given in the statement. Names are
easier to remember for commands than the numbers.
Syntax :
Router(config)# ip access-list standard name_of_ACL
E.g- Router(config)# ip access-list standard Charles
3. IP ADDRESSING
The IP address is the network layer address. A unique IP
address required for each host and network components
that communicate using TCP/IP. Each IP address network id
and host id. The network id identifies the systems that are
available on the same physical network id which is bounded
by the IP routers. Host id indentifies the workstation,server,
routers, or other TCP/IP host within a network.
3.1 SUBNET MASK
The subnet mask is used to differentiate the network prefix
and host id.
Host A: 158.80.164.100 255.255.0.0
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3903
Host B: 158.80.164.101 255.255.0.0
Network id:158.80.164.100
Subnet mask: 255.255.0.0
3.2 WILDCARD MASK
Wildcard masking in access list is used for address filtering.
This indicates whether the IP address has to be check or
ignore by comparing it with the address of the packets inthe
access list. A wildcard mask is 0 the bits are matched andifit
is 1 the bits are not matched. If the wildcard mask is not
assigned to the access list by default it is assumed as implicit
wildcard mask 0.0.0.0 means all bits must be matched.
3.3 IPSEC PROTOCOL
The IPSEC protocol provides a secured network protocol
suite that authenticates and encrypts the data packets. The
IPSEC protocol ensures confidentiality and integrity of data
communication over a public IP network. IPSEC can encrypt
data between devices like
 Router to router
 Pc to router
 Pc to server
 Firewall to router
4. EXPERIMENTAL SETUP
The CISCO PACKET TRACER 6.2is theuserfriendlysoftware
tool used to analyze the network behavior . The packet
tracer is the supplement to the physical system.Thephysical
system involves Switches, Routers, PC’S, Server. The packet
tracer allows the user to design their network, allow to
discover their network behavior and enable themtoidentify
the error and troubleshooting . The physical network is
designed in the Packet tracer by connecting the network
components. Then the Routers are configured but writing
the commands in the CLI. The IP address is assigned to the
host and server. Based on the commands configured on the
Router the host can be allowed or denied. The VLAN is
created in the existing LAN network and configured on the
Switches and Routers.
4.1 VLAN IN ACCESS CONTROL LIST
CODING:
R0 CONFIGURATION
Interface fa0/0.1
Encapsulation dot1Q 10
Ip address 10.1.1.10 255.255.255.0
Interface fa0/0.2
Encapsulation dot1Q 20
Ip address 20.1.1.10 255.255.255.0
FIG1: VLAN SETUP
R1 CONFIGURATION
R1#
R1#Conf t
Enter configuration commands, one per line. End with
CNTL/Z
R1(config)#int fa0/0
R1(config-if)#ip access-group namedstdacl out
R1(config-if)#end
R1#wr
R1#Conf t
Enter configuration commands, one per line. End with
CNTL/Z
R1#(Config0#ip access-list standard namedstdacl
R1#(Config-std-nacl)#no 100
R1#(Config-std-nacl)#no 110
R1#(Config-std-nacl)#no 120
R1#(Config-std-nacl)#end
R1#
%SYS-5-CONFIG_I: Configured from console by console
Wr
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3904
Building configuration......
[OK]
R1#sh access-lists
Standard IP access list namedstdacl
10 deny host 10.1.1.1
100 permit host 20.1.1.2
40 deny host 10.1.1.8
120 permit host 20.1.1.12
60 deny host 10.1.1.13
80 deny host 10.1.3.2
70 deny host 10.1.3.1
90 permit any
Now you can observe the seq no 100,110,120 is removed.
Now permit 20.1.1.2, 20.1.1.12, 20.1.1.17 with same
sequence number.
R1#
R1#Conf t
Enter configuration commands, oner per line. End with
CNTL/Z
R1(config)#ip access-list standard namedstdacl
R1(config-std-nacl)#100 permit 20.1.1.2
R1(config-std-nacl)#110 permit 20.1.1.7
R1(config-std-nacl)#120 permit 20.1.1.12
R1(config-std-nacl)#end
R1#
%SYS-5-CONFIG_I: Configured form console by console
Wr
Building configuration......
[OK]
R1#sh access-lists
Standard IP access list namedstdacl
10 deny host 10.1.1.1
100 permit host 20.1.1.2
40 deny host 10.1.1.8
120 permit host 20.1.1.12
60 deny host 10.1.1.13
110 permit host 20.1.1.7
80 deny host 10.1.3.2
70 deny host 10.1.3.1
90 permit any
R1#
Check connectivity from 20.1.1.2, 20.1.1.12, 20.1.1.7 to
access the server.
4.2 OUTPUT
Figure 2 Shows the ping of the server by the HR
department
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3905
TABLE1
When an attempt was made to ping router R0 through
interface loopback 10.1.1.13,10.1.1.8 10.1.1.1 the pingfailed
because IP address 10.1.1.13,10.1.1.8 and 10.1.1.1 is denied
by applying ACL in VLAN . This blocks the traffic in the LAN
network . Figure 2 shows the implementation of ACL in
VLAN on R1 by ping test.
6. CONCLUSION
Access Control List are a set of commands configured on a
router The routing packets selecttheoptimumpathbetween
source and destination. The path selected by the routing
protocol. ACLs limit network traffic to increase network
performance. ACLs configured on a network provide traffic
flow control by restricting the delivery of routing update. It
also provides additional security by denying host or IP
addresses and is very simple to configure.
7. REFERENCES
[1] International Nahush Kulkarni1,Harsh Kothari2,Hardik
Ashar3, Sanchit Patil published “Access ControlList”-
Journal for Research in Applied Science & Engineering
Technology (IJRASET) Electronics and
Telecommunication Department of K.J SomaiyaCollegeof
Engineering-Mumbai University.
[2] Vishes, Tejas, Tejaswini, Apoorva M Gowda, Siddarth S
Bellur, Samarth S Kulkarni, published “Access Control
List:Route,filtering and traffic control”- International
Journal of Advanced Research in Computer and
Communication Engineering (IJARCC) Department of
Telecommunication Engineering, BNM Institute of
Technology, Bangalore, India
[3] Xiao Liu, Brett Holden, and Dinghao WuCollege of
Information Sciences and Technology The Pennsylvania
State University, published“AutomatedsynthesisofAccess
Control List” University Park, PA 16802, USA
[4] Route Redistribution-A Case Study - ijarcce-
www.ijarcce.com/upload/2017/june-
17/IJARCCE%2042.pdf
[5] Configuring IP Access Lists - Cisco-
https://www.cisco.com/c/en/us/support/docs/security/i
os.../23602-confaccesslists.html
[6] Li Zhu ; Huaqing Mao ; Hang Qin "A Case Study on Access
Control Rules Design ” 2012 8th International Conference
on Wireless Communications, Networking and Mobile
Computing.
[7] Hirokazu Sayama, Noriaki Yoshiura “Test tool for
equivalence of access control list” 2012 14th Asia-Pacific
Network Operations and Management Symposium
(APNOMS)
[8] Kei Wakabayashi ; Daisuke Kotani ; YasuoOkabe“Traffic-
aware Access Control List Reconstruction” 2020
International Conference on Information Networking
(ICOIN)
[9] Cisco Systems Inc. http://www.cisco.com
[10]Sharat Kaushik, Anita Tomar, Poonam, “Access Control
List Implementation in a Private Network”, International
Journal of Information & Computation Technology, Vol.4,
No. 14, 2014, pp. 1361-1366
Command Description
show ip access-
list
Shows only the IP access
lists configured on the
router
Any Keyword used to represent
all hosts or networks,
replaces 0.0.0.0
255.255.255.255 in access
list.
Host Keyword that specifies that
an address should have a
wildcard mask of 0.0.0.0 (i.e
will match only 1 host)
Router > User EXEC Mode Default
mode after booting.
Router # Privileged EXEC mode Use
enable command from user
exec mode for entering into
this mode
Router(config)# Global Configuration mode
Use configure terminal
command from privileged
exec mode
Router(config-
if)#
Use interface <interface
name+number> command
from global configuration
mode
5. RESULT AND FINDINGS
ACL COMMANDS

More Related Content

What's hot

Isolated IntegrationISSConference2
Isolated IntegrationISSConference2Isolated IntegrationISSConference2
Isolated IntegrationISSConference2
Chris Ryan
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
Aaron ND Sawmadal
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014
Đồng Quốc Vương
 
Application Report On CC2530 Mini Kit Mesh Network
Application Report On CC2530 Mini Kit Mesh NetworkApplication Report On CC2530 Mini Kit Mesh Network
Application Report On CC2530 Mini Kit Mesh Network
Chiu-Hao Chen (Ted)
 
En erouting ilm_v4050 - para correção
En erouting ilm_v4050 - para correçãoEn erouting ilm_v4050 - para correção
En erouting ilm_v4050 - para correção
i10network
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Đồng Quốc Vương
 

What's hot (18)

Isolated IntegrationISSConference2
Isolated IntegrationISSConference2Isolated IntegrationISSConference2
Isolated IntegrationISSConference2
 
Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Ap6521 spec sheet
Ap6521 spec sheetAp6521 spec sheet
Ap6521 spec sheet
 
Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...Development of Distributed Mains Monitoring and Switching System for Indus Co...
Development of Distributed Mains Monitoring and Switching System for Indus Co...
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014
 
Introduction to Government funded equipment (GFE)
Introduction to Government funded equipment (GFE)Introduction to Government funded equipment (GFE)
Introduction to Government funded equipment (GFE)
 
Cisco AP 1200 Series
Cisco AP 1200 SeriesCisco AP 1200 Series
Cisco AP 1200 Series
 
An introduction to IO-Link - Peter Thomas - Oct 2015
An introduction to IO-Link - Peter Thomas - Oct 2015An introduction to IO-Link - Peter Thomas - Oct 2015
An introduction to IO-Link - Peter Thomas - Oct 2015
 
Application Report On CC2530 Mini Kit Mesh Network
Application Report On CC2530 Mini Kit Mesh NetworkApplication Report On CC2530 Mini Kit Mesh Network
Application Report On CC2530 Mini Kit Mesh Network
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworksCCNA Training, Networking Courses Hyderabad, Cisco Certified -  GolarsNetworks
CCNA Training, Networking Courses Hyderabad, Cisco Certified - GolarsNetworks
 
Industrial communication 2016 English
Industrial communication 2016 EnglishIndustrial communication 2016 English
Industrial communication 2016 English
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
En erouting ilm_v4050 - para correção
En erouting ilm_v4050 - para correçãoEn erouting ilm_v4050 - para correção
En erouting ilm_v4050 - para correção
 
Enable the smart factory with IO Link
Enable the smart factory with IO LinkEnable the smart factory with IO Link
Enable the smart factory with IO Link
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 

Similar to IRJET - Implementation of Network Security and Traffic Filtering using Access Control List

Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
Đồng Quốc Vương
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.
igede tirtanata
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
galerussel59292
 
Lab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdfLab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdf
Nesibusami
 
Avaya Cisco Trunking
Avaya Cisco TrunkingAvaya Cisco Trunking
Avaya Cisco Trunking
lescalp
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
irbas
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
irbas
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2
Kris Mofu
 

Similar to IRJET - Implementation of Network Security and Traffic Filtering using Access Control List (20)

corporate network
corporate networkcorporate network
corporate network
 
Design and Simulation of Secure Network for University Campus
Design and Simulation of Secure Network for University CampusDesign and Simulation of Secure Network for University Campus
Design and Simulation of Secure Network for University Campus
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
 
Ccna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 AnswersCcna 4 Chapter 7 V4.0 Answers
Ccna 4 Chapter 7 V4.0 Answers
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.
 
Exam viewer2
Exam viewer2Exam viewer2
Exam viewer2
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
 
IRJET- A Review Paper on Development of General Purpose Controller Board
IRJET- A Review Paper on Development of General Purpose Controller BoardIRJET- A Review Paper on Development of General Purpose Controller Board
IRJET- A Review Paper on Development of General Purpose Controller Board
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Lab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdfLab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdf
 
802 1ad
802 1ad802 1ad
802 1ad
 
Avaya Cisco Trunking
Avaya Cisco TrunkingAvaya Cisco Trunking
Avaya Cisco Trunking
 
Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010Ccna 3 v 4.0 final-exam-17-07-2010
Ccna 3 v 4.0 final-exam-17-07-2010
 
Ccna 3 v4.0 final-exam-17-07-2010
Ccna 3 v4.0  final-exam-17-07-2010Ccna 3 v4.0  final-exam-17-07-2010
Ccna 3 v4.0 final-exam-17-07-2010
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 

IRJET - Implementation of Network Security and Traffic Filtering using Access Control List

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3902 IMPLEMENTATION OF NETWORK SECURITY AND TRAFFIC FILTERING USING ACCESS CONTROL LIST R.Suganthi1, V.Nivetha2, D.Narmadha3 , O.R.Meenakumaari4 1Associate professor, Electronics and communication Engg. Panimalar Institute of Technology, Chennai, India 2,3,4B.E. Electronics and communication Engg. Panimalar Institute of Technology, Chennai, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Nowadays we are living in modern society, where we use internet everywhere and major issue faced by corporate world is the security. This project provides the network security where authorized persons are allowed to access the network and unauthorized persons aredenied. This methodology is implemented using Access Control List in VLAN. Key Words: Network security, IP address, Access control list, VLAN, router, host . 1.INTRODUCTION Basically ACL is sequence or group of statements which permit or deny access to the network and perform packet filtering to control the network traffic. The third layer of the OSI model transfer the packets. The packets contain source address, destination address and so on . The packets are matched with the conditional statementspecifiedintheACL. By matching this condition the network security isachieved. Router is used to route the packet to the destination based on the static routing. In Static routing the configuration is done manually to the routers. In this project router permits or denies the access to the server using IP address. Here we combine ACL and VLAN to provide better security for the LAN network and to improve the QOS. VLAN is a group of LAN network which provides security for each single LAN network and also increases the overall performances of the network. VLAN is formed by interfacing the network elements to the ports of the switches. 2. TYPES OF ACL We probably know that ACL there are different types of ACL is present. We have types based on the versions of IP version4, IP version6, Appletalk etc., IP version 4 access control lists into two different types, standardandextended. 2.1 STANDARD ACL: Checks source IP address. Permits or denies the entire protocol. The IP address is 1-99. The main disadvantage in standard is that we cannot remove single line of coding, if there is error in the coding whole program should be rewritten. 2.2 EXTENDED ACL: Extended ACL is used to filter packets on cisco packettracer based on source and destination IP address 100–199. Extended ACL provides more flexibility and matching traffic than standard ACL 2.3 TYPES OF STANDARD AND EXTENDED ACL:  Numbered Access Control List  Named Access Control List 2.3.1 NUMBERED ACL: Numbers between 1 and 99, 1300and1999.Inthecommand section the numbered is given as the command instead of using names. Syntax: router(config)#access-list access-list-number {permit | deny}{source [source-wildcard] | host hostname | any E.g: Router(config)# access-list 1 permit 11.0.3.0 0.0.0.255 2.3.2 NAMED ACL: The only difference between numbered and named is the name, number is not given in the statement. Names are easier to remember for commands than the numbers. Syntax : Router(config)# ip access-list standard name_of_ACL E.g- Router(config)# ip access-list standard Charles 3. IP ADDRESSING The IP address is the network layer address. A unique IP address required for each host and network components that communicate using TCP/IP. Each IP address network id and host id. The network id identifies the systems that are available on the same physical network id which is bounded by the IP routers. Host id indentifies the workstation,server, routers, or other TCP/IP host within a network. 3.1 SUBNET MASK The subnet mask is used to differentiate the network prefix and host id. Host A: 158.80.164.100 255.255.0.0
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3903 Host B: 158.80.164.101 255.255.0.0 Network id:158.80.164.100 Subnet mask: 255.255.0.0 3.2 WILDCARD MASK Wildcard masking in access list is used for address filtering. This indicates whether the IP address has to be check or ignore by comparing it with the address of the packets inthe access list. A wildcard mask is 0 the bits are matched andifit is 1 the bits are not matched. If the wildcard mask is not assigned to the access list by default it is assumed as implicit wildcard mask 0.0.0.0 means all bits must be matched. 3.3 IPSEC PROTOCOL The IPSEC protocol provides a secured network protocol suite that authenticates and encrypts the data packets. The IPSEC protocol ensures confidentiality and integrity of data communication over a public IP network. IPSEC can encrypt data between devices like  Router to router  Pc to router  Pc to server  Firewall to router 4. EXPERIMENTAL SETUP The CISCO PACKET TRACER 6.2is theuserfriendlysoftware tool used to analyze the network behavior . The packet tracer is the supplement to the physical system.Thephysical system involves Switches, Routers, PC’S, Server. The packet tracer allows the user to design their network, allow to discover their network behavior and enable themtoidentify the error and troubleshooting . The physical network is designed in the Packet tracer by connecting the network components. Then the Routers are configured but writing the commands in the CLI. The IP address is assigned to the host and server. Based on the commands configured on the Router the host can be allowed or denied. The VLAN is created in the existing LAN network and configured on the Switches and Routers. 4.1 VLAN IN ACCESS CONTROL LIST CODING: R0 CONFIGURATION Interface fa0/0.1 Encapsulation dot1Q 10 Ip address 10.1.1.10 255.255.255.0 Interface fa0/0.2 Encapsulation dot1Q 20 Ip address 20.1.1.10 255.255.255.0 FIG1: VLAN SETUP R1 CONFIGURATION R1# R1#Conf t Enter configuration commands, one per line. End with CNTL/Z R1(config)#int fa0/0 R1(config-if)#ip access-group namedstdacl out R1(config-if)#end R1#wr R1#Conf t Enter configuration commands, one per line. End with CNTL/Z R1#(Config0#ip access-list standard namedstdacl R1#(Config-std-nacl)#no 100 R1#(Config-std-nacl)#no 110 R1#(Config-std-nacl)#no 120 R1#(Config-std-nacl)#end R1# %SYS-5-CONFIG_I: Configured from console by console Wr
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3904 Building configuration...... [OK] R1#sh access-lists Standard IP access list namedstdacl 10 deny host 10.1.1.1 100 permit host 20.1.1.2 40 deny host 10.1.1.8 120 permit host 20.1.1.12 60 deny host 10.1.1.13 80 deny host 10.1.3.2 70 deny host 10.1.3.1 90 permit any Now you can observe the seq no 100,110,120 is removed. Now permit 20.1.1.2, 20.1.1.12, 20.1.1.17 with same sequence number. R1# R1#Conf t Enter configuration commands, oner per line. End with CNTL/Z R1(config)#ip access-list standard namedstdacl R1(config-std-nacl)#100 permit 20.1.1.2 R1(config-std-nacl)#110 permit 20.1.1.7 R1(config-std-nacl)#120 permit 20.1.1.12 R1(config-std-nacl)#end R1# %SYS-5-CONFIG_I: Configured form console by console Wr Building configuration...... [OK] R1#sh access-lists Standard IP access list namedstdacl 10 deny host 10.1.1.1 100 permit host 20.1.1.2 40 deny host 10.1.1.8 120 permit host 20.1.1.12 60 deny host 10.1.1.13 110 permit host 20.1.1.7 80 deny host 10.1.3.2 70 deny host 10.1.3.1 90 permit any R1# Check connectivity from 20.1.1.2, 20.1.1.12, 20.1.1.7 to access the server. 4.2 OUTPUT Figure 2 Shows the ping of the server by the HR department
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3905 TABLE1 When an attempt was made to ping router R0 through interface loopback 10.1.1.13,10.1.1.8 10.1.1.1 the pingfailed because IP address 10.1.1.13,10.1.1.8 and 10.1.1.1 is denied by applying ACL in VLAN . This blocks the traffic in the LAN network . Figure 2 shows the implementation of ACL in VLAN on R1 by ping test. 6. CONCLUSION Access Control List are a set of commands configured on a router The routing packets selecttheoptimumpathbetween source and destination. The path selected by the routing protocol. ACLs limit network traffic to increase network performance. ACLs configured on a network provide traffic flow control by restricting the delivery of routing update. It also provides additional security by denying host or IP addresses and is very simple to configure. 7. REFERENCES [1] International Nahush Kulkarni1,Harsh Kothari2,Hardik Ashar3, Sanchit Patil published “Access ControlList”- Journal for Research in Applied Science & Engineering Technology (IJRASET) Electronics and Telecommunication Department of K.J SomaiyaCollegeof Engineering-Mumbai University. [2] Vishes, Tejas, Tejaswini, Apoorva M Gowda, Siddarth S Bellur, Samarth S Kulkarni, published “Access Control List:Route,filtering and traffic control”- International Journal of Advanced Research in Computer and Communication Engineering (IJARCC) Department of Telecommunication Engineering, BNM Institute of Technology, Bangalore, India [3] Xiao Liu, Brett Holden, and Dinghao WuCollege of Information Sciences and Technology The Pennsylvania State University, published“AutomatedsynthesisofAccess Control List” University Park, PA 16802, USA [4] Route Redistribution-A Case Study - ijarcce- www.ijarcce.com/upload/2017/june- 17/IJARCCE%2042.pdf [5] Configuring IP Access Lists - Cisco- https://www.cisco.com/c/en/us/support/docs/security/i os.../23602-confaccesslists.html [6] Li Zhu ; Huaqing Mao ; Hang Qin "A Case Study on Access Control Rules Design ” 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing. [7] Hirokazu Sayama, Noriaki Yoshiura “Test tool for equivalence of access control list” 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS) [8] Kei Wakabayashi ; Daisuke Kotani ; YasuoOkabe“Traffic- aware Access Control List Reconstruction” 2020 International Conference on Information Networking (ICOIN) [9] Cisco Systems Inc. http://www.cisco.com [10]Sharat Kaushik, Anita Tomar, Poonam, “Access Control List Implementation in a Private Network”, International Journal of Information & Computation Technology, Vol.4, No. 14, 2014, pp. 1361-1366 Command Description show ip access- list Shows only the IP access lists configured on the router Any Keyword used to represent all hosts or networks, replaces 0.0.0.0 255.255.255.255 in access list. Host Keyword that specifies that an address should have a wildcard mask of 0.0.0.0 (i.e will match only 1 host) Router > User EXEC Mode Default mode after booting. Router # Privileged EXEC mode Use enable command from user exec mode for entering into this mode Router(config)# Global Configuration mode Use configure terminal command from privileged exec mode Router(config- if)# Use interface <interface name+number> command from global configuration mode 5. RESULT AND FINDINGS ACL COMMANDS