<P>能发现这个问题说明你对网络的理解已经挺不错了!</P><P>Establish 是专门用于TCP的访问列表。自反访问控制列表Reflexive Access Lists的功能比它强大很多。</P><P>两者是都能实现只有内网发起的TCP连接才被允许。</P><P>但Reflexive Access Lists功能强大得多:</P><H4><A name=xtocid7><A name=18465><A name=1000956>With Reflexive Access Lists</A></A></A></H4><P>Reflexive access lists, however, provide a truer form of session filtering, which is much harder to spoof because more filter criteria must be matched before a packet is permitted through. (For example, source and destination addresses and port numbers are checked, not just ACK and RST bits.) Also, session filtering uses temporary filters which are removed when a session is over. This limits the hacker's attack opportunity to a smaller time window.</P><P>Moreover, the previous method of using the <B>established</B> keyword was available only for the TCP upper-layer protocol. So, for the other upper-layer protocols (such as UDP, ICMP, and so forth), you would have to either permit all incoming traffic or define all possible permissible source/destination host/port address pairs for each protocol. (Besides being an unmanageable task, this could exhaust NVRAM space.)</P><P>要多理解技术产生的根源和场合,仅仅说两者不是都会了实现A能PING B,B无法PING A的功能...这个是不够的!这个问题算是比较难的!要好好理解!</P> |