When purchasing content from an information provider, the usual procedure involves submitting a list of IP addresses or IP networks so that it can be added to the
access-control list for that subscribed resource.
The software simplifies
access-control list management, creating configuration backups, and the editing of running and startup device configuration files.
These include changes to firewall configuration and alterations to
access-control lists (ACLs).
To avoid problems associated with scanning activity, the BlackDiamond 10K applies multiple
access-control lists upstream to block selected traffic, as well as at each port.
The catalog stores system-level metadata, including audit trails,
access-control lists, and location information about the storage system on which the desired data set resides and the definition of the protocol to be used to access the storage system.
The network devices then use some form of dynamic access control, typically through virtual LAN assignments or
access-control lists.
Discretionary access controls give each user the ability to specify which resource accesses are considered to be authorized -- for example, granting read, write and execute rights via user/group/world permissions or
access-control lists. These controls are intended to limit access; however, they are generally ineffective in preventing the propagation of copies and in preserving privacy.
The included D-Link D-View Network Management Software uses SNMP v.3 and supports
access-control lists, allowing for real-time network traffic monitoring.--D-Link
Security features include IP and MAC
access-control lists, SSL and SSH encryption of management traffic, and RADIUS management authentication.