. . "The key equipments used in our system, such as routers, switches, are protected by the access control list based on port, ensuring that only the workstations of some network addresses can access them so that attacking these equipments is prevented." . .