O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Overview of Access Control Lists

Access control lists are essentially traffic filters that are used on routers to identify specific kinds of packets based on a packet attribute, such as the IP address. Access control lists can then be used to take specific actions after the packets have been identified, such as stopping them from passing through a specific interface.

Access control lists are comprised of a series of Access Control Elements (ACEs), each of which is a single rule designed to match a particular type of packet. An access list is a set of ACEs grouped and identified via a number or a name. An ACE defines the protocol it watches out for, any protocol options that are associated with that protocol, and whether the matching traffic is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required