Security
Security
An access control list (ACLs): - is a list of rules that specifies which users or systems are granted
or denied access to a particular object or system resource.
Access control lists are also installed in routers or switches, where they act as filters, managing
which traffic can access the network.
• standard,
• extended,
• dynamic, and
• reflexive.
Standard ACL: A standard ACL is all about focusing on the source address. This type of Access
Control List in cyber security only takes into account the source of the enquiring user or system.
It’s the most basic form of ACL and, consequently, isn’t able to provide top quality security.
Extended ACL: Slightly more sophisticated than a standard ACL, an extended ACL allows you to
block source and destination for single host as well as entire networks. In addition, it’s also
possible to filter traffic based on protocol information by using an extended ACL.
Dynamic ACL: Requiring specific authentication, a dynamic ACL actually uses extended ACLs.
They can be used for specific timeframes and are often referred to as “lock and key”.
Reflexive ACL: Using upper layer session information to filter traffic, reflexive ACLs are also
known as IP session ACLs. Operating within a specific session, this kind of entry is removed after
the session is over.
An Access Control List is all about security – it allows you to regulate who has access to your
network, making it more secure overall. Without an ACL, any and all traffic can enter or exit
your network, making it vulnerable to traffic that shouldn’t be there.
By immediately restricting or blocking specific types of users or systems based on the criteria on
the list, you are helping your network to be more secure. In fact, by using an ACL, you have the
ability to deny specific routing updates as well as properly control the flow of traffic into and out
of your network. Making use of an Access Control List, no matter how basic, is an absolute must
to ensure the most basic level of cybersecurity.
With an access list, you can simplify the way local users, remote users, and remote hosts are
identified. This is done using an authentication database configured to ensure only approved
users are allowed access to the device.
An access list also allows you to prevent unwanted users and traffic. If you set up parameters
that dictate which source or destination addresses and which users are allowed to access a
network, you can prevent all others from getting inside. You can also categorize the kinds of
traffic you want to allow to access the network and then apply those categories to the ACL. For
example, you can create a rule that enables all email traffic to pass through to the network but
block traffic that contains executable files.