Access Control List to improve the network security
What is an Access control List (ACL)? What does it do? Why do you need to configure an ACL? What are Access Control entries? Who is a trustee? What are the types of ACL in use and in which circumstances are they used? Where in the network, should you configure an ACL?








