You are on page 1of 18

Access Control List

Introduction to ACL
About Me

Name : Noras Noor Azizah


Origin : Bandung, Jawa Barat
Residence Address : Karawaci, Tangerang, Banten
Education
Formal : SMK Negeri 1 Cihampelas
Informal : Anak Modok BestPath-Network ( Mei 2021 –
Now )
E-mail : norasnoor2392@gmail.com

@nrsnoor_ t.me/nrsnoor Noras Noor Azizah


EXPERIENCE

- Project H3CSE | June 2021

- PON XX Papua 2021 | Agustus 2021

- PEPARNAS XVI Papua 2021 | November 2021

- PT. Arjuna Sinatria Amarta | Januari 2022

- SMK Telkom Makassar | Maret 2022

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Agenda

- Access Control List Introduction - Traffic type Access Control List

o Step of Work Access Control List o Inbound Access Control List

o Function Access Control List o Outboud Access Control List

o Advantages and disadvantages ACL

- Types Access Control List

o Standard Access Control List

o Extended Access Control List

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Access Control List Introduction
What ACL?

Access Control List or which is often called ACL


is which contains permission and of course has been
controlled by access control.

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Step of Work ACL

Access List work filtering data traffic a network by


controlling whether packets are passed or stopped at the
(Interface) router.

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Function ACL

Limit network and upgrade for Control client area to gain network
network work access

Deciding which type of traffic to Able to provide a security basis for


pass or block through the router access to the network
interface

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Advantages ACL

Good security for defined lines of


every computer or communication
server
Manage network
communication lines using
routing techniq

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Disadvatages ACL

Communication for each ACL implementation takes a long


computer is limited time because it involves router
communication structure.

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Types Access Control List
Standard ACL

Standard ACL is an ACL that can only filter based on


source IP only.

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Extended ACL

Extended ACL is one that can only filter based on the


source IP Address, Protocol, & port number.

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Packet Filtering

ACL (Access Control List) is a list of conditions designed


by the Network Administrator to select data packets that
enter/leave the Router through a set of rules.

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Traffice Type ACL
Inbound ACL

Inbound is packets that enter the router interface.

Inbound

IP Packet

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


Outbound ACL

Outbound is a packet that comes out of the router interface out of the router.

Outbound

IP Packet

BestPath-Network Best-Path Network www.bestpath-network.com Info@bestpath-network.com @bestpathnetwork


TERIMAKASIH ATAS
PARTISIPASI ANDA
Salam Pantang Pulang Sebelum Reply!!!
---
Dan Selamat Menunaikan Ibadah Puasa

You might also like