What is an Access control List (ACL)? What does it do? Why do you need to configure an ACL? What are Access Control entries? Who is a trustee? What are the types of ACL in use and in which circumstances are they used? Where in the network, should you configure an ACL?
Access Control List to improve the network security
Access control List (ACL) is term referred in file system of the computer which is the list of permissions that are attached along with the object. ACL grants access to the objects and the operations performed on objects to only legitimate users. So, ACL mainly concerns with access right permissions. There are two types of ACL – discretionary access control list, system access control list. In the discretionary access control list, identifies the authorized persons to allow access to the system. The system access control list allows only administrators to access the secured objects.