Back to Basics : Access-Lists and Types
Before we start with the various access lists, let's talk about what the Access Lists actual are and why they are used. So answer to your question is Access-List is the way to filter the IP packets entering to the network. So with the use of Access-Lists you can permit or deny the IP packets on the base of IPs, Names, protocols and so on and the routing table decide the traffic routing on the basis of the set of rules we authorised.
Below is just a Sample diagram showing using the Access-Lists and has no relevance with any of the configuration used below.
![]() |
| Sample Diagram showing Access-Lists |
We have different kinds of Access-lists and I am taking a short note and the configuration part of these access-lists one by one. These access-lists are :
- Standard Access-Lists
- Extended Access-Lists
- IP Named Access-Lists
- Lock and Key Access-Lists
- Reflexive access-Lists
- Context-Based Access Control
- Turbo Access-Lists
Let's Continue reading



Block Armour built its security using Hyperledger code.
UK-based insurance group RSA is a customer.
The Kubernetes group claims more than 50,000 commits since launch.
Nokia completes its Comptel acquisition; Windstream joins the ONAP Project.