How ACLs Work
1. Visualizing an ACL
Let’s begin with an example of a Standard Access Control List (ACL) to understand how it works. Imagine you need to allow the Legal network (192.168.1.0/24) to access the Legal server while blocking the HR network (192.168.2.0/24) from accessing the Legal server.

🔹 Here’s what a basic Standard ACL might look like in a router configuration:
R1(config)# ip access-list standard 10 R1(config-std-nacl)# permit 192.168.1.0 0.0.0.255 R1(config-std-nacl)# deny 192.168.2.0 0.0.0.255
✅ Breakdown:
- The first line creates the Standard ACL numbered 10.
- The second line permits traffic from the 192.168.1.0/24 network.
- The third line denies traffic from the 192.168.2.0/24 network.
These rules form the building blocks of an ACL, which we’ll explore further in the next sections.
2. Access Control Entries (ACEs)
🔍 Each rule in an ACL is called an Access Control Entry (ACE). Think of an ACL as a list, and each ACE as an item in that list.

✅ In the example above:
- ACE 10: Permits traffic from the 192.168.1.0/24 network.
- ACE 20: Denies traffic from the 192.168.2.0/24 network.
🔍 Reading Order
Routers process ACLs from top to bottom. As soon as a packet matches an ACE, the router stops checking further rules.
💡 Why it’s important: If the rules are in the wrong order, you might unintentionally block or allow traffic. Always plan the order carefully.
3. ⚠️ Implicit Deny
At the end of every ACL, there’s an implicit deny rule. This means that if a packet doesn’t match any ACE, it’s automatically denied. You won’t see this rule listed, but it’s always there.

💡 Why Implicit Deny Matters
The implicit deny ensures that any traffic not specifically allowed is blocked. This is a critical safety measure to prevent unintended access.
4. Inbound vs Outbound ACLs
When applying an ACL to a router interface, you need to decide whether it filters traffic inbound or outbound. Let’s explore the difference.
🛠️ Inbound ACLs
- Applied to packets as they enter the router interface.
- Filters traffic before any routing decisions are made.
- Ideal for blocking unwanted or harmful traffic early, saving resources.
✅ Example: Blocking malicious traffic from external sources before it enters your network.

🛠️ Outbound ACLs
- Applied to packets as they leave the router interface.
- Filters traffic after routing decisions are made.
- Useful for applying consistent security policies to outgoing traffic.
✅ Example: Logging all outgoing connections from a specific department.

📢 Next Steps: Now that we’ve learned the fundamentals of how ACLs work, the next course will focus on configuring a Standard ACL.