Response 3.edited

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Running Head: DISCUSSION RESPONSE 1

Discussion Response.

Students Name:

Professors Name:

Date.
DISCUSSION RESPONSE 2

Response to Ashok Yepuri.


Hi Yepuri
 Indeed, the Access Control List is used to filter and control g packets of the inbound and

outbound network traffic (Cox, 2020). ACL I security tool uses configured rules and standards

set to validate the kind of traffic packets that should either be allowed to flow or blocked

depending on the information they are carrying. I agree with you that ACL entirely secures

network systems by screening, identifying, and blocking packets that do not meet the access

requirements.

It should be known that ACL unique features make it the most suitable security tool as it

can be used in many different gadgets to serve different purposes. Contrary,firewalls are only

meant for traffic monitoring and selectively grant access or deny traffic access to the network

system (Bhardwaj, 2018. In addition to that, it is good to understand that both ACL and firewall

serve to provide adequate network security that keeps intruders and other cybercriminals.
DISCUSSION RESPONSE 3

References

Bhardwaj, R. (2018, December 19). Difference between ACL on Router and Firewall - IP With

Ease. Retrieved from https://ipwithease.com/difference-between-acl-on-router-and-

firewall/
DISCUSSION RESPONSE 4

Discussion Response.

Students Name:

Professors Name:

Date.
DISCUSSION RESPONSE 5

Response to Venkata Erikinaboina 


Hello Venkata.
I agree with your idea that every organization needs to understand the differences

between Access Control List and the firewall before using them. This will guide the organization

on the best tool to deploy to safeguard their network from intruders and other malicious network

attackers. Besides that, I can also add that ACL provides network security by scrutinizing all the

incoming traffic packets to ascertain whether they are from trustworthy senders or malware

associates. By use of defined rules, ACL can compare the traffic packets with the set

instructions. After that, ACL can give the go-ahead only packets that met the set criteria and

block whose content does not match set standards.

It is also good to understand that ACL differs in some ways from firewalls. Firstly, the

firewall provides stateful inspection on the traffic packets, whereas ACL launches stateless

inspections on the traffic packets. And lastly, a firewall is a mono purpose security tool as

compared to ACL that can be used in many different fields.

You might also like