answersLogoWhite

0

A control list of your firewall that you can access.

answer #2

--------------

an access control list is a set of rules that are compared to each incoming or outgoing packet or access to determine if they are allowed to pass. The rules have different formats depending on the manufacture but they do the same thing. For example a rule may say drop all packets to port external port 155, or drop all web requests from the inside to a particular web site. In a properly configured firewall all traffic is blocked unless it matches a specific rule, this prevents an application (like a virus) using an oddball port to communicate and download more dangerous software. When a new virus is discovered one way to prevent its spread is publicize the ports it uses so they can be at least monitored if not blocked entirely.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

A stateful firewall uses what type of access control?

Context-dependent access control


What type of access control is determined by configuring an access control list or ACL?

Discretionary Access Control


Logical access control method can be used to limit access to specific resources in a domain environment?

Access control list (ACL)


An access control list or ACL?

An access control list (or ACL) defines who can perform actions on a file or folder.


What is the difference between access control list and access control entry?

Access Control list is the audit settings and security settings of objects. whereas Access Control Entry is the entry within the ACL. mightymax


Is the security guard that stands between your home computer and the Internet an ACL?

No; the guard between your computer and the Internet is usually called a firewall. An ACL is an access control list, and it specifies which users/machines can access a resource.


What type of logical access control method allow you to define who can access an object and the type of access that they will have to that object?

Access control list


What are advantage of access control list?

An access control lists specifies the various users and what level of access they have. If you activate an access control list in a application, the various components of the application will be accessed based on the level of access permitted to them and the access level specified in the access control list for the currently logged in user.


What is the difference between firewall and access list?

Firewalls control all incoming and outgoing connections and if it's required block it or limit. Firewalls work with software, but not with accounts. Access lists control permissions and read-write rights for users (accounts) with certain username and password (if required).


What is the list of rules that a firewall uses to make determinations on which traffic to block called?

The list of rules that a firewall uses to determine which traffic to block is called an "Access Control List" (ACL). An ACL defines the criteria for allowing or denying network traffic based on attributes such as IP addresses, port numbers, and protocols. Firewalls apply these rules to filter incoming and outgoing traffic, ensuring that only authorized communication is permitted while unauthorized access is blocked.


Which control panel feature is used in Windows Vista to verify the firewall setting?

In Windows Vista, the control panel feature used to verify the firewall settings is the "Windows Firewall" option found in the Control Panel. Users can access it by navigating to Control Panel > System and Security > Windows Firewall. This feature allows users to check the status of the firewall, customize settings, and manage allowed programs.


What does ACL stand for in computers?

Access Control List