The application of access control list falls within the security domain of managing router operations. Network administrators own the responsibility of protecting their organizations sensitive data and protecting network resources. The proper configuration of access list is a key part of router configuration, which contributes to the efficient operations of a network.
Develop a 3-page MS Word document that explains the concept of access control list, describe the types of access control lists (Standard, Extended, Named, and Inbound), and provides an example of the configuration commands used to create each.