You can use access lists to control routing updates, dial-on-demand DDRand quality of service QoS features. The output on the R1 table shows how the network grants access to the host.
When routers check packets against the configured ACLs, they do so in a sequential order. They also allow administrators more flexibility when they are modifying the ACL entries.
Note these ACL equivalents. Applying an access list to an inbound interface controls the traffic that enters the interface and applying an access list to an outbound interface controls the traffic that exits the interface.
The guard is filtering people based on the condition of having their names on the authorized list. This configuration allows the IP packets with an IP header that has a source address in the network Control access to vty—Access lists on an inbound vty Telnet can control who can access the lines to a device.