Research In Motion
Now-a-days, internet is a part of the people life. The access of internet is increasing day-by-day so; the authors also have to focus on that what have to be access on their network. In this paper, they will analyze the implementation of access control list in ASA firewall and analyze that whether it is fully capable of restricting the attacks or not. For ensuring high security on their networks they have to ensure that the unwanted data should not enter their network and the restricted data/policy should be monitor easily, for this monitoring they have proposed ACL viewer through which they can easily monitor the rules and policies implemented by network administrator.