ACLs typically filter incoming or outgoing traffic on an interface. However, an ACL can also be used to secure remote administrative access to a device using the vty lines.
Use the following two steps to secure remote administrative access to the vty lines:-Create an ACL to identify which administrative hosts should be allowed remote access.
-Apply the ACL to incoming traffic on the vty lines.