Rules Followed When Traffic Is Compared To An Access Control List
Is done in sequential order; line 1, line 2, line 3 e.t.c
Is compared with the access list until a match is made; then NO further comparisons are made
There is an implicit “deny” at the end of each access list; if a packet does not match in the access list, it will be discarded