For most of the time, the traffic that flows in and out of network is accompanied by security threats. To do away with these developing pressures, all network administrators necessitate techniques for denying redundant access to systems and only permit access to trusted and authorized users. There is an extensive range of security tools ranging from passwords to physicals devices that assist internet access control. This has been supportive in the past, but with network attackers devising innovative ways of bypassing the old techniques, there is a requirement for advanced internet control tools. These tools facilitate network administrators to characterize the users that can access a network or complete LAN resources. Access Control Lists (ACL) presents a list of conditions and protocols that are used in checking the network traffic traveling over the boundary of a router. Internet access control is fundamental for all network users to do away with unauthorized access to specific sites.