SlideShare a Scribd company logo
www.glcnetworks.com
Access Control
List (ACL) on
Linux
GLC Webinar,
21 Dec 2021
Achmad Mardiansyah
M. Taufik nurhuda
1
www.glcnetworks.com
Agenda
● Introduction
● Review prerequisite knowledge
● Permission in UNIX
● ACL
● Live practice
● Q & A
2
www.glcnetworks.com
introduction
3
www.glcnetworks.com
What is GLC?
● Garda Lintas Cakrawala (www.glcnetworks.com)
● Based in Bandung, Indonesia
● Areas: Training, IT Consulting
● Certified partner for: Mikrotik, Ubiquity, Linux foundation
● Product: GLC radius manager
● Regular event
4
www.glcnetworks.com
Trainer Introduction
● Name: Achmad Mardiansyah
● Base: bandung, Indonesia
● Linux user since 1999, mikrotik user since 2007, UBNT
2011
● Mikrotik Certified Trainer
(MTCNA/RE/WE/UME/INE/TCE/IPv6)
● Mikrotik/Linux Certified Consultant
● Website contributor: achmadjournal.com, mikrotik.tips,
asysadmin.tips
● More info:
http://au.linkedin.com/in/achmadmardiansyah
5
www.glcnetworks.com
Past experience
6
● 2021 (PNG, Malaysia): network support, radius/billing
integration
● 2020 (Congo DRC, Malaysia): IOT integration,
network automation
● 2019, Congo (DRC): build a wireless ISP from
ground-up
● 2018, Malaysia: network revamp, develop billing
solution and integration, setup dynamic routing
● 2017, Libya (north africa): remote wireless migration
for a new Wireless ISP
● 2016, United Kingdom: workshop for wireless ISP,
migrating a bridged to routed network
www.glcnetworks.com
About GLC webinar?
● First webinar: january 1, 2010 (title:
tahun baru bersama solaris - new year
with solaris OS)
● As a sharing event with various topics:
linux, networking, wireless, database,
programming, etc
● Regular schedule
● Irregular schedule: as needed
● Checking schedule:
http://www.glcnetworks.com/schedule
● You are invited to be a presenter
○ No need to be an expert
○ This is a forum for sharing: knowledge,
experiences, information
7
www.glcnetworks.com
Please introduce yourself
● Your name
● Your company/university?
● Your networking experience?
● Your mikrotik experience?
● Your expectation from this course?
8
www.glcnetworks.com
Prerequisite
● This presentation requires some prerequisite knowledge
● We assume you already know:
○ Linux in general
○ Linux command line
9
www.glcnetworks.com
Review prerequisite knowledge
10
www.glcnetworks.com
UNIX object (everything is a file)
11
www.glcnetworks.com
Welcome to UNIX
● UNIX is an Operating system
● UNIX/Linux has FHS, File Hierarchy Standard
● UNIX has system to manage files -> filesystem
○ Ext3, ext4
○ XFS
○ etc
● In UNIX, everything is a file
○ Folder
○ Harddisk (block device)
○ keyboard/mouse
○ etc
12
www.glcnetworks.com
File security, access control
13
www.glcnetworks.com
Security concepts
● User → accessing → objects
● User has:
○ User ID
○ GroupID
● Objects has:
○ Ownership
■ User (owner)
■ Group
○ Permission
■ Permission for owner
■ Permission for group
■ Permission for others
14
Source: www.guru99.com
www.glcnetworks.com
File ownership
15
www.glcnetworks.com
File ownership
● Every file must have owner and belong to a group
● Only superuser (root) can change ownership
● To change ownership use command “chown”
16
Source: www.digitalocean.com
www.glcnetworks.com
File permission
17
www.glcnetworks.com
File permission
● Explain how you can access the file/folder
○ File
■ Can you read the file
■ Can you modify the file
■ Can you execute the file
○ Folder
■ Can you list the folder content
■ Can you delete the folder content
■ Can you change directory
18
Source: pressidium.com
www.glcnetworks.com
Permission
19
www.glcnetworks.com
Configure access
● File permission is done by owner
● Use command: chmod
● Mode:
○ Symbolic
○ Octal
20
Source: www.thegeekdiary.com
www.glcnetworks.com
Symbolic mode
21
Source: CSCI330
www.glcnetworks.com
octal mode
22
Source: CSCI330
www.glcnetworks.com
Access Control List (ACL)
23
www.glcnetworks.com
Configure ACL
ACL is used to provide a fine-grained permission. Example:
● user1: read only
● user2: read, write
● user3: readonly
● user4: read, execute
Command used: getfacl, setfacl
Notes:
● Make sure ACL is supported on OS (check fstab)
● There are different setfacl implementation among OSes
● Get info: man setfacl
24
www.glcnetworks.com
LIVE practice
25
www.glcnetworks.com
preparation
● SSH client
● SSH parameters
○ SSH address
○ SSH port
○ SSH username
○ SSH password
26
www.glcnetworks.com
Q & A
27
www.glcnetworks.com
Interested? Just come to our training...
● Topics are arranged in systematic and logical way
● You will learn from experienced teacher
● Not only learn the materials, but also sharing experiences, best-practices, and
networking
28
www.glcnetworks.com
End of slides
● Thank you for your attention
● Please submit your feedback: http://bit.ly/glcfeedback
● Find our further event on our website : https://www.glcnetworks.com/en/
● Like our facebook page: https://www.facebook.com/glcnetworks
● Slide: https://www.slideshare.net/glcnetworks/
● Discord (bahasa indonesia): (https://discord.gg/6MZ3KUHHBX)
● Recording (youtube): https://www.youtube.com/c/GLCNetworks
● Stay tune with our schedule
● Any questions?
29

More Related Content

PPTX
NGINX Installation and Tuning
PDF
Network LACP/Bonding/Teaming with Mikrotik
PDF
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
PDF
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
PDF
Introduction to Vault
PDF
TC Flower Offload
PDF
Kubernetes Networking
PDF
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...
NGINX Installation and Tuning
Network LACP/Bonding/Teaming with Mikrotik
MUM Melbourne : Build Enterprise Wireless with CAPsMAN
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Introduction to Vault
TC Flower Offload
Kubernetes Networking
Room 1 - 4 - Phạm Tường Chiến & Trần Văn Thắng - Deliver managed Kubernetes C...

What's hot (20)

PPTX
HAProxy
PPTX
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
PPTX
Hashicorp Vault ppt
PPTX
Introduction to the Container Network Interface (CNI)
PDF
Using mikrotik with radius
PDF
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
PDF
[OpenInfra Days Korea 2018] Day 2 - CEPH 운영자를 위한 Object Storage Performance T...
PPTX
Docker Networking with New Ipvlan and Macvlan Drivers
PDF
An introduction to SSH
PDF
Storage tiering and erasure coding in Ceph (SCaLE13x)
PDF
Using Mikrotik Switch Features to Improve Your Network
PDF
State of the Dolphin - May 2022
ODP
Introduction to Nginx
PDF
Percona Live 2022 - MySQL Architectures
PDF
Building a redundant CloudStack management cluster - Vladimir Melnik
PDF
Docker-PPT.pdf for presentation and other
PDF
Mikrotik firewall raw table
PDF
MPLS on Router OS V7 - Part 2
PDF
Kali linux tutorial
HAProxy
Room 1 - 7 - Lê Quốc Đạt - Upgrading network of Openstack to SDN with Tungste...
Hashicorp Vault ppt
Introduction to the Container Network Interface (CNI)
Using mikrotik with radius
Room 3 - 1 - Nguyễn Xuân Trường Lâm - Zero touch on-premise storage infrastru...
[OpenInfra Days Korea 2018] Day 2 - CEPH 운영자를 위한 Object Storage Performance T...
Docker Networking with New Ipvlan and Macvlan Drivers
An introduction to SSH
Storage tiering and erasure coding in Ceph (SCaLE13x)
Using Mikrotik Switch Features to Improve Your Network
State of the Dolphin - May 2022
Introduction to Nginx
Percona Live 2022 - MySQL Architectures
Building a redundant CloudStack management cluster - Vladimir Melnik
Docker-PPT.pdf for presentation and other
Mikrotik firewall raw table
MPLS on Router OS V7 - Part 2
Kali linux tutorial
Ad

Similar to ACL on Linux - Part 1 (20)

PPTX
prateekporwal
PDF
Usage of Access Control Lists (ACL) in Linux
PPTX
Topic 3-1_More_Linux_Commands.pptx
PDF
SELinux Johannesburg Linux User Group (JoziJUg)
PDF
Up and Running with Freebsd
PPT
Linux administration classes in mumbai
PPT
linux-lecture1.ppt
PPTX
Linux security introduction
PPT
unixkkkkmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmkkk.ppt
PPSX
Linux: An Unbeaten Empire
PPT
linux-lecture1.ppt
PPTX
Linux 开源操作系统发展新趋势
PDF
Linux Practical Manual
PDF
Basics of Linux Commands, Git and Github
PDF
Unix Visual Quickstart Guide 3rd Ed Ray Deborah Sray Eric J
PDF
Linux security
PDF
Securing optimizing linux. the hacking solution
PDF
Up and Running SSH Service - Part 1
PPTX
Linux Shell Basics
PDF
Manage Your Router with Dynamic Public IP
prateekporwal
Usage of Access Control Lists (ACL) in Linux
Topic 3-1_More_Linux_Commands.pptx
SELinux Johannesburg Linux User Group (JoziJUg)
Up and Running with Freebsd
Linux administration classes in mumbai
linux-lecture1.ppt
Linux security introduction
unixkkkkmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmkkk.ppt
Linux: An Unbeaten Empire
linux-lecture1.ppt
Linux 开源操作系统发展新趋势
Linux Practical Manual
Basics of Linux Commands, Git and Github
Unix Visual Quickstart Guide 3rd Ed Ray Deborah Sray Eric J
Linux security
Securing optimizing linux. the hacking solution
Up and Running SSH Service - Part 1
Linux Shell Basics
Manage Your Router with Dynamic Public IP
Ad

More from GLC Networks (20)

PDF
Firewall mangle PBR: steering outbound path similar to inbound
PDF
Internal BGP tuning: Mesh peering to avoid loop
PDF
BGP tuning: Peer with loopback
PDF
BGP security tuning: pull-up route
PDF
BGP troubleshooting: route origin
PDF
Steering traffic in OSPF: Interface cost
PDF
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
PDF
Tuning OSPF: Prefix Aggregate
PDF
Tuning OSPF: area hierarchy, LSA, and area type
PDF
Stable OSPF: choosing network type.pdf
PDF
Controlling Access Between Devices in the same Layer 2 Segment
PDF
GIT as Mikrotik Configuration Management
PDF
RouterOS Migration From v6 to v7
PDF
Building a Web Server with NGINX
PDF
Best Current Practice (BCP) 38 Ingress Filtering for Security
PDF
EOIP Deep Dive
PDF
Policy Based Routing with Indirect BGP - Part 2
PDF
Policy Based Routing with Indirect BGP - Part 1
PDF
Internet Protocol Deep-Dive
PDF
Network Monitoring with The Dude and Whatsapp
Firewall mangle PBR: steering outbound path similar to inbound
Internal BGP tuning: Mesh peering to avoid loop
BGP tuning: Peer with loopback
BGP security tuning: pull-up route
BGP troubleshooting: route origin
Steering traffic in OSPF: Interface cost
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
Tuning OSPF: Prefix Aggregate
Tuning OSPF: area hierarchy, LSA, and area type
Stable OSPF: choosing network type.pdf
Controlling Access Between Devices in the same Layer 2 Segment
GIT as Mikrotik Configuration Management
RouterOS Migration From v6 to v7
Building a Web Server with NGINX
Best Current Practice (BCP) 38 Ingress Filtering for Security
EOIP Deep Dive
Policy Based Routing with Indirect BGP - Part 2
Policy Based Routing with Indirect BGP - Part 1
Internet Protocol Deep-Dive
Network Monitoring with The Dude and Whatsapp

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

ACL on Linux - Part 1