May 15, 2011
In this activity you will learn to configure and apply a Standard and Extended access list to control access to devices within the network lab as well as apply an access list as an access class to restrict telnet access to some devices.
Continue reading “Exploring Intermediate Access Control List (ACL)” »