This chapter briefly reviewed the differences between standard and extended access lists and completed the lab objectives associated with this chapter. Hopefully you now have a better understanding of how to configure and apply access lists. The next chapter reviews basic router operations used to manage Cisco IOS Software images and configuration files for backup and recovery.
Top |