< Free Open Study > |
Lab 29: Configuring Access Lists, Named Access Lists, and EIGRP Route Filters ”Part IPractical ScenarioThis chapter has stressed the importance of understanding access lists in binary. This exercise underscores this fact. In the field, you will want to make your access lists as small and efficient as possible. Lab ExerciseThe State Patrol and the County Sheriff use a national fingerprinting system at FBI headquarters. Because of the enormous growth in access and use of the system, the FBI wants to cut down on the number of networks that it can see and reach. The bureau has implemented a policy that they will route only to the even subnets for the State Patrol locations and only to the odd subnets for the County Sheriff locations. Because the State Patrol and the County Sheriff have overlapping subnets, extreme care must be taken when implementing this policy. Use the following parameters as your design guidelines:
Lab Objectives
Equipment Needed
Physical Layout and Prestaging
|
< Free Open Study > |