where to place IP access list
place standard access list close to destination
place extended access lists close to the source of the traffic you want to deny
Previous slide
Next slide
Back to first slide
View graphic version