Where To Place Access Control Lists
Place Standard IP access list close to destination
Place Extended IP access lists close to the source of the traffic you want to manage
Previous slide
Next slide
Back to first slide
View graphic version