You are on page 1of 2

Implement ACL list in the following network with only 1 end device permitted to connect to the

other subnet.

1. Implement Standard ACL


2. Implement Extended ACL

3. Extended Access control List

NETWORK-2 NETWORK-3
NETWORK-1

a. Configure a web server in network-2 and a ftp server in network -3


b. Mail servers should not be accessed form the Lap top device.
c. Permit network-1 to network-3 for ping request other than the server.
d. Use the Network-3 server for FTP only that is accessed by pc-1 from network-1 and pc-2
from network2
e. Protect the web server form replying for the ping messages.
f. Implement DHCP in netwotk-2, if required add more servers

You might also like