Implement ACL list in the following network with only 1 end device permitted to connect to the
other subnet.
1. Implement Standard ACL
2. Implement Extended ACL
3. Extended Access control List
NETWORK-2 NETWORK-3 NETWORK-1
a. Configure a web server in network-2 and a ftp server in network -3
b. Mail servers should not be accessed form the Lap top device. c. Permit network-1 to network-3 for ping request other than the server. d. Use the Network-3 server for FTP only that is accessed by pc-1 from network-1 and pc-2 from network2 e. Protect the web server form replying for the ping messages. f. Implement DHCP in netwotk-2, if required add more servers