Hi guys,
now i didn't lab this up yet, just watched the BLS video content on it, i don't 
really see how the problem with R6 is overcome? It says we setup a extended ACL 
on R5 for lock and key, but unless we shut down the interfaces on R6 (and thus 
breaking the adjacencies) i don't see how we can prevent it from going through 
R6 and not having this ACL applied. anyone any insight ? i could maybe set the 
ACL on R6 but there's already one for the critical precedence level and a 
implicit deny any.

Alef
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to