Hi @claudiodias5647 - sorry to say I don't have the this lab file anymore - on a previous laptop (that I no longer have) - all i can say is to perhaps lab up an example similar and give it a try. Hope the video helped. All the very best, Greg
Hi greg. I am trying to watch your Access control lists video part one. I followed exactly your implementation, however my pcs are still pinging, when they aren't supposed to after denying the hosts
My respect Mr @Greg South, excuse me for disturbing you, i would be greateful, if you can upload file for this Access Control List exercise? :) Best Wishes
This is such a great explanation. Thanks a lot, I appreciate this!
You're very welcome!
Everything is explained so well. Thanks a lot!
You are welcome!
Great explanation. Thank you!
Glad you enjoyed it @Hasan!
Please, can you share this lab? Great explanation indeed
Hi @claudiodias5647 - sorry to say I don't have the this lab file anymore - on a previous laptop (that I no longer have) - all i can say is to perhaps lab up an example similar and give it a try. Hope the video helped. All the very best, Greg
HI Greg: where can I download the PT file?
I'll take a look Gul for you! Leave this with me...
Hi greg. I am trying to watch your Access control lists video part one. I followed exactly your implementation, however my pcs are still pinging, when they aren't supposed to after denying the hosts
Hi Lethusha, did you use the Packet Tracer file I uploaded? this will help to ensure that the network is exactly the same as mine
Did you apply the access list under the interface in the correct direction as well ?
My respect Mr @Greg South, excuse me for disturbing you, i would be greateful, if you can upload file for this Access Control List exercise? :) Best Wishes
Hi Veronika, I'm not sure I have this Packet Tracer file still. I'll take another look and post if I can find it.