Date of Issue: 12-01-2023

In this lab scenario you are asked to:

1. Configure a router to allow two executives to see and use certain sensitive data, but not allow such access to a third executive.

2. Configure access for an executive to telnet in from the Internet while attending a major conference; however, no one else should be able to telnet in and access such critical data.

3. The IPX network used by a new acquisition will be replaced next fiscal year with IP, but in the meantime prevent unnecessary IPX network traffic from using up (scarce) bandwidth.

Copyright © 2000 Genium Publishing Corporation