Hello ,

 

The following approach I will consider

 

(1) Find the source 

(2) Find the destination.

(3)  From source to dsstination :  Hit the interfaces of all the path.

(4) Return PATH from destination to source : OUtbound Hit the interface of all 
the path.

(5) Then determine where it will be easier if they did not specify any 
particular device need to be configured.

 

 

I hope this helps you

 

 

Prakash 

 

 


 


Date: Tue, 16 Jun 2009 18:52:24 -0700
From: [email protected]
To: [email protected]
Subject: [OSL | CCIE_RS] LAB 9- Vol 2- Task 6-2







Guys,
 
This is one of these cases where I am always at lost.
How do I figure it out in direction shpould I apply my policy? Is there any 
tricky so see this once for all since it looks like these questions are made in 
souch a way one is left guessing?

 
Thanks
 
 
Bauke


Make your browsing faster, safer, and easier with the new Internet Explorer® 8. 
Optimized for Yahoo! Get it Now for Free! 
_________________________________________________________________
Hotmail® has ever-growing storage! Don’t worry about storage limits.
http://windowslive.com/Tutorial/Hotmail/Storage?ocid=TXT_TAGLM_WL_HM_Tutorial_Storage_062009

Reply via email to