Hi All,
This is something I just thought off, when you get an exercise that says
"excempt loopback "blah" to trigger any action on the virtual sensor "blah". I
do actually need to configure 2 action filters right? One from it being the
attacker and other one to be as the victim? Is this correct?
Cheers,
Mike
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com
Are you a CCNP or CCIE and looking for a job? Check out
www.PlatinumPlacement.com