Hi All, 

This is something I just thought off, when you get an exercise that says 
"excempt loopback "blah" to trigger any action on the virtual sensor "blah". I 
do actually need to configure 2 action filters right? One from it being the 
attacker and other one to be as the victim? Is this correct? 

Cheers, 

Mike 
                                          
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to