What is considered a best practice when configuring ACLs on vty lines?
What is considered a best practice when configuring ACLs on vty lines? Use only extended access lists. Place identical restrictions on all vty lines. Apply the ip access-group command inbound.…