Complete Section 5 of your Plan: Network Security.
- Provide a description of the use of Access Control Lists (ACLs) as a method of security on a network.
- Also, provide the steps to implement ACLs on a router, switch, and wireless router.
- Include examples of commands to implement the ACL lists.
- Describe how ACLs can be used to control traffic.
Submit a final copy of your Network Implementation Plan.