Hello ,
The following approach I will consider (1) Find the source (2) Find the destination. (3) From source to dsstination : Hit the interfaces of all the path. (4) Return PATH from destination to source : OUtbound Hit the interface of all the path. (5) Then determine where it will be easier if they did not specify any particular device need to be configured. I hope this helps you Prakash Date: Tue, 16 Jun 2009 18:52:24 -0700 From: [email protected] To: [email protected] Subject: [OSL | CCIE_RS] LAB 9- Vol 2- Task 6-2 Guys, This is one of these cases where I am always at lost. How do I figure it out in direction shpould I apply my policy? Is there any tricky so see this once for all since it looks like these questions are made in souch a way one is left guessing? Thanks Bauke Make your browsing faster, safer, and easier with the new Internet Explorer® 8. Optimized for Yahoo! Get it Now for Free! _________________________________________________________________ Hotmail® has ever-growing storage! Don’t worry about storage limits. http://windowslive.com/Tutorial/Hotmail/Storage?ocid=TXT_TAGLM_WL_HM_Tutorial_Storage_062009
