From: ccie2be (ccie2be@nyc.rr.com)
Date: Wed Dec 08 2004 - 10:01:50 GMT-3
Hi guys,
I'm trying to figure out the difference between using the log keyword at the
end of an acl entry versus
using the interface command, ip accounting access-violations.
They both seem like they do pretty much the same thing, so I'm not that clear
on when I should use one versus the other.
If any of you have some ideas about this, I'd like to hear from you because
I'd hate to lose points on something like this in the lab.
Also, which method do people think is better for a production network?
TIA, Tim
This archive was generated by hypermail 2.1.4 : Mon Jan 03 2005 - 10:31:25 GMT-3