! Generated by Network Security Policy Compiler, version 2.453

! [ BEGIN router:r1 ]
! [ Model = IOS_FW ]
! [ Routing ]
! route network:mngt -> interface:backbone.t1
ip route 10.1.11.0 255.255.255.0 10.99.1.2
! [ ACL ]
! interface:r1.t1
ip access-list extended serial0_in
! permit src=network:mngt; dst=interface:r1.t1; srv=service:telnet;
 permit tcp 10.1.11.0 0.0.0.255 host 10.99.1.1 eq 23
! deny src=network:0/0; dst=network:0/0; srv=auto_srv:ip;
 deny ip any any

! interface:r1.c1
ip access-list extended eth0_in
! deny src=network:0/0; dst=network:0/0; srv=auto_srv:ip;
 deny ip any any

interface serial0
 ip access-group serial0_in in
interface eth0
 ip access-group eth0_in in

! [ END router:r1 ]

