! Generated by Network Security Policy Compiler, version 2.453

! [ BEGIN router:r2 ]
! [ Model = IOS_FW ]
! [ Routing ]
! route network:mngt -> interface:backbone.t2
ip route 10.1.11.0 255.255.255.0 10.99.2.2
! [ ACL ]
! interface:r2.t2
ip access-list extended serial0_in
! permit src=network:mngt; dst=interface:r2.t2; srv=service:telnet;
 permit tcp 10.1.11.0 0.0.0.255 host 10.99.2.1 eq 23
! deny src=network:0/0; dst=network:0/0; srv=auto_srv:ip;
 deny ip any any

! interface:r2.c2
ip access-list extended eth0_in
! deny src=network:0/0; dst=network:0/0; srv=auto_srv:ip;
 deny ip any any

interface serial0
 ip access-group serial0_in in
interface eth0
 ip access-group eth0_in in

! [ END router:r2 ]

