In this activity, you will complete the following tasks:
1. Assign IP addresses based on a subnetted scheme.
2. Using an ACL that has already been created, you will apply the ACL.
3. Then you will verify traffic controlled by that ACL in your network.