Final answer:
To restrict TFTP traffic effectively using ACLs, modify the deny statement to block all hosts except the specific client from accessing the TFTP server on UDP port 69 and apply the ACL to outbound traffic instead of inbound.
Step-by-step explanation:
The issue with the Access Control List (ACL) configuration is that it is allowing all TFTP traffic from the specific client, but it is not properly restricting other hosts from accessing the TFTP server. To fix this issue, we should first replace the placeholder '[IP address]' with the actual IP address of the server and client in the ACL configuration. Then, we utilize the following options:
-
Implementing these changes should ensure that only the server with the specified IP address can access the TFTP server over port 69, thereby restricting other hosts on the network from accessing the TFTP service. Ensure that the deny statement is updated correctly; for example:
Router(config)#access-list 100 deny udp any host [TFTP Server IP address] eq 69
And then the ACL can be applied to the outbound interface connected to the network with the TFTP server:
Router(config-if)#ip access-group 100 out