Refer to the exhibit.
You are required to implement traffic segmentation in the network. See the table for relevant device details:
L2SW4, L2SW5, and L2SW6 are connected to L3SW1 with 802.1Q trunks with VLAN 191 and VLAN 398 allowed on the trunk.
You have the following information from L3SW1:
L3SW1# show run interfaces
interface Vlan1
no ip address
shutdown
!
interface Vlan2
ip address 10.2.2.2 255.255.255.248
!
interface Vlan191
ip address 10.10.27.126 255.255.255.192
!
interface Vlan200
ip address 10.20.20.1 255.255.255.248
!
interface Vlan398
ip address 10.15.153.1 255.255.255.0
L3SW1# show ip route
*** Output Omitted *** 10.0.0.0/8 is variably subnetted, 5 subnets, 3 masks
C 10.2.2.1/29 is directly connected, Vlan2
C 10.10.27.64/26 is directly connected, Vlan191
C 10.15.153.0/24 is directly connected, Vlan398
C 10.20.20.0/29 is directly connected, Vlan200
S 10.200.200.0/24 [1/0] via 10.20.20.2
S* 0.0.0.0/0 [1/0] via 10.2.2.1
You are required to implement a configuration that will meet the following connectivity requirements:
• The Administrator’s Station must have full access to PanelView
• PanelView should have limited access, based on specific TCP ports, to PLC#1 and I/O#1
The Administrator’s Station should have no access to PLC#1 and I/O#1
PLC#1 and I/O#1 should be able to communicate with each other on any port
Which action will allow you to meet the connectivity requirements?
A . Put interface VLAN 191 and interface VLAN 398 into different Virtual Routing and Forwarding (VRF) instances on L3SW1
B . Deploy an inbound ACL on interface VLAN 191 to control the traffic from the Administrator’s Station and PanelView to PLC#1 and I/O#1
C . No change is required, the traffic is already limited appropriately by the VLAN segmentation
D . Implement an ACL on Firewall1 to control the traffic flow between VLAN 191 and VLAN 398
Answer: B