The same result can also be achieved either by using Reflexive ACLs or Context-Based Access Control. Refer to Configuring Commonly Used IP ACLs for some sample configurations. A. The ip helper-address command takes an argument of either the IP address …