I am working on a project in a secured environment with no access to the configuration of this secured network, 3 Access ports with terminals MAC address secured each on the two switches were allowed to connect terminals to this network, this network...