I want to create an extended access-list because I may have been internally breached as I see SSH, UDP, TCP going back and forth in wireshark from unknown addresses. I have two questions.#1 - Can I block all protocols without explicitly naming all of...