The reason for this setup is that usually only traffic crossing
the border routers is matched against an Access Control List
(ACL). The first computer was actively used for the tests
within the network and was running Nmap and Scapy. Nmap
was used to scan the open ports on the second machine. Scapy
was used to test the denial of service attack using RA packets.