Which statement best describes configuring access control lists to control Telnet traffic destined to the router itself?