Skip to content

Cisco IOS Access Lists Help for Network Administrators

Best in textbook rentals since 2012!

ISBN-10: 1565923855

ISBN-13: 9781565923850

Edition: 2001

Authors: Jeff Sedayao

List price: $44.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. "Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. "Cisco IOS Access Lists covers three critical…    
Customers also bought

Book details

List price: $44.99
Copyright year: 2001
Publisher: O'Reilly Media, Incorporated
Publication date: 7/3/2001
Binding: Paperback
Pages: 274
Size: 7.00" wide x 9.19" long x 0.70" tall
Weight: 1.188
Language: English

Jeff Sedayao is a network engineer with Intel Online Services, the web and application hosting division of Intel Corporation. From 1987 through 1999, he architected and maintained Intel's Internet connectivity, starting with a simple 2400-bps email link through CSNET and ending up with multiple sites connecting to the Internet with multiple ISPs at multi-megabit speeds. He has always been fascinated with policy and policy implementation, ranging from using Cisco IOS access lists for routing and firewall policies to sendmail configurations and address space design. As part of Intel Online Services, his main interests include network usage and performance issues, DNS and email implementation,…    

Network Policies and Cisco Access Lists
Policy sets
The policy toolkit
Access List Basics
Standard access lists
Extended access lists
More on matching
Building and maintaining access lists
Named access lists
Implementing Security Policies
Router resource control
Packet filtering and firewalls
Alternatives to access lists
Implementing Routing Policies
Fundamentals of route filtering
Implementing routing modularity
Implementing route preferences
Alternatives to access lists
Debugging Access Lists
Router resource access control lists
Packet-filtering access control lists
Route-filtering access control lists
Route Maps
Other access list types
Generic route map format
Interior routing protocols and policy routing
Debugging route maps and BGP
Case Studies
A WAN case study
A firewall case study
An Internet routing case study
Extended Access List Protocols and Qualifiers
Binary and Mask Tables
Common Application Ports