Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco IOS Access Lists

Buy
Cisco IOS Access Lists, 9781565923850 (1565923855), O'Reilly, 2001
Cisco IOS Access Lists takes a methodical approach to access lists and their capabilities, and is ideal for administrators of Cisco equipment who have configured access lists before but feel as if they're not taking full advantage of their capabilities (which, author Jeff Sedayao proves, extend well beyond security). Much of what Sedayao has written is of a "policy engineering" nature, is not strictly focused on Cisco's Internetwork Operating System (IOS), and has relevance to administrators of all sorts of access control equipment. There's emphasis on traffic minimization as well as security, as a section on using access lists to keep routing updates off stub networks exemplifies.

Like many books in the blue system-administration series, this one includes a lot of explanations of what each capability is for, and how each fits with other parts of the system. A lot of times, these sections include conceptual diagrams that show routes of communication and the desired access policies. Then come excerpts from real access lists (Sedayao focuses on IOS 10 and later) and, often, commentary on what the interesting lines of the lists are doing. It's a great way to teach people who have the ability and desire to experiment. Engineers, after all, typically like to learn by doing. --David Wall

Topics covered: The capabilities and limitations of access lists under the Cisco Internetwork Operating System (IOS) and other similar routing and access-control environments. Access policies (with emphasis on packet filtering), routing policies (via route filtering and route maps), and the details of Border Gateway Protocol (BGP) pertaining to access lists are all covered.

Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas:

  • Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.
  • Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.
  • The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.
Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
(HTML tags aren't allowed.)

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Machine Learning with AWS: Explore the power of cloud services for your machine learning and artificial intelligence projects
Machine Learning with AWS: Explore the power of cloud services for your machine learning and artificial intelligence projects

Use artificial intelligence and machine learning on AWS to create engaging applications

Key Features

  • Explore popular AI and ML services with their underlying algorithms
  • Use the AWS environment to manage your AI workflow
  • Reinforce key concepts with hands-on...
Jacquard's Web: How a Hand-Loom Led to the Birth of the Information Age
Jacquard's Web: How a Hand-Loom Led to the Birth of the Information Age
Circuits from silk? Today's technophiles probably have no idea how much today's computer technology owes to the invention of one ingenuous textile manufacturer in nineteenth-century France. Here, master storyteller James Essinger shows through a series of remarkable and meticulously researched historical connections how the Jacquard loom...

Surgical Treatment of Hilar and Intrahepatic Cholangiocarcinoma (Updates in Surgery)
Surgical Treatment of Hilar and Intrahepatic Cholangiocarcinoma (Updates in Surgery)

This book contains an up-to-date review of diagnostic and staging tools of cholangiocarcinoma, a guide to optimal selection of therapeutic modalities and a review of long-term outcome of surgery and liver transplantation. It also provides surgical techniques and principles for curative and palliative surgery. This book will appeal to...

Using Microsoft Office 2007, Special Edition
Using Microsoft Office 2007, Special Edition
THE ONLY OFFICE BOOK YOU NEED

 

We crafted this book to grow with you, providing the reference material you need as you move toward Office proficiency and use of more advanced features. If you buy only one book on Office 2007, Special Edition Using Microsoft® Office...

Sams Teach Yourself Core Data for Mac and iOS in 24 Hours (Sams Teach Yourself -- Hours)
Sams Teach Yourself Core Data for Mac and iOS in 24 Hours (Sams Teach Yourself -- Hours)

In just 24 sessions of one hour or less, start using Core Data to build powerful data-driven apps for iOS devices and Mac OS X computers! Using this book’s straightforward, step-by-step approach, you’ll discover how Apple’s built-in data persistence framework can help you meet any data-related...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy