tailieunhanh - Cisco Ios Access Lists

This book is about network policies and how to implement those policies using Cisco IOS access lists. I present a way to think about access lists and network policy, describe how access lists are built, and give examples of how to apply those access lists in different situations. Along the way, there are a number of sidebars and notes about concepts and information important to using access lists, and at the end of the book, there are appendixes with useful reference material. | Cisco IOS Access Lists Jeff Sedayao Publisher O Reilly First Edition June 2001 ISBN 1-56592-385-5 272 pages This book focuses on a critical aspect of the Cisco IOS--access lists which are central to securing routers and networks. Administrators cannot implement access control or traffic routing policies without them. The book covers intranets firewalls and the Internet. Unlike other Cisco router titles it focuses on practical instructions for setting router access policies rather than the details of interfaces and routing protocol settings. Cisco IOS Access lists TABLE OF CONTENTS Conventions used in this Chapter 1. Network Policies and Cisco Access Policy Characteristics of policy Policy sets in The policy Controlling packets passing through a Controlling routes accepted and Controlling routes accepted and distributed based on route Putting it all Chapter 2. Access List Standard access The implicit Standard access lists and route Access list wildcard Specifying hosts in a subnet versus specifying a Access list wildcard masks versus network The implicit wildcard Sequential processing in access Standard access lists and packet Generic format of standard access Extended access Some general properties of access Matching IP More on matching protocol Text substitutes for commonly used ports and Generic format of extended access More on Good numbering Building and maintaining access Risks of deleting access lists as an update Displaying .

TÀI LIỆU LIÊN QUAN
TỪ KHÓA LIÊN QUAN