Cisco IOS Access Lists

Paperback Engels 2001 9781565923850
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes.Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet.Cisco IOS Access Lists covers three critical areas:Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, andCisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.

Specificaties

ISBN13:9781565923850
Taal:Engels
Bindwijze:paperback
Aantal pagina's:272

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Preface;
Organization;
Audience;
Conventions used in this book;
We’d like to hear from you;
Acknowledgments;
Chapter 1: Network Policies and Cisco Access Lists;
1.1 Policy sets;
1.2 The policy toolkit;
Chapter 2: Access List Basics;
2.1 Standard access lists;
2.2 Extended access lists;
2.3 More on matching;
2.4 Building and maintaining access lists;
2.5 Named access lists;
Chapter 3: Implementing Security Policies;
3.1 Router resource control;
3.2 Packet filtering and firewalls;
3.3 Alternatives to access lists;
Chapter 4: Implementing Routing Policies;
4.1 Fundamentals of route filtering;
4.2 Implementing routing modularity;
4.3 Implementing route preferences;
4.4 Alternatives to access lists;
Chapter 5: Debugging Access Lists;
5.1 Router resource access control lists;
5.2 Packet-filtering access control lists;
5.3 Route-filtering access control lists;
Chapter 6: Route Maps;
6.1 Other access list types;
6.2 Generic route map format;
6.3 Interior routing protocols and policy routing;
6.4 BGP;
6.5 Debugging route maps and BGP;
Chapter 7: Case Studies;
7.1 A WAN case study;
7.2 A firewall case study;
7.3 An Internet routing case study;
Extended Access List Protocols and Qualifiers;
Binary and Mask Tables;
Common Application Ports;
Colophon;

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Cisco IOS Access Lists