The lowest-priced brand-new, unused, unopened, undamaged item in its original packaging (where packaging is applicable).Packaging should be the same as what is found in a retail store, unless the item is handmade or was packaged by the manufacturer in non-retail packaging, such as an unprinted box or plastic bag.See details for additional description.
Get it by Wed, Oct 24 - Thu, Nov 1 from US, United States
• Brand New condition
• 30 day returns - Free returns
CISCO IOS ACCESS LISTS: HELP FOR NETWORK ADMINISTRATORS By Jeff Sedayao **BRAND NEW**.
Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes."Cisco IOS Access Lists" focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet."Cisco IOS Access Lists" covers three critical areas: Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's "Building Internet Firewalls." Packet filtering is an integral part of many firewall architectures, and"Cisco IOS Access Lists "describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet."Cisco IOS Access Lists" differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
This book focuses on a critical aspect of the Cisco IOS--access lists, which are central to securing routers and networks. Administrators cannot implement access control or traffic routing policies without them. The book covers intranets, firewalls, and the Internet. Unlike other Cisco router titles, it focuses on practical instructions for setting router access policies rather than the details of interfaces and routing protocol settings.
eBay Product ID (ePID)
Number Of Pages
O'Reilly Media, Incorporated
Scholarly & Professional
LC Classification Number
Table Of Content
Preface1. Network Policies and Cisco Access ListsPolicy setsThe policy toolkit2. Access List BasicsStandard access listsExtended access listsMore on matchingBuilding and maintaining access listsNamed access lists3. Implementing Security PoliciesRouter resource controlPacket filtering and firewallsAlternatives to access lists4. Implementing Routing PoliciesFundamentals of route filteringImplementing routing modularityImplementing route preferencesAlternatives to access lists5. Debugging Access ListsRouter resource access control listsPacket-filtering access control listsRoute-filtering access control lists6. Route MapsOther access list typesGeneric route map formatInterior routing protocols and policy routingBGPDebugging route maps and BGP7. Case StudiesA WAN case studyA firewall case studyAn Internet routing case studyA. Extended Access List Protocols and QualifiersB. Binary and Mask TablesC. Common Application PortsIndex