Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Cisco IOS Access Lists

Cisco IOS Access Lists

List Price: $39.95
Your Price: $26.37
Product Info Reviews

Description:

Cisco IOS Access Lists takes a methodical approach to access lists and their capabilities, and is ideal for administrators of Cisco equipment who have configured access lists before but feel as if they're not taking full advantage of their capabilities (which, author Jeff Sedayao proves, extend well beyond security). Much of what Sedayao has written is of a "policy engineering" nature, is not strictly focused on Cisco's Internetwork Operating System (IOS), and has relevance to administrators of all sorts of access control equipment. There's emphasis on traffic minimization as well as security, as a section on using access lists to keep routing updates off stub networks exemplifies.

Like many books in the blue system-administration series, this one includes a lot of explanations of what each capability is for, and how each fits with other parts of the system. A lot of times, these sections include conceptual diagrams that show routes of communication and the desired access policies. Then come excerpts from real access lists (Sedayao focuses on IOS 10 and later) and, often, commentary on what the interesting lines of the lists are doing. It's a great way to teach people who have the ability and desire to experiment. Engineers, after all, typically like to learn by doing. --David Wall

Topics covered: The capabilities and limitations of access lists under the Cisco Internetwork Operating System (IOS) and other similar routing and access-control environments. Access policies (with emphasis on packet filtering), routing policies (via route filtering and route maps), and the details of Border Gateway Protocol (BGP) pertaining to access lists are all covered.

© 2004, ReviewFocus or its affiliates