Rating:  Summary: A good Access List book Review: Cisco Access lists are vital to your routers performing accurately. This book gives a number of example of both good access lists & bad ones...Every time I'm configuring a router, I check and double check this book...rarely do I work without it close by my side. This is another that isn't just Cisco documentation rehashed again. The insight and technical tips make it a real bonus. Almost like having a CCIE sitting next to you!
Rating:  Summary: Good one! Review: Cisco Access lists are vital to your routers performing accurately. This book gives a number of example of both good access lists & bad ones...Every time I'm configuring a router, I check and double check this book...rarely do I work without it close by my side. This is another that isn't just Cisco documentation rehashed again. The insight and technical tips make it a real bonus. Almost like having a CCIE sitting next to you!
Rating:  Summary: Think you know how access-lists work? Review: Don't be so sure. This book covers it in fine detail. I like the algorithm that you can use to minimize the number of access-lists given two IP ranges. Time-based, reflexive, dynamic, CBAC, some TCP-intercept/NAT examples are all presented well. It also has some IPSec and Queing chapters (though I recommend "Enhanced IP Services" by Lee for those two topics) I didn't give it 5 stars because it's not quite Doyle/Clark level.
Rating:  Summary: Think you know how access-lists work? Review: Don't be so sure. This book covers it in fine detail. I like the algorithm that you can use to minimize the number of access-lists given two IP ranges. Time-based, reflexive, dynamic, CBAC, some TCP-intercept/NAT examples are all presented well. It also has some IPSec and Queing chapters (though I recommend "Enhanced IP Services" by Lee for those two topics) I didn't give it 5 stars because it's not quite Doyle/Clark level.
Rating:  Summary: Excellent Book on Access List Review: Gives real life scenarios which makes this book valuable. There are a couple of typo mistakes. But on the whole a great buy.
Rating:  Summary: Incredible reference Review: I can't tell you how many times I, or any one of my co-workers has used this book. It's a great desk reference.
Rating:  Summary: Incredible reference Review: I can't tell you how many times I, or any one of my co-workers has used this book. It's a great desk reference.
Rating:  Summary: Great Reference Review: I recommend this book for those who need to get a quick reference on using the various types of access-lists as well as CBAC. It's a small book but it covers everything in enough detail to make it a "practical" reference guide. I don't have to hunt anywhere else and usually get adequate configuration examples to do what I need to get done. You can't beat this guide, especially for the money. Don't be fooled by size & cost - It's definitely a keeper!
Rating:  Summary: Great Reference Review: I recommend this book for those who need to get a quick reference on using the various types of access-lists as well as CBAC. It's a small book but it covers everything in enough detail to make it a "practical" reference guide. I don't have to hunt anywhere else and usually get adequate configuration examples to do what I need to get done. You can't beat this guide, especially for the money. Don't be fooled by size & cost - It's definitely a keeper!
Rating:  Summary: True field guide. Review: I'm usually hesitant to purchase book with 'cisco' on the cover because you can get all the info from cisco website but this book is an exception and it delivers.The author has covered all the aspects of cisco access lists, standard, dynamic, extended and reflexive etc in good detail and IOS config examples. Chapter 8 and beyond are bonus which cover TCP intercept, IPsec and encryption. All in all a reliable handy reference for implementing and understanding of cisco access lists.
|