Rating:  Summary: Helping me control my network better. Review: Recently I had trouble with a ping flood at work and I had to create an access list on the router in order to stop the intruder. I was unable to find any information as to how to stop just the ICMP protocol for pings, which was until I found this book. While this book may be small in pages, only 260, it is indeed rich in information, with over 100 examples of access lists. Making it easier to understand what to do and what things will look like when complete screen shots of the router code are also included. With a small section on the overview of the router you quickly begin coverage of both IP standard and extended access lists. You also create the dynamic, reflexive, and time based access lists. There is information on context and base access control and well as NAT and IPSec and in my case, coverage of the IMCP access lists. There could have coverage of IPX lists but this will not detract from the usefulness of the book in any way.
Rating:  Summary: A good Access List book Review: This book is an excellent reference and addition to what you learn in (otj or in-class)training.
|