Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas: Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking. Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet. Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
No matter how long you have been using routers & L3 switch devices, you need to either know access-lists inside out or have something close to hand to refer to. If you only purchase a few books a year for technical reference this should be on your list.
Good book, would be great with better editing
Published by Thriftbooks.com User , 22 years ago
This is a good book on Cisco IOS Access Lists, especially since there is only one other available in the market. Content is very good, as the author is knowledgable and has extensive experience. There are some errors, with better editing this book would have been worth 5 stars. Still worth reading since you can spot the errors once you have enough knowledge and use of access lists.
Good book to learn ACLs
Published by Thriftbooks.com User , 22 years ago
This just the book one would like to read to go through the basics of Cisco ACLs. The author introduces the concepts with some very simple and easily understandable examples. On the other hand, book is either a little outdated or author has intetionally not included many interesting ACL features. Features like turbo acls, dynamic acls, log input, extended communities are either not discussed or discussed very little in the book. The focus of the book is mostly control plane, the data plane is somewhat neglected.Overall a decent book, at best a book for a beginner. For someone new to acls this book will help save a lot of time understanding acls, route-maps, prefix-lists, communities, as paths ....
Worth the value
Published by Thriftbooks.com User , 23 years ago
Just received the book yesterday(March 4, 2002)and I'm at page 34 in Chapter 2 ... I was surprised to understand better the basics of Cisco IOS Access Lists that i haven't gained on CCNA study guide books. I believe that after reading the entire book, I'll gain the information i need in knowing Cisco IOS Access Lists as the way it should be. I recommend this book for those networking students and professionals who wish to take Cisco Certifications.
Increasing my understanding of access lists.
Published by Thriftbooks.com User , 23 years ago
Nothing has become more important to computer networking than security, keeping out those things that are not need for the operations intended. O'Reilly Publishing has put together an excellent choice for administrators to help them ensuring that what needs to stay out stays out. Do not be fooled by the small size of the book or the fact that the book has only 250 pages, the manual is packed with information that is the key to creating and using access lists. Setting up security policies is just the beginning of the book and the very beginning to creating the access lists you'll need. From there you have a great breakdown of both standard and extended access lists. Policy writing for routing and security is the next topic discussed, the author makes sure that he has given more than enough information in each section. Troubleshooting Access lists is the next area followed up with IP Prefix lists, BGP Access lists, mapping for both interior and exterior lists. You'll also work with AS networks and there are appendices for both major port numbers and CIDR layouts. Also included is case studies to help you understand when, where and why to use access lists. Overall a very well done effort and a book that is making my job easier.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.