Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Like many books in the blue system-administration series, this one includes a lot of explanations of what each capability is for, and how each fits with other parts of the system. A lot of times, these sections include conceptual diagrams that show routes of communication and the desired access policies. Then come excerpts from real access lists (Sedayao focuses on IOS 10 and later) and, often, commentary on what the interesting lines of the lists are doing. It's a great way to teach people who have the ability and desire to experiment. Engineers, after all, typically like to learn by doing. --David Wall
Topics covered: The capabilities and limitations of access lists under the Cisco Internetwork Operating System (IOS) and other similar routing and access-control environments. Access policies (with emphasis on packet filtering), routing policies (via route filtering and route maps), and the details of Border Gateway Protocol (BGP) pertaining to access lists are all covered.
Jeff Sedayao is a network engineer with Intel Online Services, the web and application hosting division of Intel Corporation. From 1987 through 1999, he architected and maintained Intel's Internet connectivity, starting with a simple 2400-bps email link through CSNET and ending up with multiple sites connecting to the Internet with multiple ISPs at multi-megabit speeds. He has always been fascinated with policy and policy implementation, ranging from using Cisco IOS access lists for routing and firewall policies to sendmail configurations and address space design. As part of Intel Online Services, his main interests include network usage and performance issues, DNS and email implementation, and addressing and routing policy.
No matter how long you have been using routers & L3 switch devices, you need to either know access-lists inside out or have something close to hand to refer to. Read morePublished on October 13, 2008 by Mr. Kieran D. Omelia
This is a good book on Cisco IOS Access Lists, especially since there is only one other available in the market. Read morePublished on March 5, 2003 by Evergreen Tennis Junkie
Book has good content, but unfortunately has far too many errors for me to recommend. I can understand having errors but some are far too obvious to be excused. Read morePublished on February 28, 2003 by Myles D Tobkes