1 / 227
文档名称:

OReilly.Cisco.IOS.Access.Lists.pdf

格式:pdf   页数:227
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

OReilly.Cisco.IOS.Access.Lists.pdf

上传人:bolee65 2014/5/4 文件大小:0 KB

下载得到文件列表

OReilly.Cisco.IOS.Access.Lists.pdf

文档介绍

文档介绍:Cisco IOS Access Lists
Jeff Sedayao
Publisher: O'Reilly
First Edition June 2001
ISBN: 1-56592-385-5, 272 pages

This book focuses on a critical aspect of the Cisco IOS--access lists, which are central to securing routers works. Administrators cannot
implement access control or traffic routing policies without them. The book covers s, firewalls, and the . Unlike other Cisco router
titles, it focuses on practical instructions for setting router access policies rather than the details of interfaces and routing protocol settings.
Cisco IOS Access lists
TABLE OF CONTENTS
Preface....................................................................................................................................5
Organization........................................................................................................................6
Audience .............................................................................................................................7
Conventions used in this book ............................................................................................8
Acknowledgments...............................................................................................................9

Chapter 1. Network Policies and Cisco Access Lists .......................................................10
Policy sets ...................................................................................................................11
Characteristics of policy sets ...............................................................................13
Policy sets works.........................................................................................13
The policy toolkit........................................................................................................16
Controlling packets passing through a router ....................................................