This is the network manager's easy to use guide for configuring access lists. It offers examples, describes potential pitfalls and how to avoid them, and explains access lists formats.
Sprache
Verlagsort
Verlagsgruppe
McGraw-Hill Education - Europe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Maße
Höhe: 229 mm
Breite: 154 mm
Dicke: 20 mm
Gewicht
ISBN-13
978-0-07-212335-7 (9780072123357)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Gilbert Held is an internationally recognized author and lecturer who specializes in the application of computer and communications technology. The author of over 40 books covering personal computers, data communications, and business trade topics, he is the only person to twice win the competitive Karp Interface Award. A winner, as well, of the American Publishers Institute and numerous other industry awards, Mr. Held was selected by Federal Computer Week as one of the top 100 persons in government, industry, and academia who has made a difference in the acquisition and use of computer systems. Among his other books are Voice Over Data Networks; Cisco Security Architecture; Cisco Router Performance Field Guide; and Voice/Data Internetworking, all from McGraw-Hill.
Kent Hundley, CCNA (Lexington, KY) is a Senior Network Engineer at INS, Inc. where he specializes in network integration and consulting. He is the co-author with Gil Held of Cisco Security Architectures.
1. Working with the Command Interpreter. 2. Basic Access Lists. 3. Dynamic Access Lists. 4. Time Based Access Lists. 5. Reflexive Access Lists. 6. Context Based Access Lists.