Full description not available
C**R
Great book
This is a great book and got here in fast. I purchased this years ago, the book has some errors but still give the basic's as to how to use access lists
P**E
Five Stars
Great.
J**S
Five Stars
Very helpful
H**E
Think you know how access-lists work?
Don't be so sure. This book covers it in fine detail. I like the algorithm that you can use to minimize the number of access-lists given two IP ranges. Time-based, reflexive, dynamic, CBAC, some TCP-intercept/NAT examples are all presented well. It also has some IPSec and Queing chapters (though I recommend "Enhanced IP Services" by Lee for those two topics) I didn't give it 5 stars because it's not quite Doyle/Clark level.
M**I
Helping me control my network better.
Recently I had trouble with a ping flood at work and I had to create an access list on the router in order to stop the intruder. I was unable to find any information as to how to stop just the ICMP protocol for pings, which was until I found this book.While this book may be small in pages, only 260, it is indeed rich in information, with over 100 examples of access lists. Making it easier to understand what to do and what things will look like when complete screen shots of the router code are also included.With a small section on the overview of the router you quickly begin coverage of both IP standard and extended access lists. You also create the dynamic, reflexive, and time based access lists.There is information on context and base access control and well as NAT and IPSec and in my case, coverage of the IMCP access lists. There could have coverage of IPX lists but this will not detract from the usefulness of the book in any way.
A**R
Incredible reference
I can't tell you how many times I, or any one of my co-workers has used this book. It's a great desk reference.
D**S
Four Stars
ok
J**J
True field guide.
I'm usually hesitant to purchase book with 'cisco' on the cover because you can get all the info from cisco website but this book is an exception and it delivers.The author has covered all the aspects of cisco access lists, standard, dynamic, extended and reflexive etc in good detail and IOS config examples.Chapter 8 and beyond are bonus which cover TCP intercept, IPsec and encryption.All in all a reliable handy reference for implementing and understanding of cisco access lists.
T**3
grate book
good book. I had the pdf and wanted the book to use as a reference while studying and also for work.good shipping time
Trustpilot
5 days ago
1 month ago