The following topics are covered in this chapter:
If you’re a sys admin, I’m guessing that shielding sensitive, critical data and your network’s resources from every evil exploit and intrusion is a top priority of yours. If so, it’s good to know you’re on the right page. You’ll be happy to know that Cisco has some solid security solutions to equip you with the tools you need to make your network as secure as you want it!
Access control lists, (ACLs), also referred to as access lists, are an integral part of Cisco’s security solution. In this chapter, I’ll demonstrate the keys to creating simple and advanced access lists, which are vital to an internetwork’s security. I’ll also show you how to effectively mitigate some common security-oriented network threats.
In addition to fortifying security, creating and using access lists wisely is a critical part of router configuration because they’re such versatile networking accessories. Contributing mightily to the efficiency and operation of your network, access lists give network managers a huge amount of control over traffic flow throughout the enterprise. With access lists, managers can gather basic statistics on packet flow and security policies can be implemented. Sensitive devices can also be protected from unauthorized access.
We’ll cover the important topic of access lists for TCP/IP as well as explore some ...