Book description
Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas:
Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.
Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.
The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.
Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
Table of contents
-
Cisco IOS Access Lists
- Preface
- 1. Network Policies and Cisco Access Lists
-
2. Access List Basics
-
Standard access lists
- The implicit deny
- Standard access lists and route filtering
- Access list wildcard masks
- Specifying hosts in a subnet versus specifying a subnet
- Access list wildcard masks versus network masks
- The implicit wildcard mask
- Sequential processing in access lists
- Standard access lists and packet filtering
- Generic format of standard access lists
- Extended access lists
- More on matching
- Building and maintaining access lists
- Named access lists
-
Standard access lists
-
3. Implementing Security Policies
- Router resource control
-
Packet filtering and firewalls
- A simple example of securing a web server
- Adding more access to the web server
- Allowing FTP access to other hosts
- Allowing FTP access to the server
- Passive mode FTP
- Allowing DNS access
- Preventing abuse from the server
- Direction of packet flow and extended access lists
- Using the established keyword to optimize performance
- Exploring the inbound access list
- Session filtering using reflexive access lists
- An expanded example of packet filtering
- Alternatives to access lists
- 4. Implementing Routing Policies
-
5. Debugging Access Lists
- Router resource access control lists
- Packet-filtering access control lists
-
Route-filtering access control lists
-
Checking for correctness
- Limiting routing output
- Verifying the correctness of access lists in outbound distribute-list statements
- Verifying that hosts receive correct routing information
- Traceroute
- Debugging routing policies with access list accounting
- Verifying routing protocol activity using debug
- Viewing routing topology
- Debugging route-filtering access lists
-
Checking for correctness
- 6. Route Maps
- 7. Case Studies
- A. Extended Access List Protocols and Qualifiers
- B. Binary and Mask Tables
- C. Common Application Ports
- Index
- Colophon
Product information
- Title: Cisco IOS Access Lists
- Author(s):
- Release date: June 2001
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781565923850
You might also like
book
MPLS Configuration on Cisco IOS Software
A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), …
book
Cisco OSPF Command and Configuration Handbook
The comprehensive, hands-on guide to all Cisco IOS Software OSPF commands Stands as the complete OSPF …
book
Cisco ISE for BYOD and Secure Unified Access
Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access …
video
Cisco CCNA Data Center DCICN 640-911
5 Hours of Video Instruction Overview Five hours of video instruction on configuration and troubleshooting tasks …