Press Room

Press Release: June 14, 2001

Cisco IOS Access Lists Key to Implementing Security, Robustness, and Business Policies on Networks Says O'Reilly Author

Sebastopol, CA--"Building and maintaining a network involves more than making sure that packets can flow between devices on the network," explains Jeff Sedayao in the preface to his just-released book, Cisco IOS Access Lists (O'Reilly, US $39.95). Sedayao launches into the challenges facing network administrators, including making sure that only the right people can access resources on the network, that the network will function even if parts fail or are configured incorrectly, and that company directives are enforced, such as using cheaper network paths whenever possible. "In short," Sedayao says, "while maintaining connectivity is important, you also need to implement security, robustness and business policies with your network."

Although Cisco routers are used extensively both on the Internet and in corporate intranets, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. In his new book, Sedayao focuses on access lists--one particular aspect of the Cisco IOS--with regard to three critical areas: intranets, firewalls, and the Internet. Unlike other Cisco router titles, Cisco IOS Access Lists focuses on practical instructions for setting router access policies rather than the details of interfaces and routing protocol settings.

"It's unfortunate that the general policy mechanism for Cisco routers is known as an access list," Sedayao remarks. "The term 'access' connotes that access lists apply only to the area of security, while in fact access lists are used for a whole range of policies, not just for security concerns. I envision this book as a guide and reference for implementing network policies with access lists on Cisco routers."

Sedayao presents a way to think about access lists and network policy, describes how access lists are built, and gives examples of how to apply those access lists in different situations. Although Sedayao's focus is on Internet Protocol (IP), network administrators will be able to apply to many of the same techniques with other network protocols as well.

Cisco IOS Access Lists was written for network administrators and others who use Cisco routers to implement policies. It offers both experienced network administrators and those who are new to using Cisco routers a framework for thinking about network policies, and demonstrates how to use access lists to implement those policies.

About the Author:

Jeff Sedayao manages Intel's Internet gateways by determining policies on security, access, and usage. Prior to this position, he was a software engineer at Intel. He has a M.S. degree in computer science from the University of California, Berkeley, and a B.S. in engineering from Princeton.

Online Resources:

Cisco IOS Access Lists
By Jeff Sedayao
June 2001
ISBN 1-56592-385-5, 272 pages, $39.95 (US)

About O'Reilly

For almost 40 years, O’Reilly Media has provided technology and business training, knowledge, and insight to help companies succeed. Our unique network of experts and innovators share their knowledge and expertise through the company’s Safari training and learning platform and at O’Reilly conferences. As a SaaS learning platform, Safari delivers highly topical and comprehensive technology and business learning solutions to millions of users across enterprise, consumer, and university channels. For more information visit

Return to: O'Reilly Press Room

Press Contacts

Media Relations – Corporate & North America

Fama PR

Media Relations – Japan

Fumi Yamakawa
+81 3-3356-5227

Media Relations – United Kingdom

Helen Codling
+44 (0) 1252 721284