I can't tell you how many times I, or any one of my co-workers has used this book. It's a great desk reference.
0Report
I recommend this book for those who need to get a quick reference on using the various types of access-lists as well as CBAC. It's a small book but it covers everything in enough detail to make it a "practical" reference guide. I don't have to hunt anywhere else and usually get adequate configuration examples to do what I need to get done. You can't beat this guide, especially for the money. Don't be fooled by size &...
0Report
Recently I had trouble with a ping flood at work and I had to create an access list on the router in order to stop the intruder. I was unable to find any information as to how to stop just the ICMP protocol for pings, which was until I found this book. While this book may be small in pages, only 260, it is indeed rich in information, with over 100 examples of access lists. Making it easier to understand what to do and what...
0Report
Don't be so sure. This book covers it in fine detail. I like the algorithm that you can use to minimize the number of access-lists given two IP ranges. Time-based, reflexive, dynamic, CBAC, some TCP-intercept/NAT examples are all presented well. It also has some IPSec and Queing chapters (though I recommend "Enhanced IP Services" by Lee for those two topics) I didn't give it 5 stars because it's not quite Doyle/Clark...
0Report
Cisco Access lists are vital to your routers performing accurately. This book gives a number of example of both good access lists & bad ones...Every time I'm configuring a router, I check and double check this book...rarely do I work without it close by my side. This is another that isn't just Cisco documentation rehashed again. The insight and technical tips make it a real bonus. Almost like having a CCIE sitting...
0Report