ONE-STOP GUIDE TO CONFIGURING CISCO ACCESS LISTS. Configuring access lists for Cisco Routers and for network operations is one of the most difficult tasks for network administrators working in a Cisco networking environment. Cisco- Access Lists Field Guide, by Gil Held and Kent Hundley, CCNA, makes this task far less of a headache. This comprehensive reference thoroughly explores basic, dynamic, time-based, reflexive, and context-based access lists, and the use of keywords. Following a consistent, reader-friendly format, each chapter covers the problem, offers a network illustration and access list, and a full explanation. This invaluable guide also describes potential pitfalls, and tells you how to avoid them. You also get hundreds of practical examples of access lists that can be tailored to your own environment.
I can't tell you how many times I, or any one of my co-workers has used this book. It's a great desk reference.
Great Reference
Published by Thriftbooks.com User , 23 years ago
I recommend this book for those who need to get a quick reference on using the various types of access-lists as well as CBAC. It's a small book but it covers everything in enough detail to make it a "practical" reference guide. I don't have to hunt anywhere else and usually get adequate configuration examples to do what I need to get done. You can't beat this guide, especially for the money. Don't be fooled by size & cost - It's definitely a keeper!
Helping me control my network better.
Published by Thriftbooks.com User , 23 years ago
Recently I had trouble with a ping flood at work and I had to create an access list on the router in order to stop the intruder. I was unable to find any information as to how to stop just the ICMP protocol for pings, which was until I found this book. While this book may be small in pages, only 260, it is indeed rich in information, with over 100 examples of access lists. Making it easier to understand what to do and what things will look like when complete screen shots of the router code are also included. With a small section on the overview of the router you quickly begin coverage of both IP standard and extended access lists. You also create the dynamic, reflexive, and time based access lists. There is information on context and base access control and well as NAT and IPSec and in my case, coverage of the IMCP access lists. There could have coverage of IPX lists but this will not detract from the usefulness of the book in any way.
Think you know how access-lists work?
Published by Thriftbooks.com User , 23 years ago
Don't be so sure. This book covers it in fine detail. I like the algorithm that you can use to minimize the number of access-lists given two IP ranges. Time-based, reflexive, dynamic, CBAC, some TCP-intercept/NAT examples are all presented well. It also has some IPSec and Queing chapters (though I recommend "Enhanced IP Services" by Lee for those two topics) I didn't give it 5 stars because it's not quite Doyle/Clark level.
Good one!
Published by Thriftbooks.com User , 24 years ago
Cisco Access lists are vital to your routers performing accurately. This book gives a number of example of both good access lists & bad ones...Every time I'm configuring a router, I check and double check this book...rarely do I work without it close by my side. This is another that isn't just Cisco documentation rehashed again. The insight and technical tips make it a real bonus. Almost like having a CCIE sitting next to you!
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.