CARVIEW |
By?Jeff Sedayao
First Edition
June 2001
Pages: 272
ISBN 10: 1-56592-385-5 |
ISBN 13:9781565923850
(Average of 8 Customer Reviews)
This book focuses on a critical aspect of the Cisco IOS--access lists, which are central to securing routers and networks. Administrators cannot implement access control or traffic routing policies without them. The book covers intranets, firewalls, and the Internet. Unlike other Cisco router titles, it focuses on practical instructions for setting router access policies rather than the details of interfaces and routing protocol settings.
Full Description
- Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.
- Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers.
- The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.
Cover | Table of Contents | Colophon
Featured customer reviews
Review IOS Access Lists, May 02 2005





Very disappointed in the number of errors in this book. I am certainly no Cisco or Access List expert but I couldn't believe the errors. Especially the appendix that I was going to use as a quick reference. Table B2 has many errors lucky i noticed them before I started to use them. Maybe without all the errors it could have been a good book.
Cisco IOS Access Lists Review, November 16 2003





Desperately needs an updated, revised, and re-written second edition that has been proof-read at least once before being published. Great concept, poor execution...
Cisco IOS Access Lists Review, September 09 2002





While I found the content to be good for a beginner level, the number of errors in the examples made it very hard to follow (especially for a beginner like me)! Even the list of standard subnets in the Appendix was wrong.
There are quite a few good concepts in the book related to the control of routing updates, but not much detail on other things. I would hope that the 2nd Edition would fix the many typos and include more concepts that people would be interested in.
While I feel that the book taught me the things that I bought it for, I do feel disappointed at having to pay $105 Australian for it.
Cisco IOS Access Lists Review, August 07 2002





Sorry to say but I think this book is not OK!
I downloaded the chapter 5 because I needed to study access lists to get ready for a new project.
After reading though most of the chapter, I find that there are way too many errors in the examples, mainly the graphics (IP adresses that do not fit with the text, etc.).
It left me disappointed and I will look for other sources.
Cisco IOS Access Lists Review, February 27 2002





Not bad in content but very poor editing. Examples are often confusing due to editing errors, like misnamed access lists, and referrence to non-existant lists. Would be a good-to-average book if editing was up to par, but until the many errors in the examples are corrected, i can't recommend it.
Cisco IOS Access Lists Review, November 07 2001





After reading chapters one and two, I was more confused! The book is poorly written and very hard to understand. One example in partcular is on page 23, about limit access to payroll. What does that mean? Are you partially denying access or are you partially permitting access? How do you do that? Hey access this,I'm returning your very badly written book.
Noboru
third semester ccna student
Cisco IOS Access Lists Review, August 20 2001





Very poor book.
Too much errors in examples (IP addresses, interface's names)
- too much for beginners and too much for profies.
Cisco IOS Access Lists Review, July 28 2001





I was disappointed. While basic ACLs are covered nicely the book lacks depth. If the intent was ACLs then where are ACLs like access-list 700 or 1100 ? If the intent was ACLs for router security then where's all the security info? If you want exact details see: https://nsa1.www.conxion.com - the NSA's Router Security Guide (free). Not enough of ACL troubleshooting, for example:
https://www.cisco.com/warp/public/707/22.html.
I did like the stuff on ACLs and routing. Nothing on IPsec, or protocols. Here's hoping the second edition will pick up where this left off. Good newbie book.
Media reviews
"Cisco IOS Access Lists takes a methodical approach to access lists and their capabilities, and is ideal for
administrators of Cisco equipment who have configured
access lists before but feel as if they're not taking
advantage of their capabilities (which, author Jeff Sedayao
proves, extend well beyond security)
It's a great way to
teach people who have the ability and desire to experiment. Engineers, after all, typically like to learn by doing."
--David Wall, amazon.com
About O'Reilly | Contact | Jobs | Press Room | How to Advertise | Privacy Policy
© 2008, O'Reilly Media, Inc.
All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners.