๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Working with Cisco access lists

โœ Scribed by Gilbert Held


Book ID
101284737
Publisher
John Wiley and Sons
Year
1999
Tongue
English
Weight
125 KB
Volume
9
Category
Article
ISSN
1055-7148

No coin nor oath required. For personal study only.

โœฆ Synopsis


The first line of defense of a network is accomplished through the creation of a router access list. This paper examines the creation and application of Cisco access lists and explains why they must be applied to an interface to go into effect.


๐Ÿ“œ SIMILAR VOLUMES


Cisco IOS Access Lists
โœ Jeff Sedayao ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› O'Reilly Media ๐ŸŒ English โš– 1 MB

This book focuses on a critical aspect of the Cisco IOS - access lists, which are central to securing routers and networks. Administrators cannot implement access control or traffic routing policies without them. The book covers intranets, firewalls, and the Internet. Unlike other Cisco router title

Working with social service agencies: Pr
โœ Lawrence G. Dotolo ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› John Wiley and Sons โš– 86 KB

## Abstract The Virginia Tidewater Consortium for Higher Education's effort to work with the clients of social service agencies has provided access to higher education for thousands of adults from underserved and underrepresented groups.