Date of Issue:
07-01-2023
Rate this Study Guide
I. Introduction
II. Access Control Lists and Access Lists
A. Pattern Matching
B. Actions
1. Permit and Deny
2. Call Setup
3. Quality of Service
C. Installing an Access List
D. Managing Access List Configuration
1 Modifying and Deleting Access Lists: Just Say "No!"
2 Documenting Access Lists
E. Applying Access Lists
1 Interfaces
2 Virtual Terminals
3 Routing Processes
F. Access List Processing
1 How to Get in Trouble
III. Security
A. Defining Security Classes of Users
B. Specifying Access Control
C. Planning Access List Placement
IV. IP Access List Considerations
A. IP Access List Performance
B. Ingress Filtering
C. IP Extended Access Lists
1 IP Protocol Type
2. ICMP Specific
3. IGMP Specific
4. TCP and UDP Specific
D. Advanced Mechanisms
1 Reflexive IP Access Lists
2 Dynamic Access Lists
3 Time Ranges in Extended Access Lists
4 Maps
V. Working with Access Lists
VI. Tools for Troubleshooting Access Lists
A. Context-Sensitive Help is your Friend
B. Logging with Access Lists
VII. Conclusion
VIII. References
Copyright © 2000 Genium Publishing Corporation