Date of Issue:
03-01-2023
Rate this Study Guide
I. Introduction
II. The Router Console
A. IOS Exec Modes
B. Securing Console access
C. Securing Modem access
D. Securing Telnet access
E. Router Identification
F. Banner messages
III. Access lists
A. Types of access lists
1. Standard and Extended IP access lists
2. Numbered and named access lists
B. Access groups
C. Inbound and outbound interfaces
D. Traffic generated by the router and exterior traffic
IV. Where to filter
V. Access lists impact on performance
VI. Monitoring Access Lists
VII. Conclusion
VIII. References
Copyright © 2000 Genium Publishing Corporation