A. Fault Management
B. Configuration Management
C. Performance and Security Management
III. Access Lists
A. Standard vs. Extended
B. Inbound vs. Outbound
IV. Access List Configuration Guidelines
A. Processing Order
B. Implied "Deny Any"
C. Location, Location, Location
D. More Processing Order
E. Only One Per Customer, Please
F. Aces Are Wild
G. Trust, But Verify
V. First among Equals -- IP Access Lists
A. Standard IP Access Lists
B. Extended IP Access Lists
C. Applying IP Access Lists
D. Verifying IP Access Lists
VI. IPX Access Lists
A. Standard IPX Access Lists
B. Extended IPX Access Lists
C. SAP Filters
D. Verifying IPX Access Lists