Appendix A. Cisco Access List Sample Configurations


This appendix comprises two access lists that demonstrate possible ways to securely configure a Cisco router as a standalone security device. These sections use best practices as described in Chapter 2, "Packet Filtering," and Chapter 6, "The Role of a Router," listed out so that a complete configuration can be seen in its entirety. The first access list is used to demonstrate a network that has no publicly shared resources, and the second access list illustrates an example of a network with publicly accessible mail, DNS, and web servers.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    Similar book on Amazon

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net