本站已运行

攻城狮论坛

作者: 宅男女神
查看: 17105|回复: 193

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[书籍] O'REILLY电子书Cisco IOS Access Lists英文原版高清版

  [复制链接]
查看: 17105|回复: 193
开通VIP 免金币+免回帖+批量下载+无广告
课程介绍:
TABLE OF CONTENTS
Preface....................................................................................................................................5
Organization........................................................................................................................6
Audience .............................................................................................................................7
Conventions used in this book ............................................................................................8
Acknowledgments...............................................................................................................9
Chapter 1. Network Policies and Cisco Access Lists .......................................................10
1.1 Policy sets ...................................................................................................................11
1.1.1 Characteristics of policy sets ...............................................................................13
1.1.2 Policy sets in networks.........................................................................................13
1.2 The policy toolkit ........................................................................................................16
1.2.2 Controlling packets passing through a router ......................................................18
1.2.3 Controlling routes accepted and distributed...............................................................19
1.2.4 Controlling routes accepted and distributed based on route characteristics...................20
1.2.5 Putting it all together............................................................................................21
Chapter 2. Access List Basics.............................................................................................22
2.1 Standard access lists....................................................................................................22
2.1.1 The implicit deny .................................................................................................23
2.1.2 Standard access lists and route filtering...............................................................24
2.1.3 Access list wildcard masks ..................................................................................25
2.1.4 Specifying hosts in a subnet versus specifying a subnet .....................................25
2.1.5 Access list wildcard masks versus network masks..............................................26
2.1.6 The implicit wildcard mask .................................................................................27
2.1.7 Sequential processing in access lists....................................................................28
2.1.8 Standard access lists and packet filtering ............................................................28
2.1.9 Generic format of standard access lists................................................................30
2.2 Extended access lists...................................................................................................31
2.2.1 Some general properties of access lists................................................................34
2.2.2 Matching IP protocols..........................................................................................34
2.2.3 More on matching protocol ports.........................................................................35
2.2.4 Text substitutes for commonly used ports and masks .........................................37
2.2.5 Generic format of extended access lists...............................................................38
2.3 More on matching .......................................................................................................40
2.3.1 Good numbering practices ...................................................................................44
2.4 Building and maintaining access lists.........................................................................46
2.4.1 Risks of deleting access lists as an update technique ..........................................48
2.4.2 Displaying access lists .........................................................................................49
2.4.3 Storing and saving configurations .......................................................................50
2.4.4 Using the implicit deny for ease of maintenance.................................................51
2.5 Named access lists ......................................................................................................51
Chapter 3. Implementing Security Policies ......................................................................52
3.1 Router resource control...............................................................................................52
3.1.1 Controlling login mode ........................................................................................53
3.1.2 Restricting SNMP access.....................................................................................56
3.1.3 The default access list for router resources..........................................................57

3.2 Packet filtering and firewalls ......................................................................................58
3.2.1 A simple example of securing a web server ........................................................58
3.2.2 Adding more access to the web server.................................................................59
3.2.3 Allowing FTP access to other hosts.....................................................................60
3.2.4 Allowing FTP access to the server ......................................................................61
3.2.5 Passive mode FTP................................................................................................62
3.2.6 Allowing DNS access ..........................................................................................63
3.2.7 Preventing abuse from the server.........................................................................64
3.2.8 Direction of packet flow and extended access lists .............................................66
3.2.9 Using the established keyword to optimize performance....................................68
3.2.10 Exploring the inbound access list ......................................................................68
3.2.11 Session filtering using reflexive access lists......................................................75
3.2.12 An expanded example of packet filtering ..........................................................79
3.3 Alternatives to access lists ..........................................................................................88
3.3.1 Routing to the null interface ................................................................................88
3.3.2 Stopping directed broadcasts ...............................................................................89
3.3.3 Removing router resources ..................................................................................89
Chapter 4. Implementing Routing Policies.......................................................................90
4.1 Fundamentals of route filtering...................................................................................90
4.1.1 Routing information flow ....................................................................................90
4.1.2 Elements in a routing update................................................................................91
4.1.3 Network robustness..............................................................................................93
4.1.4 Business drivers and route preferences................................................................96
4.2 Implementing routing modularity ...............................................................................98
4.2.1 Minimizing the impact of local routing errors.....................................................99
4.2.2 Managing routing updates to stub networks ......................................................101
4.2.3 Redistributing routing information between routing protocols .........................102
4.2.4 Minimizing routing updates to stub networks using default networks..............103
4.2.5 Filtering routes distributed between routing processes .....................................106
4.3 Implementing route preferences ...............................................................................106
4.3.1 Eliminating undesired routes .............................................................................107
4.3.2 Route preferences through offset-list.................................................................110
4.3.3 Route preferences through administrative distance ...........................................114
4.4 Alternatives to access lists ........................................................................................119
4.4.1 Static routing ......................................................................................................119
4.4.2 Denying all route updates in or out of an interface............................................122
Chapter 5. Debugging Access Lists .................................................................................123
5.1 Router resource access control lists ..........................................................................123
5.1.1 Checking for correctness....................................................................................124
5.1.2 When access lists don't work .............................................................................125
5.1.3 Debugging router resource access lists..............................................................126
5.2 Packet-filtering access control lists...........................................................................127
5.2.1 Checking for correctness....................................................................................128
5.2.2 Debugging extended access lists........................................................................133
5.3 Route-filtering access control lists............................................................................140
5.3.1 Checking for correctness....................................................................................140
5.3.2 Debugging route-filtering access lists................................................................151

Chapter 6. Route Maps.....................................................................................................155
6.1 Other access list types...............................................................................................156
6.1.1 Prefix lists ..........................................................................................................156
6.1.2 AS-path access lists............................................................................................159
6.1.3 BGP community attribute ..................................................................................164
6.2 Generic route map format .........................................................................................165
6.3 Interior routing protocols and policy routing............................................................168
6.4 BGP...........................................................................................................................171
6.4.1 Match clauses in BGP........................................................................................171
6.4.2 Route maps as command qualifiers ...................................................................173
6.4.3 Implementing path preferences..........................................................................174
6.4.4 Propagating route map changes .........................................................................185
6.5 Debugging route maps and BGP...............................................................................186
Chapter 7. Case Studies....................................................................................................189
7.1 A WAN case study....................................................................................................189
7.1.1 Security concerns ...............................................................................................191
7.1.2 Robustness concerns ..........................................................................................191
7.1.3 Business concerns ..............................................................................................191
7.1.4 Site 1 router configurations................................................................................191
7.1.5 Site 2 router configurations................................................................................194
7.1.6 Site 3 router configurations................................................................................196
7.2 A firewall case study.................................................................................................199
7.2.1 Screening router configuration ..........................................................................201
7.2.2 Choke router configuration ................................................................................204
7.3 An Internet routing case study ..................................................................................207
7.3.1 Robustness concerns ..........................................................................................209
7.3.2 Security concerns ...............................................................................................209
7.3.3 Policy concerns ..................................................................................................209
7.3.4 Router configurations.........................................................................................210
Appendix A. Extended Access List Protocols and Qualifiers .......................................219
Appendix B. Binary and Mask Tables ............................................................................222
Appendix C. Common Application Ports .......................................................................226
Colophon ............................................................................................................................227


课程目录及截图:(超清原画品质哦)

421705411bced10836.png


下载链接:


游客,如果您要查看本帖隐藏内容请回复


论坛快捷链接:
最新视频发布?--->点这里最全网络书籍下载?--->点这里下载链接失效?--->点这里求资源/视频?--->点这里
官方考试报名?--->点这里最新活动/公告?--->点这里关注微信/微博?---> 点这里有投诉/建议?---> 点这里


能帮助您和更多的人找到自己想要的资料并取得更大进步,是我们最大的愿望。


CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

751218 [Lv8 技术精悍] 发表于 2014-9-12 01:34:03 | 显示全部楼层
草根还得待在电脑前,闷呐
回复 支持 反对

使用道具 举报

jywjh [Lv8 技术精悍] 发表于 2014-9-12 10:04:13 | 显示全部楼层
写的真的很不错
回复 支持 反对

使用道具 举报

hongnanlin [Lv8 技术精悍] 发表于 2014-9-12 10:18:47 | 显示全部楼层
有竞争才有进步嘛
回复 支持 反对

使用道具 举报

haa8434146 [Lv8 技术精悍] 发表于 2014-9-15 09:30:27 | 显示全部楼层
我是来刷分的,嘿嘿
回复 支持 反对

使用道具 举报

CancerX [Lv8 技术精悍] 发表于 2014-9-15 10:51:28 | 显示全部楼层
真是 收益 匪浅
回复 支持 反对

使用道具 举报

shilling [Lv8 技术精悍] 发表于 2014-9-15 12:05:47 | 显示全部楼层
好好 学习了 确实不错
回复 支持 反对

使用道具 举报

天天日出 [Lv8 技术精悍] 发表于 2014-9-16 09:15:26 | 显示全部楼层
看帖回帖是美德!:lol
回复 支持 反对

使用道具 举报

qwerty111 [Lv8 技术精悍] 发表于 2014-9-16 09:34:31 | 显示全部楼层
我是来刷分的,嘿嘿
回复 支持 反对

使用道具 举报

baozun [Lv8 技术精悍] 发表于 2014-9-16 09:41:14 | 显示全部楼层
学习了,不错,讲的太有道理了
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2026-5-3 06:55 , Processed in 0.107050 second(s), 15 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn