|Other Retailer||Price Checked Time||Their Price in NZD||Our Price|
|Amazon UK||9 days ago||54.09||$47.80||You save $6.29|
|Amazon US||13 days ago||49.73||$47.80||You save $1.93|
Preface 1. Network Policies and Cisco Access Lists Policy sets The policy toolkit 2. Access List Basics Standard access lists Extended access lists More on matching Building and maintaining access lists Named access lists 3. Implementing Security Policies Router resource control Packet filtering and firewalls Alternatives to access lists 4. Implementing Routing Policies Fundamentals of route filtering Implementing routing modularity Implementing route preferences Alternatives to access lists 5. Debugging Access Lists Router resource access control lists Packet-filtering access control lists Route-filtering access control lists 6. Route Maps Other access list types Generic route map format Interior routing protocols and policy routing BGP Debugging route maps and BGP 7. Case Studies A WAN case study A firewall case study An Internet routing case study A. Extended Access List Protocols and Qualifiers B. Binary and Mask Tables C. Common Application Ports Index
Jeff Sedayao is a network engineer with Intel Online Services, the Web and application hosting division of Intel Corporation. From 1987 through 1999, he worked on architecting and maintaining Intel's Internet connectivity, starting with a simple 2400 bps email link through CSNET and ending up with multiple sites connecting to the Internet with multiple ISPs at multi-megabit speeds. He has always been fascinated with policy and policy implementation, ranging from using Cisco IOS access lists for routing and firewall policies to sendmail configurations and address space design. As part of Intel Online Services, his main interests are with network usage and performance issues, DNS and email implementation, and addressing and routing policy.