State-space reduction in the model of Access Control Lists in IP routers
International Journal of Internet Protocol Technology
Modeling access control lists with discrete-time quasi birth-death processes
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Hi-index | 0.00 |
The first line of defense of a network is accomplished through the creation of a router access list. This paper examines the creation and application of Cisco access lists and explains why they must be applied to an interface to go into effect. Copyright © 1999 John Wiley & Sons, Ltd.