Working with Cisco access lists

  • Authors:
  • Gilbert A. Held

  • Affiliations:
  • 4-Degree Consulting, 4736 Oxford Road, Macon, GA

  • Venue:
  • International Journal of Network Management
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

The first line of defense of a network is accomplished through the creation of a router access list. This paper examines the creation and application of Cisco access lists and explains why they must be applied to an interface to go into effect. Copyright © 1999 John Wiley & Sons, Ltd.