McGraw Hill - Cisco Security Architectures(1999)

www.net130.com     日期:2006-2-3    浏览次数:

下载:Cisco Security Architectures
Gilbert Held
Kent Hundley

Copyright © 1999 by The McGraw-Hill Companies, Inc. All Rights Reserved. Printed in the United
States of America. Except as permitted under the United States Copyright Act of 1976, no part of
this publication may be reproduced or distributed in any form or by any means, or stored in a
database or retrieval system, without the prior written permission of the publisher.
1 2 3 4 5 6 7 8 9 0 AGM/AGM 9 0 4 3 2 1 0 9
ISBN: 0—07—134708—9

The sponsoring editor for this book was Steven Elliot, and the production supervisor was Clare
Stanley. It was set by D&G Limited, LLC.
Printed and bound by Quebecor/Martinsburg
Throughout this book, trademarked names are used. Rather than put a trademark symbol after
every occurrence of a trademarked name, we used the names in an editorial fashion only, and to
the benefit of the trademark owner, with no intention of infringement of the trademark. Where such
designations appear in this book, they have been printed with initial caps.
Information contained in this work has been obtained by The McGraw-Hill Companies, Inc.
("McGraw-Hill") from sources believed to be reliable. However, neither McGraw-Hill nor its authors
guarantees the accuracy or completeness of any information published herein and neither McGraw-
Hill nor its authors shall be responsible for any errors, omissions, or damages arising out of use of
this information. This work is published with the understanding that McGraw-Hill and its authors are
supplying information but are not attempting to render engineering or other professional services. If
such services are required, the assistance of an appropriate professional should be sought.


Cisco Security Architectures
Preface
Chapter 1: Introduction
Chapter 2: The TCP/IP Protocol Suite
Chapter 3: The Internet Protocol
Chapter 4: TCP and UDP
Chapter 5: NetWare
Chapter 6: Router Hardware and Software Overview
Chapter 7: Cisco Router Access Lists
Chapter 8: Advanced Cisco Router Security Features
Chapter 9: Non-IP Access Lists
Chapter 10: The Cisco PIX
Appendix A: Determining Wildcard Mask Ranges
Appendix B: Creating Access Lists
Appendix C: Standard Access Lists
Appendix D: Extended IP Access Lists
Appendix E: Glossary
Appendix F: Acronyms and Abbreviations

相关新闻