| This chapter covers the configuration
tasks necessary to deal with managing traffic and controlling access
in an IP network. You learn details about the use and placement of
both standard and extended access lists, as well as alternative
methods, including null interfaces and helper addresses, to control
IP traffic.
|
|