| In this chapter, you have learned about the configuration tasks necessary
to deal with managing traffic in an IP environment using access lists.
You've learned about the difference between standard and extended access
lists and you have seen example configurations of each type of access
list. In turn, you learned about the four configuring principles for
access lists. You also discovered how a network can be protected from
denial-of-service attacks based on the TCP connection establishment process. Lastly, learned how to use alternative to access lists including
Lock-and-Key security (dynamic access lists), IP session filtering (reflexive access lists) and Context-Based Access Control (CBAC).
|
|