Summary
In this chapter, you have learned about the configuration tasks necessary to deal with managing traffic in an IP environment using access lists. You've learned about the difference between standard and extended access lists and you have seen example configurations of each type of access list. In turn, you learned about the four configuring principles for access lists. You also discovered how a network can be protected from denial-of-service attacks based on the TCP connection establishment process. Lastly, learned how to use alternative to access lists including Lock-and-Key security (dynamic access lists), IP session filtering (reflexive access lists) and Context-Based Access Control (CBAC).