A Cisco troubleshooting methodology. It includes coverage of: how to create, operate and use Cisco Access lists; how to secure a network when access occurs via a Cisco Router; and the TCP/IP Protocol and its use with Cisco routers. There are a number of security discussions too, and these include: public network and private network security threats and how to prevent them; how firewalls and proxy servers can be used as a first line of defence; how to configure Cisco Routers to accept only specific recognized incoming packets; using the Cisco PIX Firewall and the Centri firewall; and how to use the special security features built into Cisco routers.
Other books by this author See all titles
This book can be found in...
The prices displayed are for website purchases only, and may differ to the prices in Waterstones shops.