[JaxPM] [NON-PERL] FW: O'Reilly Releases "Cisco IOS Access Lists"

JONES, WILLIAM C wcjones at exchange.fccj.org
Mon Jun 18 11:12:21 CDT 2001


On the jacksonville-pm-list; Jax.PM'er "JONES, WILLIAM C" <wcjones at exchange.fccj.org> wrote -

 FYI - In case you are interested...

-----Original Message-----
From: Denise Olliffe
To: bill at fccj.org
Sent: 6/18/01 11:38 AM
Subject: O'Reilly Releases "Cisco IOS Access Lists"

For immediate release
Review copies available
Contact: Denise Olliffe
deniseo at oreilly.com or 707-829-0515 x339

CISCO IOS ACCESS LISTS KEY TO IMPLEMENTING SECURITY, ROBUSTNESS, 
AND BUSINESS POLICIES ON NETWORKS SAYS O'REILLY AUTHOR

"Building and maintaining a network involves more than making sure that
packets can flow between devices on the network," explains Jeff Sedayao
in the preface to his just-released book, "Cisco IOS Access Lists"
(O'Reilly, US $39.95). Sedayao launches into the challenges facing
network administrators, including making sure that only the right
people can access resources on the network, that the network will
function even if parts fail or are configured incorrectly, and that
company directives are enforced, such as using cheaper network paths
whenever possible. "In short," Sedayao says, "while maintaining
connectivity is important, you also need to implement security,
robustness and business policies with your network."

Although Cisco routers are used extensively both on the Internet and in
corporate intranets, the Cisco Internet Operating System (IOS) has
grown to be very large and complex, and Cisco documentation fills
several volumes. In his new book, Sedayao focuses on access lists--one
particular aspect of the Cisco IOS--with regard to three critical
areas: intranets, firewalls, and the Internet. Unlike other Cisco
router titles, "Cisco IOS Access Lists" focuses on practical
instructions for setting router access policies rather than the details
of interfaces and routing protocol settings.

"It's unfortunate that the general policy mechanism for Cisco routers
is known as an access list," Sedayao remarks. "The term 'access'
connotes that access lists apply only to the area of security, while in
fact access lists are used for a whole range of policies, not just for
security concerns. I envision this book as a guide and reference for
implementing network policies with access lists on Cisco routers."

Sedayao presents a way to think about access lists and network policy,
describes how access lists are built, and gives examples of how to
apply those access lists in different situations. Although Sedayao's
focus is on Internet Protocol (IP), network administrators will be able
to apply to many of the same techniques with other network protocols as
well.

"Cisco IOS Access Lists" was written for network administrators and
others who use Cisco routers to implement policies. It offers both
experienced network administrators and those who are new to using Cisco
routers a framework for thinking about network policies, and
demonstrates how to use access lists to implement those policies.

About the Author 
Jeff Sedayao manages Intel's Internet gateways by determining policies
on security, access, and usage. Prior to this position, he was a
software engineer at Intel. He has a M.S. degree in computer science
from the University of California, Berkeley, and a B.S. in engineering
from Princeton.

About O'Reilly 
O'Reilly & Associates is the premier information source for
leading-edge computer technologies. We communicate the knowledge of
experts through our books, conferences, and web sites. Our books, known
for their animals on the covers, occupy a treasured place on the
shelves of the developers building the next generation of software. Our
conferences and summits bring innovators together to shape the
revolutionary ideas that spark new industries. From the Internet to the
web, Linux, Open Source, and now peer-to-peer networking, we put
technologies on the map.  For more information: http://www.oreilly.com

Chapter 5, "Debugging Access Lists," is available free online at:
http://www.oreilly.com/catalog/cisrtlist/chapter/ch05.html 

For more information about the book, including Table of Contents, index,

author bio, and samples, see:
http://www.oreilly.com/catalog/cisrtlist/ 

For a cover graphic in jpeg format, go to:
ftp://ftp.ora.com/pub/graphics/book_covers/hi-res/1565923855.jpg 

Cisco IOS Access Lists
By Jeff Sedayao
June 2001
ISBN 1-56592-385-5, 272 pages, $39.95 (US)
order at oreilly.com
1-800-998-9938
http://www.oreilly.com

# # #

O'Reilly is a registered trademark of O'Reilly & Associates, Inc. All
other trademarks are property of their respective owners.

Jax.PM Moderator's Note:
This message was posted to the Jacksonville Perl Monger's Group listserv.
The group manager can be reached at -- owner-jacksonville-pm-list at pm.org
to whom send all praises, complaints, or comments...




More information about the Jacksonville-pm mailing list