Sebastopol, CA--"Building and maintaining a network involves more than
making sure that packets can flow between devices on the network,"
explains Jeff Sedayao in the preface to his just-released book,
Cisco IOS Access
Lists (O'Reilly, US $39.95). Sedayao launches into the
challenges facing network administrators, including making sure that
only the right people can access resources on the network, that the
network will function even if parts fail or are configured incorrectly,
and that company directives are enforced, such as using cheaper network
paths whenever possible. "In short," Sedayao says, "while maintaining
connectivity is important, you also need to implement security,
robustness and business policies with your network."
Although Cisco routers are used extensively both on the Internet and in
corporate intranets, the Cisco Internet Operating System (IOS) has
grown to be very large and complex, and Cisco documentation fills
several volumes. In his new book, Sedayao focuses on access lists--one
particular aspect of the Cisco IOS--with regard to three critical
areas: intranets, firewalls, and the Internet. Unlike other Cisco
router titles, Cisco IOS
Access Lists focuses on practical
instructions for setting router access policies rather than the details
of interfaces and routing protocol settings.
"It's unfortunate that the general policy mechanism for Cisco routers
is known as an access list," Sedayao remarks. "The term 'access'
connotes that access lists apply only to the area of security, while in
fact access lists are used for a whole range of policies, not just for
security concerns. I envision this book as a guide and reference for
implementing network policies with access lists on Cisco routers."
Sedayao presents a way to think about access lists and network policy,
describes how access lists are built, and gives examples of how to
apply those access lists in different situations. Although Sedayao's
focus is on Internet Protocol (IP), network administrators will be able
to apply to many of the same techniques with other network protocols as
Cisco IOS Access
Lists was written for network administrators and
others who use Cisco routers to implement policies. It offers both
experienced network administrators and those who are new to using Cisco
routers a framework for thinking about network policies, and
demonstrates how to use access lists to implement those policies.
About the Author:
Jeff Sedayao manages Intel's Internet gateways by determining policies
on security, access, and usage. Prior to this position, he was a
software engineer at Intel. He has a M.S. degree in computer science
from the University of California, Berkeley, and a B.S. in engineering
O'Reilly & Associates is the
premier information source for leading-edge computer technologies. We
communicate the knowledge of experts through our books, conferences, and web
sites. Our books, known for their animals on the covers, occupy a treasured
place on the shelves of the developers building the next generation of
software. Our conferences and summits bring innovators together to shape the
revolutionary ideas that spark new industries. From the Internet to the
web, Linux, Open Source, and now peer-to-peer networking, we put
technologies on the map.
Cisco IOS Access
By Jeff Sedayao
ISBN 1-56592-385-5, 272 pages, $39.95 (US)