June 14, 2001
Cisco IOS Access Lists Key to Implementing Security, Robustness, and Business Policies on Networks Says O'Reilly Author
Sebastopol, CA--"Building and maintaining a network involves more than
making sure that packets can flow between devices on the network,"
explains Jeff Sedayao in the preface to his just-released book,
Cisco IOS Access
Lists (O'Reilly, US $39.95). Sedayao launches into the
challenges facing network administrators, including making sure that
only the right people can access resources on the network, that the
network will function even if parts fail or are configured incorrectly,
and that company directives are enforced, such as using cheaper network
paths whenever possible. "In short," Sedayao says, "while maintaining
connectivity is important, you also need to implement security,
robustness and business policies with your network."
Although Cisco routers are used extensively both on the Internet and in
corporate intranets, the Cisco Internet Operating System (IOS) has
grown to be very large and complex, and Cisco documentation fills
several volumes. In his new book, Sedayao focuses on access lists--one
particular aspect of the Cisco IOS--with regard to three critical
areas: intranets, firewalls, and the Internet. Unlike other Cisco
router titles, Cisco IOS
Access Lists focuses on practical
instructions for setting router access policies rather than the details
of interfaces and routing protocol settings.
"It's unfortunate that the general policy mechanism for Cisco routers
is known as an access list," Sedayao remarks. "The term 'access'
connotes that access lists apply only to the area of security, while in
fact access lists are used for a whole range of policies, not just for
security concerns. I envision this book as a guide and reference for
implementing network policies with access lists on Cisco routers."
Sedayao presents a way to think about access lists and network policy,
describes how access lists are built, and gives examples of how to
apply those access lists in different situations. Although Sedayao's
focus is on Internet Protocol (IP), network administrators will be able
to apply to many of the same techniques with other network protocols as
Cisco IOS Access
Lists was written for network administrators and
others who use Cisco routers to implement policies. It offers both
experienced network administrators and those who are new to using Cisco
routers a framework for thinking about network policies, and
demonstrates how to use access lists to implement those policies.
About the Author:
Jeff Sedayao manages Intel's Internet gateways by determining policies
on security, access, and usage. Prior to this position, he was a
software engineer at Intel. He has a M.S. degree in computer science
from the University of California, Berkeley, and a B.S. in engineering
Cisco IOS Access
By Jeff Sedayao
ISBN 1-56592-385-5, 272 pages, $39.95 (US)
O'Reilly Media spreads the knowledge of innovators through its books, online services, magazines, and conferences. Since 1978, O'Reilly Media has been a chronicler and catalyst of cutting-edge development, homing in on the technology trends that really matter and spurring their adoption by amplifying "faint signals" from the alpha geeks who are creating the future. An active participant in the technology community, the company has a long history of advocacy, meme-making, and evangelism.
Return to: O'Reilly Press Room
Recent Press Releases
Press Release Archive »
Media Relations - North America
Media Relations - Germany
Media Relations - Japan
Media Relations - United Kingdom
Media Relations - Conferences