| In this chapter, you have learned
about the configuration tasks necessary to deal with managing
traffic in an IP environment using access lists. You have learned
about the difference between standard and extended access lists and
you have seen example configurations of each type of access list.
You also discovered how a network can be protected from
denial-of-service attacks based on the TCP connection establishment
process. Finally, you learned how to use lock-and-key security
(dynamic access lists), IP session filtering (reflexive access
lists) and CBAC.
|
|