background image
xiii
Answers to Task 2 for Scenario 6-4
452
Answers to Task 3 for Scenario 6-4
453
Answers to Task 4 for Scenario 6-4
453
Chapter 7
Understanding Access List Security
454
How to Best Use This Chapter
455
"Do I Know This Already?" Quiz
456
Filtering IP Traffic
460
Standard IP Access Lists
462
Extended IP Access Lists
466
Named IP Access Lists
472
Controlling vty Access with IP Access Lists
475
IP Access List Summary
476
Filtering IPX Traffic and SAPs
476
IPX Packet Filters (Access Lists)
478
Standard IPX Access Lists
479
Extended IPX Access Lists
484
SAP Filters
487
Named IPX Access Lists
490
Scenario 7-1: IP Filtering Sample 1
503
Scenario 7-2: IP Filtering Sample 2
504
Scenario 7-3: IP Filtering Sample 3
504
Scenario 7-4: IPX Filtering
505
Answers to Scenario 7-1: IP Filtering Sample 1
508
Answers to Scenario 7-2: IP Filtering Sample 2
508
Answers to Scenario 7-3: IP Filtering Sample 3
509
Answers to Scenario 7-4: IPX Filtering
510
Answers to Task 1 for Scenario 7-4
510
Answers to Task 2 for Scenario 7-4
511
Answers to Task 3 for Scenario 7-4
512
fm.fm Page xiii Monday, March 20, 2000 4:55 PM