Chapter 21. Using Access Control Lists Effectively

This chapter covers the following key topics:

  • Overview of Access Control Lists— This section gives a brief overview of how access control lists work.

  • Using Access Control Lists to Stop Unauthorized Access— This section discusses how access control lists can be used to stop unauthorized access to a network.

  • Using Access Control Lists to Recognize Denial of Service Attacks— This section discusses how access control lists can be used to identify and track network attacks.

  • Using Access Control Lists to Stop Denial of Service Attacks— This section discusses how access control lists can be used to stop attacks.

  • IP Fragment Handling by Access Control Lists— This section discusses how ACLs handle IP ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.