From: Tarun Pahuja (pahujat@gmail.com)
Date: Wed Oct 24 2007 - 15:49:20 ART
Navid,
You evaluate what you reflect, just like you permit what you
inspect. If you have any questions on Reflexive access-list please feel free
to ask.Always here to help!
Thanks,
Tarun
On 10/19/07, Guyler, Rik <rguyler@shp-dayton.org> wrote:
>
> Cisco Router Firewall Security by Richard Deal (Cisco Press 2004)
>
> Navid, this isn't a link but very helpful in any case. It's what
> clarified
> this concept for me when I first started messing with reflexive ACLs. It
> also covers a lot of other topics we may run into in the lab as well as
> some
> that we may not. Great book for real-world IOS security features.
>
>
>
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
> Navid Daghighi
> Sent: Friday, October 19, 2007 10:28 AM
> To: Cisco certification
> Subject: reflect miror evaluate
>
> Hello,
>
> I am looking for a doc explaining these commands in access list
> configuration mode.
> If you have a link to share, I would appreciate.
>
> Thanks,
> Navid
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
This archive was generated by hypermail 2.1.4 : Fri Nov 16 2007 - 13:11:18 ART