This book is about network policies and how to implement those policies using Cisco IOS
access lists. I present a way to think about access lists and network policy, describe how
access lists are built, and give examples of how to apply those access lists in different
situations. Along the way, there are a number of sidebars and notes about concepts and
information important to using access lists, and at the end of the book, there are appendixes
with useful reference material.