Chapter 7. Through ASA Without NAT
This chapter covers the following topics:
“When liberty destroys order, the hunger for order will destroy liberty.” —Will Durant
After getting acquainted with the tools that help you understand the behavior of firewall functionality and with the various connectivity models, it is time to turn the attention to the security features. This chapter studies the establishment of connections through firewalls that are based on the Adaptive Security Algorithm (ASA family), in situations that do not ...