Chapter 7. Through ASA Without NAT

“When liberty destroys order, the hunger for order will destroy liberty.” —Will Durant

After getting acquainted with the tools that help you understand the behavior of firewall functionality and with the various connectivity models, it is time to turn the attention to the security features. This chapter studies the establishment of connections through firewalls that are based on the Adaptive Security Algorithm (ASA family), in situations that do not ...

Get Cisco Firewalls now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.