December 2005
Intermediate to advanced
1032 pages
29h 12m
English
This chapter introduced you to the PIX and ASA security appliance family. I’ve attempted to give you a brief introduction to the PIXs and ASAs so that you have an understanding of their capabilities—strengths and weaknesses—and therefore can properly choose the correct solution, and the correct PIX or ASA, when designing a VPN implementation.
Next up is Chapter 21, “PIX and ASA Site-to-Site Connections,” where I show you how to create L2L sessions on these devices.
Read now
Unlock full access