Chapter 7. Through ASA Without NAT
This chapter covers the following topics:
• Types of access through the firewall
“When liberty destroys order, the hunger for order will destroy liberty.” —Will Durant
After getting acquainted with the tools that help you understand the behavior of firewall functionality and with the various connectivity models, it is time to turn the attention to the security features. This chapter studies the establishment of connections through firewalls that are based on the Adaptive Security Algorithm (ASA family), in situations that do not ...
Get Cisco Firewalls now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.