Summary

This chapter introduced you to the PIX and ASA security appliance family. I’ve attempted to give you a brief introduction to the PIXs and ASAs so that you have an understanding of their capabilities—strengths and weaknesses—and therefore can properly choose the correct solution, and the correct PIX or ASA, when designing a VPN implementation.

Next up is Chapter 21, “PIX and ASA Site-to-Site Connections,” where I show you how to create L2L sessions on these devices.

Get The Complete Cisco VPN Configuration Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.