PIX and ASA Product Information

In Part V, I'll discuss the use of Cisco PIX and ASA security appliances to initiate and terminate VPN sessions. PIXs and ASAs are very flexible and can be used for site-to-site (LAN-to-LAN or L2L) sessions, VPN gateways, and remote access clients. I'll cover topics on how to configure the PIX security appliances using the new 7.0 Finesse Operating System (FOS) and its predecessor, 6.x (the ASA only supports version 7.0).

In this chapter, however, I'll introduce you to the Cisco PIX and ASA security appliance solutions, focusing on VPN deployment scenarios and their VPN capabilities. I'll also discuss some of the advantages that Cisco PIXs and ASAs have over other Cisco products when being used for VPN solutions.

Part I: VPNs

Overview of VPNs

VPN Technologies

IPsec

PPTP and L2TP

SSL VPNs

Part II: Concentrators

Concentrator Product Information

Concentrator Remote Access Connections with IPsec

Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN

Concentrator Site-to-Site Connections

Concentrator Management

Verifying and Troubleshooting Concentrator Connections

Part III: Clients

Cisco VPN Software Client

Windows Software Client

3002 Hardware Client

Part IV: IOS Routers

Router Product Information

Router ISAKMP/IKE Phase 1 Connectivity

Router Site-to-Site Connections

Router Remote Access Connections

Troubleshooting Router Connections

Part V: PIX Firewalls

PIX and ASA Product Information

PIX and ASA Site-to-Site Connections

PIX and ASA Remote Access Connections

Troubleshooting PIX and ASA Connections

Part VI: Case Study

Case Study

Index



The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide
ISBN: 1587052040
EAN: 2147483647
Year: 2006
Pages: 178
Authors: Richard Deal

Similar book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net