PIX and ASA Feature and Product Overview
Summary
This chapter introduced you to the PIX and ASA security appliance family. I've attempted to give you a brief introduction to the PIXs and ASAs so that you have an understanding of their capabilitiesstrengths and weaknessesand therefore can properly choose the correct solution, and the correct PIX or ASA, when designing a VPN implementation.
Next up is Chapter 21, "PIX and ASA Site-to-Site Connections," where I show you how to create L2L sessions on these devices.