Understanding the Basic Configuration of the Adaptive Security Appliance (ASA)

Date Added: Feb 2009
Format: PDF

In the not so distant past, being a network security expert was a matter of attending a 5-day class and understanding the difference between trusted users and non-trusted ones. The security tools (both hardware and software) available to security administrators were limited. Today, there are many facets of network security. The number of tools at the disposal of the security administrator has dramatically increased. It is very difficult to be an "Expert" in all aspects of network security. Most security administrators in large enterprise environments will focus on just one or a few aspects of security. Even smaller offices may resort to outsourcing some aspects of network security due to the overwhelming workload security brings to the network.