
6-12
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 6 Configuring IPSec and Certification Authorities
Using Certification Authorities
Step 9 Verify that the enrollment process was successful using the show ca certificate command:
show ca certificate
The following is sample output from the show ca certificate command including a PIX Firewall general
purpose certificate and the RA and CA public-key certificates:
Subject Name
Name: mypixfirewall.example.com
IP Address: 192.150.50.110
Status: Available
Certificate Serial Number: 36f97573
Key Usage: General Purpose
RA Signature Certificate
Status: Available
Certificate Serial Number: 36f972f4
Key Usage: Signature
CA Certificate
Status: Available
Certificate Serial Number: 36f972e5
Key Usage: Not Set
RA KeyEncipher Certificate
Status: Available
Certificate Serial Number: 36f972f3
Key Usage: Encryption
Step 10 Save the configuration:
ca save all
write memory
Verifying the Distinguished Name of a Certificate
PIX Firewall Version 6.3 lets you specify the distinguished name (DN) of the certificate used to establish
a VPN tunnel. We recommend enabling this feature to prevent a possible “man-in-the-middle” attack.
To verify the DN of the certificate received by your PIX Firewall, enter the following command:
ca verifycertdn x500 string
Note Every attribute must match exactly to verify the certificate received and to establish a VPN tunnel.
For example, a PIX Firewall might have the following certificate:
Certificate
Status: Available
Certificate Serial Number: 4ebdbd400000000000a2
Key Usage: General Purpose
Subject Name:
CN = myvpn01.myorg.com
OU = myou
O = myorg
ST = CA
C = US
UNSTRUCTURED NAME = myvpn01.myorg.com
Comentarios a estos manuales