
7-22
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using an Encrypted Tunnel to Obtain Certificates
Step 5 Configure NAT 0:
nat (dmz) 0 access-list 90
Step 6 Configure a transform set that defines how the traffic will be protected:
crypto ipsec transform-set strong esp-3des esp-sha-hmac
Step 7 Define a crypto map:
crypto map toSanJose 20 ipsec-isakmp
crypto map toSanJose 20 match address 90
crypto map toSanJose 20 set transform-set strong
crypto map toSanJose 20 set peer 209.165.200.229
Step 8 Apply the crypto map to the outside interface:
crypto map toSanJose interface outside
Step 9 Tell the PIX Firewall to implicitly permit IPSec traffic:
sysopt connection permit-ipsec
Step 10 Generate the PIX Firewall RSA key pair:
ca generate rsa key 512
This command is entered at the command line and does not get stored in the configuration.
Step 11 Define CA-related enrollment commands:
ca identity abcd 10.1.0.2:/certsrv/mscep/mscep.dll
ca configure abcd ra 1 20 crloptional
These commands are stored in the configuration.
Note The ca identity command shown is specific to the Microsoft CA. The ca identity you use
depends on the CA you are using.
Step 12 Get the public key and the certificate of the CA server:
ca authenticate abcd
This command is entered at the command line and does not get stored in the configuration.
Step 13 Contact your CA administrator and send your certificate request:
ca enroll abcd cisco
The string “cisco” is a challenge password. This can be anything. This command is entered at the
command line and does not get stored in the configuration.
Step 14 Save keys and certificates, and the ca commands (except those indicated) in Flash memory:
ca save all
write memory
Note Use the ca save all command any time you add, change, or delete ca commands in the configuration.
This command is not stored in the configuration.
Comentarios a estos manuales