
7-24
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using an Encrypted Tunnel to Obtain Certificates
Step 12 Authenticate the CA by obtaining its public key and its certificate:
ca authenticate abcd
This command is entered at the command line and does not get stored in the configuration.
Step 13 Request signed certificates from your CA for your PIX Firewall’s RSA key pair. Before entering this
command, contact your CA administrator because they will have to authenticate your PIX
Firewall
manually before granting its certificate:
ca enroll abcd cisco
“cisco” is a challenge password. This can be anything. This command is entered at the command line
and does not get stored in the configuration.
Step 14 Save keys and certificates, and the CA commands (except those indicated) in Flash memory:
ca save all
write memory
Note Use the ca save all command any time you add, change, or delete ca commands in the configuration.
This command is not stored in the configuration.
Establishing a Tunnel with a Certificate
This section describes how to clear the SAs on each PIX Firewall and to establish a tunnel using a
certificate. It includes the following topics:
• PIX Firewall 1 Configuration, page 7-24
• PIX Firewall 2 Configuration, page 7-25
PIX Firewall 1 Configuration
Follow these steps to configure PIX Firewall 1:
Step 1 Clear the IPSec SAs:
clear ipsec sa
Step 2 Clear the ISAKMP SAs:
clear isakmp sa
Step 3 Create a partial access list:
access-list 90 permit ip 192.168.12.0 255.255.255.0 10.0.0.0 255.0.0.0
Step 4 Configure NAT 0:
nat (inside) 0 access-list 90
Step 5 Specify the authentication method of rsa-signatures for the IKE policy:
isakmp policy 8 auth rsa-sig
Comentarios a estos manuales