Cisco PIX 525 Especificaciones Pagina 293

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 466
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 292
8-13
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 8 Managing VPN Remote Access
Using an Easy VPN Remote Device with Digital Certificates
To allow the Easy VPN Remote software client to gain VPN access to the PIX Firewall using a
pre-shared key, create one connection entry for the Easy VPN Remote software client that identifies the
following:
Host name or IP address of the remote server you want to access, which in this case is a PIX Firewall
Name of the VPN group you belong to
Pre-shared key or password of the VPN group you belong to
Refer to the VPN Client User Guide for the detailed steps to configure the Easy VPN Remote software
client.
Using an Easy VPN Remote Device with Digital Certificates
This example shows use of the following supported features:
Extended Authentication (Xauth) for user authentication
IKE Mode Config for VPN IP address assignment
Digital certificates for IKE authentication
This section shows use of Xauth, IKE Mode Config, and digital certificates for IKE authentication
between a PIX
Firewall and an Easy VPN Remote software client.
Note The PIX Firewall configuration provided in the first section applies to any Easy VPN Remote device.
However, the last section describes the configuration required for software clients. For configuration
instructions when using a PIX
Firewall as an Easy VPN Remote device, refer to the “Using PIX Firewall
as an Easy VPN Remote Device” section on page 4-1.
This section includes the following topics:
Client Verification of the Easy VPN Server Certificate, page 8-13
Scenario Description, page 8-14
Configuring the PIX Firewall, page 8-15
Configuring the Easy VPN Remote Software Client, page 8-19
Note Both the PIX Firewall and the Easy VPN Remote device must obtain digital certificates from the same
CA server so that both are certified by the same root CA server. The PIX
Firewall only supports use of
one root CA server per VPN peer.
Client Verification of the Easy VPN Server Certificate
PIX Firewall Version 6.3 introduces a method for verifying the distinguished name (DN) of the Easy
VPN Server during ISAKMP negotiation. If the DN of the certificate received by the Easy VPN Remote
device does not match, the negotiation fails. We recommend using this feature to prevent a
“man-in-the-middle” attack. To identify the DN of the PIX
Firewall on a PIX Firewall used as an Easy
VPN hardware client, refer to
“Verifying the DN of an Easy VPN Server” section on page 4-11.
Vista de pagina 292
1 2 ... 288 289 290 291 292 293 294 295 296 297 298 ... 465 466

Comentarios a estos manuales

Sin comentarios