
8-13
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 8 Managing VPN Remote Access
Using an Easy VPN Remote Device with Digital Certificates
To allow the Easy VPN Remote software client to gain VPN access to the PIX Firewall using a
pre-shared key, create one connection entry for the Easy VPN Remote software client that identifies the
following:
• Host name or IP address of the remote server you want to access, which in this case is a PIX Firewall
• Name of the VPN group you belong to
• Pre-shared key or password of the VPN group you belong to
Refer to the VPN Client User Guide for the detailed steps to configure the Easy VPN Remote software
client.
Using an Easy VPN Remote Device with Digital Certificates
This example shows use of the following supported features:
• Extended Authentication (Xauth) for user authentication
• IKE Mode Config for VPN IP address assignment
• Digital certificates for IKE authentication
This section shows use of Xauth, IKE Mode Config, and digital certificates for IKE authentication
between a PIX
Firewall and an Easy VPN Remote software client.
Note The PIX Firewall configuration provided in the first section applies to any Easy VPN Remote device.
However, the last section describes the configuration required for software clients. For configuration
instructions when using a PIX
Firewall as an Easy VPN Remote device, refer to the “Using PIX Firewall
as an Easy VPN Remote Device” section on page 4-1.
This section includes the following topics:
• Client Verification of the Easy VPN Server Certificate, page 8-13
• Scenario Description, page 8-14
• Configuring the PIX Firewall, page 8-15
• Configuring the Easy VPN Remote Software Client, page 8-19
Note Both the PIX Firewall and the Easy VPN Remote device must obtain digital certificates from the same
CA server so that both are certified by the same root CA server. The PIX
Firewall only supports use of
one root CA server per VPN peer.
Client Verification of the Easy VPN Server Certificate
PIX Firewall Version 6.3 introduces a method for verifying the distinguished name (DN) of the Easy
VPN Server during ISAKMP negotiation. If the DN of the certificate received by the Easy VPN Remote
device does not match, the negotiation fails. We recommend using this feature to prevent a
“man-in-the-middle” attack. To identify the DN of the PIX
Firewall on a PIX Firewall used as an Easy
VPN hardware client, refer to
“Verifying the DN of an Easy VPN Server” section on page 4-11.
Comentarios a estos manuales