Cisco PIX 525 Spezifikationen Seite 281

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 466
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 280
CHAPTER
8-1
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
8
Managing VPN Remote Access
This chapter describes how to configure the PIX Firewall as an Easy VPN Server and how to configure
Easy VPN Remote software clients. It also describes how to use the PIX
Firewall with Point-to-Point
Tunneling Protocol (PPTP) clients. This chapter includes the following sections:
Using the PIX Firewall as an Easy VPN Server, page 8-1
Configuring Extended Authentication (Xauth), page 8-5
Configuring Easy VPN Remote Devices with IKE Mode Config, page 8-7
Using an Easy VPN Remote Device with Pre-Shared Keys, page 8-8
Using an Easy VPN Remote Device with Digital Certificates, page 8-13
Using PPTP for Remote Access, page 8-19
Note To enable remote access to the firewall, you must use a dynamic crypto map when configuring IPSec. A
dynamic crypto map acts as a template where the missing parameters are dynamically assigned based on
the IKE negotiation. For more information about configuring dynamic crypto maps, see “
Using Dynamic
Crypto Maps” in Chapter 6, “Configuring IPSec and Certification Authorities.
Using the PIX Firewall as an Easy VPN Server
This section describes how to use the PIX Firewall as an Easy VPN Server and includes the following
topics:
Overview, page 8-2
Enabling Redundancy, page 8-4
Configuring Secure Unit Authentication, page 8-4
Configuring Individual User Authentication, page 8-4
Bypassing AAA Authentication, page 8-5
Seitenansicht 280
1 2 ... 276 277 278 279 280 281 282 283 284 285 286 ... 465 466

Kommentare zu diesen Handbüchern

Keine Kommentare