
8-16
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 8 Managing VPN Remote Access
Using an Easy VPN Remote Device with Digital Certificates
aaa-server partnerauth protocol tacacs+
aaa-server partnerauth (dmz) host 192.168.101.2 abcdef timeout 5
Step 2 Define a host name:
hostname SanJose
Step 3 Define the domain name:
domain-name example.com
Step 4 Generate the PIX Firewall RSA key pair:
ca generate rsa key 512
This command is entered at the command line and does not get stored in the configuration.
Step 5 Declare a CA:
ca identity abcd 209.165.200.228 209.165.200.228
This command is stored in the configuration.
Step 6 Configure the parameters of communication between the PIX Firewall and the CA:
ca configure abcd ra 1 20 crloptional
This command is stored in the configuration. 1 is the retry period, 20 is the retry count, and the
crloptional option disables CRL checking.
Step 7 Authenticate the CA by obtaining its public key and its certificate:
ca authenticate abcd
This command is entered at the command line and does not get stored in the configuration:
Step 8 Request signed certificates from your CA for your PIX Firewall’s RSA key pair:
ca enroll abcd cisco
Before entering this command, contact your CA administrator because they will have to authenticate
your PIX
Firewall manually before granting its certificate(s):
“cisco” is a challenge password. This can be anything. This command is entered at the command line
and does not get stored in the configuration.
Step 9 Verify that the enrollment process was successful using the show ca certificate command:
show ca certificate
Step 10 Save keys and certificates, and the CA commands (except those indicated) in Flash memory:
ca save all
write memory
Note Use the ca save all command any time you add, change, or delete ca commands in the
configuration. This command is not stored in the configuration.
Step 11 Set the system clock.
The clock must be accurate if you are using certificates. Enter the following command to update the
system clock.
clock set
Step 12 Configure the IKE policy:
Kommentare zu diesen Handbüchern