
1-17
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 1 Getting Started
Creating a Virtual Private Network
Most browsers, by default, trust certificates from well-known CAs, such as VeriSign, and provide
options for adding CAs, and for generating and requesting a digital certificate. You can also preconfigure
browser software before it is distributed to users with your CA and the necessary certificates.
The procedure for configuring PIX Firewall to use IKE with digital certificates is described in “Using
Certification Authorities” in Chapter 6, “Configuring IPSec and Certification Authorities.”
Using a Site-to-Site VPN
Site-to-site VPNs are an alternative WAN infrastructure that replace and augment existing private
networks using leased lines, Frame Relay, or ATM to connect small office, home office (SOHO)
environments. For site-to-site VPNs, the PIX
Firewall can interoperate with any Cisco VPN-enabled
network device, such as a Cisco VPN router.
Site-to-site VPNs are established between the PIX Firewall and a remote IPSec security gateway. The
remote IPSec security gateway can be a PIX
Firewall, a Cisco VPN concentrator or VPN-enabled router,
or any IPSec-compliant third-party device. For configuration instructions, refer to
Chapter 6,
“Configuring IPSec and Certification Authorities,” and for example configurations, refer to Chapter 7,
“Site-to-Site VPN Configuration Examples.”
Kommentare zu diesen Handbüchern