
6-7
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 6 Configuring IPSec and Certification Authorities
Using Certification Authorities
Step 2 Configure the PIX Firewall domain name:
domain-name name
For example:
domain-name example.com
Step 3 Specify the pre-shared key at the PIX Firewall:
isakmp key keystring address peer-address [netmask mask]
Replace keystring with the password string that the PIX Firewall and its peer will use for authentication
Replace peer-address with the remote peer’s IP address.
For example:
isakmp key 1234567890 address 192.168.1.100
The pre-shared key is 1234567890, and the peer’s address is 192.168.1.100.
Note Netmask lets you configure a single key to be shared among multiple peers. You would use the
netmask of 0.0.0.0. However, we strongly recommend using a unique key for each peer.
Step 4 Specify the pre-shared key at the remote IPSec peer.
If the remote peer is a PIX Firewall, use the same command as shown in Step 3.
Note The pre-shared key should be configured at both the PIX Firewall and its peer, otherwise the policy
cannot be used. Configure a pre-shared key associated with a given security gateway to be distinct from
a wildcard, pre-shared key (pre-shared key plus a netmask of 0.0.0.0) used to identify and authenticate
the remote VPN clients.
Using Certification Authorities
This section provides background information about certification authorities (CAs) and describes how
to configure the PIX
Firewall to work with a CA. It includes the following topics:
• CA Overview, page 6-8
• Public Key Cryptography, page 6-8
• Certificates Provide Scalability, page 6-8
• Supported CA Servers, page 6-9
• Configuring the PIX Firewall to Use Certificates, page 6-9
Komentáře k této Příručce