
7-8
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using PIX Firewall with a VeriSign CA
For the general procedures to configure the PIX Firewall for a CA, see “Using Certification Authorities”
in Chapter 6, “Configuring IPSec and Certification Authorities.”
This section provides an example configuration for the specific network illustrated in Figure 7-2.
Figure 7-2 VPN Tunnel Network
209.165.201.8
outside
192.168.12.2
192.168.12.1
inside
New York
Router Router
PIX Firewall 1
33353
209.165.200.229
outside
209.165.201.7 209.165.200.228
10.0.0.2
10.0.0.1
inside
San Jose
PIX Firewall 2
VeriSign CA Server
example.com
209.165.202.130
Internet
Configuring PIX Firewall 1 with a VeriSign CA
Perform the following steps to configure PIX Firewall 1 to use a public CA:
Step 1 Define a host name:
hostname NewYork
Step 2 Define the domain name:
domain-name example.com
Step 3 Generate the PIX Firewall RSA key pair:
ca generate rsa key 512
This command is not stored in the configuration.
Step 4 Define VeriSign-related enrollment commands:
ca identity example.com 209.165.202.130
ca configure example.com ca 2 20 crloptional
These commands are stored in the configuration. “2” is the retry period, “20” is the retry count, and the
crloptional option disables CRL checking.
Komentáře k této Příručce