
7-18
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using PIX Firewall with an In-House CA
Configuring PIX Firewall 2 for an In-House CA
Follow these steps to configure PIX Firewall 2:
Step 1 Define a host name:
hostname SanJose
Step 2 Define the domain name:
domain-name example.com
Step 3 Configure an IKE policy:
isakmp enable outside
isakmp policy 8 auth rsa-sig
Step 4 Define CA-related enrollment commands:
ca identity abcd 209.165.202.131 209.165.202.131
ca configure abcd ra 2 20 crloptional
These commands are stored in the configuration. 2 is the retry period, 20 is the retry count, and the
crloptional option disables CRL checking.
Note For a Microsoft CA server, specify the external (global) network address followed by a colon
and the pathname to the server executable, such as 209.165.202.131:/certserv/mscep/mscep.dll.
Step 5 Generate the PIX Firewall RSA key pair:
ca generate rsa key 512
This command is entered at the command line and does not get stored in the configuration.
Step 6 Get the public key and the certificate of the CA server:
ca authenticate abcd
This command is entered at the command line and does not get stored in the configuration.
Step 7 Contact your CA administrator and send your certificate request:
ca enroll abcd cisco
“cisco” is a challenge password. This can be anything. This command is entered at the command line
and does not get stored in the configuration.
Step 8 Configure supported IPSec transforms:
crypto ipsec transform-set strong esp-3des esp-sha-hmac
Step 9 Save keys and certificates, and the CA commands (except those indicated) in Flash memory:
ca save all
write memory
Note Use the ca save all command any time you add, change, or delete ca commands in the
configuration. This command is not stored in the configuration.
Komentáře k této Příručce