Cisco PIX 525 Specifikace Strana 262

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 466
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 261
7-20
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using an Encrypted Tunnel to Obtain Certificates
no rip inside passive
no rip inside default
no rip dmz passive
no rip dmz default
no rip perimeter passive
no rip perimeter default
route outside 0.0.0.0 0.0.0.0 209.165.200.228 1
timeout xlate 3:00:00 conn 1:00:00 half-closed 0:10:00 udp 0:02:00
timeout rpc 0:10:00 h323 0:05:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
sysopt connection permit-ipsec
crypto ipsec transform-set strong esp-3des esp-sha-hmac
crypto map newyork 10 ipsec-isakmp
crypto map newyork 10 match address 80
crypto map newyork 10 set peer 209.165.201.8
crypto map newyork 10 set transform-set strong
crypto map newyork interface outside
isakmp policy 8 authentication rsa-sig
isakmp policy 8 encryption des
isakmp policy 8 hash sha
isakmp policy 8 group 1
isakmp policy 8 lifetime 86400
ca identity abcd 209.165.202.131 209.165.202.131
ca configure abcd ra 1 100 crloptional
telnet timeout 5
terminal width 80
Using an Encrypted Tunnel to Obtain Certificates
This section shows an example of how to perform CA enrollment and certificate requests via a
site-to-site VPN tunnel between two PIX
Firewall units (PIX Firewall 1 and 2). In the example, both
PIX
Firewall units enroll and request certificates from a CA server protected by PIX Firewall 1.
PIX
Firewall 2 enrolls and requests its certificate using an encrypted tunnel.
To accomplish this, you first establish a tunnel between the PIX Firewalls using a pre-shared key. You
then use this tunnel to enroll and request the certificate for PIX
Firewall 2. After obtaining a certificate,
clear the IKE and IPSec SAs on both units and then configure them to use digital certificates.
Note The example CA server address is to be used for example purposes only.
This section includes the following topics:
Establishing a Tunnel Using a Pre-Shared Key, page 7-21
Establishing a Tunnel with a Certificate, page 7-24
This example uses the network diagram shown in Figure 7-4.
Zobrazit stránku 261
1 2 ... 257 258 259 260 261 262 263 264 265 266 267 ... 465 466

Komentáře k této Příručce

Žádné komentáře