Cisco PIX 525 Dokumentacja Strona 294

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 466
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 293
8-14
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 8 Managing VPN Remote Access
Using an Easy VPN Remote Device with Digital Certificates
To identify the DN of the PIX Firewall on an Easy VPN software client, create a .pcf file and use the
CertSubjectName keyword. On the line following the CertSubjectName keyword, enter the following
parameter:
VerifyCertDn=x500 string
For example, consider the following entry:
CertSubjectName
VerifyCertDn=cn*myvpn, ou=myou, o=myorg, st=ca, c=US
This entry causes the receiving Easy VPN software client to accept certificates with a DN having the
following attributes:
Common name (CN) contains the string myvpn
Organizational unit (OU) equals myou
Organization (O) equals myorg
State (ST) equals CA
Country (C) equals US
You could be more restrictive by identifying a specific common name, or less restrictive by omitting the
CN attribute altogether.
You can use an asterisk (*) to match an attribute containing the string following the asterisk. Use an
exclamation mark (!) to match an attribute that does not contain the characters following the exclamation
mark.
Note The verification of the DN fails unless every attribute matches exactly.
For details about using a .pcf file for creating a connection profile for an Easy VPN software client, refer
to the VPN Client Administrator Guide.
Scenario Description
For example purposes, the PIX Firewall is shown to interoperate with the Entrust CA server. The specific
CA-related commands you enter depend on the CA you are using.
Note The PIX Firewall supports CA servers developed by VeriSign, Entrust, Baltimore Technologies, and
Microsoft. See “
Using Certification Authorities” in Chapter 6, “Configuring IPSec and Certification
Authorities, for general configuration procedures. See Chapter 7, “Site-to-Site VPN Configuration
Examples, for examples showing how to interoperate with different PIX Firewall-supported CA
servers.
On the PIX Firewall, configure the unit to interoperate with the CA server to obtain a digital certificate.
With the vpngroup command set, configure the PIX
Firewall for a specified group of Easy VPN Remote
devices, using the following parameters:
Pool of local addresses to be assigned to the VPN group
(Optional) IP address of a DNS server to download to the Easy VPN Remote device
(Optional) IP address of a WINS server to download to the Easy VPN Remote device
(Optional) Default domain name to download to the Easy VPN Remote device
Przeglądanie stron 293
1 2 ... 289 290 291 292 293 294 295 296 297 298 299 ... 465 466

Komentarze do niniejszej Instrukcji

Brak uwag