
Contents
xi
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
CHAPTER
6 Configuring IPSec and Certification Authorities 6-1
How IPSec Works 6-1
Internet Key Exchange (IKE) 6-2
IKE Overview 6-2
Configuring IKE 6-4
Disabling IKE 6-6
Using IKE with Pre-Shared Keys 6-6
Using Certification Authorities 6-7
CA Overview 6-8
Public Key Cryptography 6-8
Certificates Provide Scalability 6-8
Supported CA Servers 6-9
Configuring the PIX Firewall to Use Certificates 6-9
Verifying the Distinguished Name of a Certificate 6-12
Configuring IPSec 6-13
IPSec Overview 6-14
Transform Sets 6-15
Crypto Maps 6-15
Applying Crypto Maps to Interfaces 6-17
Access Lists 6-17
IPSec SA Lifetimes 6-19
Basic IPSec Configuration 6-20
Diffie-Hellman Group 5 6-22
Using Dynamic Crypto Maps 6-23
Site-to-Site Redundancy 6-25
Using NAT Traversal 6-25
Manual Configuration of SAs 6-26
Viewing IPSec Configuration 6-29
Clearing SAs 6-29
CHAPTER
7 Site-to-Site VPN Configuration Examples 7-1
Using Pre-Shared Keys 7-1
Scenario Description 7-1
Configuring PIX Firewall 1 with VPN Tunneling 7-2
Configuring PIX Firewall 2 for VPN Tunneling 7-5
Commentaires sur ces manuels