
7-9
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using PIX Firewall with a VeriSign CA
Step 5 Authenticate the CA by obtaining its public key and its certificate:
ca authenticate example.com
This command is not stored in the configuration.
Step 6 Request signed certificates from your CA for your PIX Firewall’s RSA key pair. Before entering this
command, contact your CA administrator because they will have to authenticate your PIX
Firewall
manually before granting its certificate.
ca enroll example.com abcdef
“abcdef” is a challenge password. This can be anything. This command is not stored in the configuration.
Step 7 Verify that the enrollment process was successful using the show ca certificate command:
show ca certificate
Step 8 Save keys and certificates, and the CA commands (except those indicated) in Flash memory:
ca save all
write memory
Note Use the ca save all command any time you add, change, or delete ca commands in the
configuration. This command is not stored in the configuration.
Step 9 Configure an IKE policy:
isakmp enable outside
isakmp policy 8 auth rsa-sig
Step 10 Create a partial access list:
access-list 90 permit ip 192.168.12.0 255.255.255.0 10.0.0.0 255.0.0.0
Step 11 Configure a transform set that defines how the traffic will be protected:
crypto ipsec transform-set strong esp-3des esp-sha-hmac
Step 12 Define a crypto map:
crypto map toSanJose 20 ipsec-isakmp
crypto map toSanJose 20 match address 90
crypto map toSanJose 20 set transform-set strong
crypto map toSanJose 20 set peer 209.165.200.229
Step 13 Apply the crypto map to the outside interface:
crypto map toSanJose interface outside
Step 14 Tell the PIX Firewall to implicitly permit IPSec traffic:
sysopt connection permit-ipsec
Example 7-3 lists the configuration for PIX Firewall 1. PIX Firewall default configuration values and
certain CA commands are not displayed in configuration listings.
Commentaires sur ces manuels