
7-14
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 7 Site-to-Site VPN Configuration Examples
Using PIX Firewall with an In-House CA
Scenario Description
PIX Firewall supports the use of the following certification authorities (CAs):
• VeriSign support is provided through the VeriSign Private Certificate Services (PCS) and the OnSite
service, which lets you establish an in-house CA system for issuing digital certificates.
• Entrust, Entrust VPN Connector, version 4.1 (build 4.1.0.337) or higher. The Entrust CA server is
an in-house CA server solution.
• Baltimore Technologies, UniCERT Certificate Management System, version 3.1.2 or higher. The
Baltimore CA server is an in-house CA server solution.
• Microsoft Windows 2000, specifically the Windows 2000 Advanced Server, version 5.00.2195 or
higher. The Windows 2000 CA server is an in-house CA server solution.
These are all in-house CA servers, except for VeriSign, which provides both a public CA and a private
CA solution.
Note The example CA server address is to be used for example purposes only.
The in-house CA server in the following example is placed within the DMZ network of one PIX Firewall
network (PIX
Firewall 1). The VPN peer, PIX Firewall 2, should enroll and obtain its CA-signed
certificates from the CA server residing within the network of PIX
Firewall 1. PIX Firewall 2’s
enrollment and certificate request process is accomplished through the Internet.
The two VPN peers in the configuration examples are shown to be configured to enroll with and obtain
their CA-signed certificates from the Entrust CA server. PIX
Firewall 1 will obtain its certificate from
the CA’s local IP address of 10.1.0.2. PIX
Firewall 2 will obtain its certificate from the CA’s global IP
address of 209.165.202.131. After each peer obtains its CA-signed certificate, tunnels can be established
between the two VPN peers. The peers dynamically authenticate each other using the digital certificates.
Figure 7-3 VPN Tunnel Network
209.165.201.8
outside
192.168.12.1
inside
DMZ
10.1.0.1
Router Router
PIX Firewall 1
44317
209.165.200.229
outside
209.165.201.7 209.165.200.228
10.0.0.2192.168.12.2
San JoseNew York
10.0.0.1
inside
PIX Firewall 2
Internet
In-house
CA Server
10.1.0.2
(global address=209.165.202.131)
Commentaires sur ces manuels