
8-15
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 8 Managing VPN Remote Access
Using an Easy VPN Remote Device with Digital Certificates
• (Optional) Split tunneling on the PIX Firewall, which allows both encrypted and clear traffic
between the Easy VPN Remote device and the PIX
Firewall.
Note If split tunnelling is not enabled, all traffic between the Easy VPN Remote device and the
PIX Firewall will be encrypted.
• (Optional) Inactivity timeout for the Easy VPN Remote device. The default is 30 minutes.
On the Easy VPN Remote device, configure the client to obtain a digital certificate. After obtaining the
certificate, set the Easy VPN Remote software client connection entry to use the digital certificate.
When the Easy VPN Remote device initiates ISAKMP with the PIX Firewall, the digital certificate is
sent to the PIX
Firewall. The PIX Firewall uses the digital certificate to look up the configured client
policy attributes for the given Easy VPN Remote device and downloads the matching policy attributes
to the client during the IKE negotiation.
Figure 8-3 illustrates the example network.
Figure 8-3 Easy VPN Remote Software Client Access
VPN Client user
192.168.101.1
209.165.200.227
209.165.200.229
Router
PIX
Firewall
10.0.0.1
192.168.101.2
AAA Server
partnerauth
10.0.0.15
DNS/WINS Server
10.0.0.14
44310
San Jose Office
209.165.200.228
CA Server
Internet
Configuring the PIX Firewall
Follow these steps to configure the PIX Firewall to interoperate with the Easy VPN Remote device:
Step 1 Define AAA related parameters:
aaa-server TACACS+ protocol tacacs+
Commentaires sur ces manuels