Digital Certificates/PKI for IPSec VPNs

This document provides information about using digital certificates issued by a Cisco IOS CA server to authenticate VPN tunnels between Cisco routers. It provides design considerations, step-by-step configuration instructions, and basic management options for VPN crypto devices using digital certificates. This document is written for Cisco system engineers and assumes that you have a working knowledge of Cisco IOS routers, as well as a basic understanding of IPSec, ISAKMP/IKE, and digital certificates | Digital Certificates PKI for IPSec VPNs This document provides information about using digital certificates issued by a Cisco IOS CA server to authenticate VPN tunnels between Cisco routers. It provides design considerations step-by-step configuration instructions and basic management options for VPN crypto devices using digital certificates. This document is written for Cisco system engineers and assumes that you have a working knowledge of Cisco IOS routers as well as a basic understanding of IPSec ISAKMP IKE and digital certificates. Contents Design Guide Structure 1-2 Overview 1-3 Architectural Design Considerations 1-5 Configuring the Cisco IOS CA Server 1-6 Enrollment with a Cisco IOS Software CA Over SCEP 1-13 IPSec Headend Hub-and-Spoke Configuration Using dmaps DPD RRI 1-14 Branch End Hub-and-Spoke Configuration 1-14 Enrolling a VPN Headend Router with the Cisco IOS CA Using SCEP 1-16 Approving an Enrollment for the VPN Headend Router on the Cisco IOS CA 1-19 Enrolling a Branch Router with a Cisco IOS CA Using SCEP 1-20 Approving an Enrollment for a Branch Router with a Cisco IOS CA 1-24 Removing the Pre-Shared Key 1-25 Distributing the CRL over SCEP Revoking a Digital Certificate for a Branch VPN Router 1-28 Examples of Revoked Certificate Logs 1-30 VPN Branch Router 1-30 VPN Crypto Headend Router 1-31 Copying Certificate Enrollments to a Cisco IOS CA 1-32 1-26 Cisco Systems Corporate Headquarters Cisco Systems Inc. 170 West Tasman Drive San Jose CA 95134-1706 USA Copyright 2005 Cisco Systems Inc. All rights reserved. Design Guide Structure Automatically Re-enrolling Expired Certificates Before Expiration 1-37 Backing Up and Restoring the Cisco IOS CA Server 1-42 Backing Up Cisco IOS CA Server Files to a Different System 1-43 Recovering From Server Failure 1-43 Restoring Files To a Replacement Cisco IOS CA Server 1-45 Using TFTP HTTP Server for Off-System Storage of CA Files 1-50 Useful Commands 1-54 Commands for Managing the Cisco IOS .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.