Redes - Cisco Secure VPN Client Solutions Guide

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Language: English
Pages: 124

Audience......Page 7
Business Cases Presented in This Solutions Guide......Page 8
Related Documentation......Page 9
Conventions......Page 13
Cisco Connection Online......Page 14
Documentation CD-ROM......Page 15
What is a Virtual Private Network?......Page 17
Access VPNs......Page 18
Extranet VPN......Page 19
What is the Cisco Secure VPN Client?......Page 20
Interoperability with Cisco Routers......Page 21
Cisco Routers with IP Security Protocol......Page 22
Dynamic Client IP Addressing with IKE Mode Configuration......Page 23
Server-side Requirements (Hardware and Software)......Page 24
Pre-shared Keys versus Digital Certificates......Page 25
Cisco Secure VPN Client versus Other VPN Solutions......Page 27
Using Pre-shared Keys: A Business Case......Page 29
Business Case Description......Page 31
The Solution......Page 32
Related Documentation......Page 36
Configuring Entrust Digital Certifications......Page 39
Configuring the Cisco Secure VPN Client......Page 40
Task 1—Importing the Root CA Certificate......Page 41
Task 2—Creating Public and Private Key Pair......Page 43
Task 3—Requesting Client Certificate from Entrust CA Server......Page 45
Task 4—Submitting the Certification Request to the Entrust Server......Page 46
Task 5—Importing Your Signed Entrust Digital Certificate......Page 52
Task 6—Configuring Other Connections for Security Policy......Page 54
Task 7—Configuring A New Connection for Security Policy......Page 56
Task 8—Specifying Identity Using RSA Signature......Page 58
Task 9—Specifying Encryption and Authentication Methods for Authentication, Phase 1......Page 60
Task 10—Specifying Encryption and Authentication Methods for Key Exchange, Phase 2......Page 62
Task 11—Saving Your Configuration......Page 63
Task 2—Configuring ISAKMP Policy and Defining IPSec Transform Set......Page 64
Task 3—Defining Crypto Dynamic Map and IKE Crypto Map to the Client......Page 65
Task 4—Defining the CA, Enrolling Your Certificate, and Requesting Certificate Signature......Page 66
Task 5—Applying the Crypto Map to the Interface......Page 67
Task 1—Viewing and Verifying Using Certificate Manager......Page 68
Task 2—Issuing Show Commands on Cisco Router......Page 69
Related Documentation......Page 70
Configuring VeriSign Digital Certifications......Page 73
Configuring the Cisco Secure VPN Client......Page 74
Task 1—Importing the Root CA Certificate......Page 75
Task 2—Creating Public and Private Key Pair......Page 77
Task 3—Requesting Client Certificate from VeriSign CA Server......Page 79
Task 4—Submitting the Certification Request to the VeriSign CA Server......Page 80
Task 5—Importing Your Signed VeriSign Digital Certificate......Page 84
Task 6—Configuring Other Connections for Security Policy......Page 86
Task 7—Configuring A New Connection for Security Policy......Page 88
Task 8—Specifying Identity Using RSA Signature......Page 90
Task 9—Specifying Encryption and Authentication Methods for Authentication, Phase 1......Page 92
Task 10—Specifying Encryption and Authentication Methods for Key Exchange, Phase 2......Page 94
Task 11—Saving Your Configuration......Page 95
Task 2—Configuring ISAKMP Policy and Defining IPSec Transform Sets......Page 96
Task 3—Defining Crypto Dynamic Map and IKE Crypto Map to the Client......Page 97
Task 4—Defining the CA, Enrolling Your Certificate, and Requesting Certificate Signature......Page 98
Task 5—Applying Crypto Map to the Interface......Page 99
Task 1—Viewing and Verifying Using Certificate Manager......Page 100
Task 2—Issuing Show Commands on Cisco Router......Page 101
Related Documentation......Page 102
Business Case Description......Page 105
The Solution......Page 106
Task 1—Configuring the Domain Name, Host Name, and Name Server......Page 107
Verifying IKE Mode Configuration......Page 108
Related Documentation......Page 109
Glossary......Page 111
Index......Page 123