Configuring DN-Based Crypto Maps for VPN Device Access Control #18303 (Cisco Systems)
This document describes how to configure Distinguished Name (DN)-based crypto maps to provide access control so that a VPN device can establish VPN tunnels with a Cisco IOS® router. In this document's example, Rivest, Shamir, and Adelman (RSA) signature is the method for the IKE authentication. In addition to standard certificate validation, DN-based crypto maps try to match the peer's ISAKMP identity with certain fields in its certificates, such as the X.500 distinguished name or the fully qualified domain name (FQDN).
Configuring DN-Based Crypto Maps for VPN Device Access Control (pdf)
No comments:
Post a Comment