Pre-shared keys and digital certificates are two primary authentication methods in IKE that can be used in the context of IPSec VPN deployments.

Digital certificates provide a means to digitally authenticate devices and individual users. An individual that wishes to send encrypted data obtains a digital certificate from a Certificate Authority (CA). The CA issues an encrypted digital certificate containing the applicant’s public key and a variety of other identification information. The CA makes its own public key readily available. The recipient of the encrypted message uses the CA’s public key to decode the digital certificate attached to the message, verifies it as issued by the CA, and then obtains the sender’s public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. Public key infrastructure (PKI) is the enabler for managing digital certificates for IPSec VPN deployment. The most widely used format for digital certificates is X.509, which is supported by Cisco IOS.

In this blog, there are already having a couple of posts regarding using Symantec Digital Certificate to set up IPSec or SSL VPN for Check Point Firewalls, Juniper SRX firewalls, and Cisco IOS Routers. Here are some of posts lists:

Using Symantec SSL PKI to Authenticate Cisco IOS IPSec VPN – HA Deployment has presented detail steps how you could use third party Certificate to authenticate your IPSEC IKE.

In this post I will summarize all configuration steps again and add a little more things into a new implementation. We will use a different CA in each peer gateway. The security gateways in all previous posts were using only one same CA – Symantec to authenticate IPSec IKE. We will use a different CA at each side this time.
Most steps are same as before, the only extra step we will need to add is to import your peer’s CA certificate into a different Trustpoint.

1. Create RSA key

R1(config)#crypto key generate rsa general-keys label R1.test.com modulus 2048 exportable

2. Create Trustpoint for Your Router

R1(config)#crypto pki trustpoint Verisign2015
R1(ca-trustpoint)#enrollment terminal
R1(ca-trustpoint)#subject-name CN=R1.test.com,OU=IT,O=TT,C=CA,ST=Ontario,L=Markham
R1(ca-trustpoint)#rsakeypair R1.test.com
R1(ca-trustpoint)#fqdn R1.test.com
R1(ca-trustpoint)#revocation-check none
R1(ca-trustpoint)#exit

3. Create CSR


R1(config)#crypto key generate rsa general-keys label R1.test.com modulus 2048 exportable
The name for the keys will be: R1.test.com

% The key modulus size is 2048 bits
% Generating 2048 bit RSA keys, keys will be exportable…
[OK] (elapsed time was 0 seconds)

4. Submit CSR to Verisign and Retreive Signed Certificates

5. Install Intermediate / Root Certificate(s)

R1(config)#crypto pki authenticate Verisign2015

Enter the base 64 encoded CA certificate.
End with a blank line or the word “quit” on a line by itself

—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

Trustpoint ‘Verisign2015’ is a subordinate CA and holds a non self signed cert
Certificate has the following attributes:
       Fingerprint MD5: F91FFEE6 A36B9988 41D467DD E5F8977A
      Fingerprint SHA1: 32F30882 622B87CF 8856C63D B873DF08 53B4DD27

% Do you accept this certificate? [yes/no]: yes
Trustpoint CA certificate accepted.
% Certificate successfully imported

6. Install Signed SSL Certificate on Cisco Router

R1(config)#crypto pki import Verisign2015 certificate

Enter the base 64 encoded certificate.
End with a blank line or the word “quit” on a line by itself

—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

% Router Certificate successfully imported

7. Import Your Peer Intermediate / Root Certificate in a New TrustPoint

crypto pki trustpoint Customer
 enrollment terminal
 revocation-check none
!

R1(config)#crypto pki authenticate Customer

Enter the base 64 encoded CA certificate.
End with a blank line or the word “quit” on a line by itself

—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

Trustpoint ‘Customer’ is a subordinate CA and holds a non self signed cert
Certificate has the following attributes:
       Fingerprint MD5: F91FFEE6 A36B9988 41D467DD E5F8977A
      Fingerprint SHA1: 32F30882 622B87CF 8856C63D B873DF08 53B4DD27

% Do you accept this certificate? [yes/no]: yes
Trustpoint CA certificate accepted.
% Certificate successfully imported

8. Verify TrustPoint

R1#show crypto pki trustpoints
Trustpoint Verisign2015:
    Subject Name:
    cn=Symantec Class 3 Secure Server CA – G4
    ou=Symantec Trust Network
    o=Symantec Corporation
    c=US
          Serial Number (hex): 513FB9743870B73440418D30930699FF
    Certificate configured.


Trustpoint Customer:
    Subject Name:
    o=Customer Root Certification Authority
    c=CA
    st=Saskatchewan
    cn=Customer CA 2025
          Serial Number (hex): 0082809023512072AD
    Certificate configured.

9. Verify Certificates and Tunnel

R1#show crypto pki certificates
CA Certificate
  Status: Available
  Certificate Serial Number (hex): 0082809023512072AD
  Certificate Usage: General Purpose
  Issuer:
    o=Customer Root Certification Authority
    c=CA
    st=Saskatchewan
    cn=Customer CA 2025
  Subject:
    o=Customer Root Certification Authority
    c=CA
    st=Saskatchewan
    cn=Customer CA 2025
  Validity Date:
    start date: 10:55:50 EDT Mar 30 2015
    end   date: 10:55:50 EDT Mar 27 2025
  Associated Trustpoints: Customer
  Storage: nvram:CustomerRootCerti#72ADCA.cer

Certificate
  Status: Available
  Certificate Serial Number (hex): 44FC828CB095BC3BA7D553F4F4BF9EBA
  Certificate Usage: General Purpose
  Issuer:
    cn=Symantec Class 3 Secure Server CA – G4
    ou=Symantec Trust Network
    o=Symantec Corporation
    c=US
  Subject:
    Name: R1.gi-de.com
    cn=R1.gi-de.com
    o=Giesecke & Devrient Systems Canada Inc
    l=Markham
    st=Ontario
    c=CA
  CRL Distribution Points:
    http://ss.symcb.com/ss.crl
  Validity Date:
    start date: 19:00:00 EST Dec 30 2015
    end   date: 18:59:59 EST Dec 30 2018
  Associated Trustpoints: Verisign2015
  Storage: nvram:SymantecClas#9EBA.cer

CA Certificate
  Status: Available
  Certificate Serial Number (hex): 513FB9743870B73440418D30930699FF
  Certificate Usage: Signature
  Issuer:
    cn=VeriSign Class 3 Public Primary Certification Authority – G5
    ou=(c) 2006 VeriSign
     Inc. – For authorized use only
    ou=VeriSign Trust Network
    o=VeriSign
     Inc.
    c=US
  Subject:
    cn=Symantec Class 3 Secure Server CA – G4
    ou=Symantec Trust Network
    o=Symantec Corporation
    c=US
  CRL Distribution Points:
    http://s1.symcb.com/pca3-g5.crl
  Validity Date:
    start date: 20:00:00 EDT Oct 30 2013
    end   date: 19:59:59 EDT Oct 30 2023
  Associated Trustpoints: Verisign2015
  Storage: nvram:VeriSignClas#99FFCA.cer



R1#show crypto isakmp sa detail
Codes: C – IKE configuration mode, D – Dead Peer Detection
       K – Keepalives, N – NAT-traversal
       T – cTCP encapsulation, X – IKE Extended Authentication
       psk – Preshared key, rsig – RSA signature
       renc – RSA encryption
IPv4 Crypto ISAKMP SA

C-id  Local           Remote          I-VRF    Status Encr Hash Auth DH Lifetime Cap.

1073  19.26.116.141 20.19.60.26            ACTIVE aes  sha2 rsig 14 20:28:46 D
       Engine-id:Conn-id =  SW:73

IPv6 Crypto ISAKMP SA


Note: Router’s Full Configuration

R1#sh run
Building configuration…

Current configuration : 15460 bytes
!
! Last configuration change at 16:00:32 EST Fri Jan 8 2016 by john
! NVRAM config last updated at 16:01:19 EST Fri Jan 8 2016 by john
! NVRAM config last updated at 16:01:19 EST Fri Jan 8 2016 by john
version 15.1
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname R1
!
boot-start-marker
boot-end-marker
!
!
logging buffered 409600
enable secret 5 $1$iNJa$8RiUCW5Tt9nPa5kMW.PT0/
!
!      
ipc zone default
 association 1
  no shutdown
  protocol sctp
   local-port 5000
    local-ip 192.168.20.139
    retransmit-timeout 300 10000
    path-retransmit 10
    assoc-retransmit 10
   remote-port 5000
    remote-ip 192.168.20.140
!
aaa new-model
!
!
aaa authentication login default local group radius group tacacs+
aaa authentication enable default enable group radius group tacacs+
aaa authorization console
aaa authorization exec default local group radius group tacacs+
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 1 default stop-only group tacacs+
aaa accounting commands 5 default stop-only group tacacs+
aaa accounting commands 15 default stop-only group tacacs+
aaa accounting system default start-stop group tacacs+
!
!
!
!
!
aaa session-id common
!
clock timezone EST -5 0
clock summer-time EDT recurring
errdisable recovery cause bpduguard
!
no ipv6 cef
no ip source-route
no ip gratuitous-arps
ip cef
!
!
!
ip dhcp bootp ignore
!
!
no ip bootp server
ip domain name gd.com
ip name-server 8.8.8.8
ip name-server 8.8.4.4
login block-for 120 attempts 3 within 60
login on-failure log
login on-success log
!
multilink bundle-name authenticated
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint Verisign2015
 enrollment terminal
 fqdn R1.gi-de.com
 subject-name CN=R1.test.com,OU=IT,O=G&D,C=CA,ST=Ontario,L=Markham
 revocation-check none
 rsakeypair R1.test.com
!
crypto pki trustpoint Customer
 enrollment terminal
 revocation-check none
!
!
crypto pki certificate chain Verisign2015
 certificate 44FC828CB095BC3BA7D553F4F4BF9EBA
  308204FD 308203E5 A0030201 02021044 FC828CB0 95BC3BA7 D553F4F4 BF9EBA30
  0D06092A 864886F7 0D01010B 0500307E 310B3009 06035504 06130255 53311D30
  1B060355 040A1314 53796D61 6E746563 20436F72 706F7261 74696F6E 311F301D
  06035504 0B131653 796D616E 74656320 54727573 74204E65 74776F72 6B312F30
  2D060355 04031326 53796D61 6E746563 20436C61 73732033 20536563 75726520
  53657276 65722043 41202D20 4734301E 170D3135 31323331 30303030 30305A17
  0D313831 32333032 33353935 395A3081 85310B30 09060355 04061302 43413110
  300E0603 5504080C 074F6E74 6172696F 3110300E 06035504 070C074D 61726B68
  616D312F 302D0603 55040A0C 26476965 7365636B 65202620 44657672 69656E74
  20537973 74656D73 2043616E 61646120 496E6331 21301F06 03550403 0C18522D
  544F5231 2D495053 65632D31 2E67692D 64652E63 6F6D3082 0122300D 06092A86
  4886F70D 01010105 00038201 0F003082 010A0282 010100A7 FC4C44EB B6663518
  6E3B5521 90241DE0 10F831FC B291F54D 2A5A0824 38C6BD63 526A4C01 8994442A
  2C4543FB 58C29C01 7F820CEE 1CC89537 083FDAAD DE15CB65 76F3188F 8977B1E9
  36FDFAC9 0DB9C7E1 A3781D41 DD0B8F78 5ED6BF2A 71862C17 06E5E2C4 C1505FA9
  BB8E3A97 9226C8AD 6BA596A8 A717003A 57E3E3FC 68CADDD3 00715B72 5F729321
  6CF031E0 614AB912 2A75B121 ED4FDC0B 80846343 F6AED8DF 911759A7 8A897F49
  73B712FB 3720910E A9CBC536 6890BE1E EC0EF021 9A5674C6 CA33DDF6 DC663AFA
  FED35E2B AF9B0B4E DC11FB19 2832E02E F339A23F 99172FFF 460D480C 8BA25283
  82FA8EAC 043DC71A 41ED7C32 AECC9B37 EF87BF06 F899F902 03010001 A382016D
  30820169 30230603 551D1104 1C301A82 18522D54 4F52312D 49505365 632D312E
  67692D64 652E636F 6D300906 03551D13 04023000 300E0603 551D0F01 01FF0404
  030205A0 302B0603 551D1F04 24302230 20A01EA0 1C861A68 7474703A 2F2F7373
  2E73796D 63622E63 6F6D2F73 732E6372 6C306106 03551D20 045A3058 30560606
  67810C01 0202304C 30230608 2B060105 05070201 16176874 7470733A 2F2F642E
  73796D63 622E636F 6D2F6370 73302506 082B0601 05050702 0230190C 17687474
  70733A2F 2F642E73 796D6362 2E636F6D 2F727061 301D0603 551D2504 16301406
  082B0601 05050703 0106082B 06010505 07030230 1F060355 1D230418 30168014
  5F60CF61 9055DF84 43148A60 2AB2F57A F44318EF 30570608 2B060105 05070101
  044B3049 301F0608 2B060105 05073001 86136874 74703A2F 2F73732E 73796D63
  642E636F 6D302606 082B0601 05050730 02861A68 7474703A 2F2F7373 2E73796D
  63622E63 6F6D2F73 732E6372 74300D06 092A8648 86F70D01 010B0500 03820101
  00A9EA06 9A561D11 EB72E8C3 0FA4453C FFE376C8 E389BC20 B1A93B72 FA576E4F
  5E598F26 F12E8636 77944F89 105C0802 B4D7D3EC E1E2F550 FC0DB830 B8336C29
  407BC555 E36BB83B 83E29399 55379BCC A2AF808D 2A4CD262 9C1787C5 7CA2029B
  AAF5F6C0 57B0A869 4B822E2A 3355A2A5 F6F8D261 DBE46DB4 3782C9E8 186D739A
  5865E249 FE9CA2CF 4D5F6974 4E959F51 8BB69E49 C4339211 978652F3 2A08858B
  6859D3C5 30E3642C 4E670C9F C554C59A 648FF9E3 C1BAD434 062832B3 23B72814
  60E8962E FA62F32A 38C2D432 57BD06D3 91DABA89 24A1B688 5409DA04 1EA0A93E
  CF4CA550 4A0378DF FF74B724 C48F8A43 FE5B36F3 C95C25A3 C488D881 8E40BE1F
  C0
        quit
 certificate ca 513FB9743870B73440418D30930699FF
  30820538 30820420 A0030201 02021051 3FB97438 70B73440 418D3093 0699FF30
  0D06092A 864886F7 0D01010B 05003081 CA310B30 09060355 04061302 55533117
  30150603 55040A13 0E566572 69536967 6E2C2049 6E632E31 1F301D06 0355040B
  13165665 72695369 676E2054 72757374 204E6574 776F726B 313A3038 06035504
  0B133128 63292032 30303620 56657269 5369676E 2C20496E 632E202D 20466F72
  20617574 686F7269 7A656420 75736520 6F6E6C79 31453043 06035504 03133C56
  65726953 69676E20 436C6173 73203320 5075626C 69632050 72696D61 72792043
  65727469 66696361 74696F6E 20417574 686F7269 7479202D 20473530 1E170D31
  33313033 31303030 3030305A 170D3233 31303330 32333539 35395A30 7E310B30
  09060355 04061302 5553311D 301B0603 55040A13 1453796D 616E7465 6320436F
  72706F72 6174696F 6E311F30 1D060355 040B1316 53796D61 6E746563 20547275
  7374204E 6574776F 726B312F 302D0603 55040313 2653796D 616E7465 6320436C
  61737320 33205365 63757265 20536572 76657220 4341202D 20473430 82012230
  0D06092A 864886F7 0D010101 05000382 010F0030 82010A02 82010100 B2D805CA
  1C742DB5 175639C5 4A520996 E84BD80C F1689F9A 422862C3 A530537E 5511825B
  037A0D2F E17904C9 B4967719 81019459 F9BCF77A 9927822D B783DD5A 277FB203
  7A9C5325 E9481F46 4FC89D29 F8BE7956 F6F7FDD9 3A68DA8B 4B823341 12C3C83C
  CCD6967A 84211A22 04032717 8B1C6861 930F0E51 80331DB4 B5CEEB7E D062ACEE
  B37B0174 EF6935EB CAD53DA9 EE9798CA 8DAA440E 25994A15 96A4CE6D 02541F2A
  6A26E206 3A6348AC B44CD175 9350FF13 2FD6DAE1 C618F59F C9255DF3 003ADE26
  4DB42909 CD0F3D23 6F164A81 16FBF283 10C3B8D6 D855323D F1BD0FBD 8C52954A
  16977A52 2163752F 16F9C466 BEF5B509 D8FF2700 CD447C6F 4B3FB0F7 02030100
  01A38201 63308201 5F301206 03551D13 0101FF04 08300601 01FF0201 00303006
  03551D1F 04293027 3025A023 A021861F 68747470 3A2F2F73 312E7379 6D63622E
  636F6D2F 70636133 2D67352E 63726C30 0E060355 1D0F0101 FF040403 02010630
  2F06082B 06010505 07010104 23302130 1F06082B 06010505 07300186 13687474
  703A2F2F 73322E73 796D6362 2E636F6D 306B0603 551D2004 64306230 60060A60
  86480186 F8450107 36305230 2606082B 06010505 07020116 1A687474 703A2F2F
  7777772E 73796D61 7574682E 636F6D2F 63707330 2806082B 06010505 07020230
  1C1A1A68 7474703A 2F2F7777 772E7379 6D617574 682E636F 6D2F7270 61302906
  03551D11 04223020 A41E301C 311A3018 06035504 03131153 796D616E 74656350
  4B492D31 2D353334 301D0603 551D0E04 1604145F 60CF6190 55DF8443 148A602A
  B2F57AF4 4318EF30 1F060355 1D230418 30168014 7FD365A7 C2DDECBB F03009F3
  4339FA02 AF333133 300D0609 2A864886 F70D0101 0B050003 82010100 5E945649
  DD8E2D65 F5C13651 B603E3DA 9E7319F2 1F59AB58 7E6C2605 2CFA81D7 5C231722
  2C3793F7 86EC85E6 B0A3FD1F E232A845 6FE1D9FB B9AFD270 A0324265 BF84FE16
  2A8F3FC5 A6D6A393 7D43E974 21913528 F463E92E EDF7F55C 7F4B9AB5 20E90ABD
  E045100C 14949A5D A5E34B91 E8249B46 4065F422 72CD99F8 8811F5F3 7FE63382
  E6A8C57E FED008E2 25580871 68E6CDA2 E614DE4E 52242DFD E5791353 E75E2F2D
  4D1B6D40 15522BF7 87897812 416ED94D AA2D78D4 C22C3D08 5F87919E 1F0EB0DE
  30526486 89AA9D66 9C0E760C 80F274D8 2AF8B83A CED7D60F 11BE6BAB 14F5BD41
  A0226389 F1BA0F6F 2963662D 3FAC8C72 C5FBC7E4 D40FF23B 4F8C29C7
        quit
crypto pki certificate chain Customer
 certificate ca 0082809023512072AD
  3082035D 30820245 A0030201 02020900 82809023 512072AD 300D0609 2A864886
  F70D0101 0B050030 65311430 12060355 0403130B 53474920 43412032 30323531
  15301306 03550408 130C5361 736B6174 63686577 616E310B 30090603 55040613
  02434131 29302706 0355040A 13205347 4920526F 6F742043 65727469 66696361
  74696F6E 20417574 686F7269 7479301E 170D3135 30333330 31343535 35305A17
  0D323530 33323731 34353535 305A3065 31143012 06035504 03130B53 47492043
  41203230 32353115 40130603 55040813 0C536173 6B617463 68657761 6E310B30
  09060355 04061302 43413129 30270603 55040A13 20534749 20526F6F 74204365
  72746966 69636174 696F6E20 41757468 6F726974 79308201 22300D06 092A8648
  86F70D01 01010500 0382010F 00308201 0A028201 0100D005 9F2F2CF8 1C09E988
  56577004 EECEE3A2 545AE573 7FE704C8 E1E6F722 CC4B745E 36C860A7 5E0590A1
  7CE42928 3CD72621 7290E6FC 250F2E34 647D3DDE DF8306D8 6C28E3BD 3FD5FA92
  D2B3406C 44DBD66C 2F69E895 861F93C6 A052143E F814245D 0C8DDE69 A2A0FAAC
  F337E69C 843426AB DD19E5C9 F60DB892 503414B9 1E678FE0 93652A7F E4FB8990
  8894D38E 9795C691 F52D331C CA529033 CF90F4E3 98E7177E B69882EF CD2D9532
  32180C7D 12C517A5 8C737C63 FED361C9 CEB8C8AD 59399CCF 3C7B1810 E0EA5CCA
  D774519D 76C0C50A 293322CF 44339523 6F8339F7 18CB539A 19D01136 70D46A13
  21E50BBE C0C8B7DC 8955E88D 48DD7D31 1511986B B5DD0203 010001A3 10300E30
  0C060355 1D130405 30030101 FF300D06 092A8648 86F70D01 010B0500 03820101
  006302EE 40D8BADA 7D69A3C1 A7C03BE0 6BBD1410 B65679CC 7FAFC590 F0500E0A
  1E44A841 B44F11C4 17E8DC94 124476C1 C7D352D3 5967554F 6571F067 D366622F
  C3A6ABAA 2FF2433C D9773D80 F99875BA 593D4F55 40194E12 AE01CC57 51E43C53
  063EE6A0 580E837C B9C65739 E6BBC58F 752CFA34 7CE9BB45 4C494B49 FA90FBEB
  1FE60AC2 7010EE86 644D1414 C402436B 26C58B9D FDA1D3DD 27DECDE7 123CDBB7
  8C640943 3C56945C 9A7E4AA7 DDF70EDE 379BA01B 2E4D0A1D 624B8E8D BEC63755
  529C9025 23632ABA 0365EAC2 A99C0B2F BB71C451 63BCD096 FA9501E3 C8976C2B
  832E80D5 2FF61A7D 72215D6A 12E5F1CE 09722146 2AC182F4 FE00A902 62EE3D31 39
        quit
license udi pid CISCO1921/K9 sn FGL1529E0
!
!
archive
 log config
  logging enable
  logging size 200
  notify syslog contenttype plaintext
  hidekeys
!
no spanning-tree optimize bpdu transmission
spanning-tree uplinkfast
spanning-tree backbonefast
vtp domain gd
vtp mode transparent
username localit privilege 15 secret 5 $1$P3q.$qQBIHNYDUCZH5y0XWTXzbq0
username localit autocommand show running
username localadmin privilege 7 secret 5 $1$OgOX$owjSeZlPaU0A3K8DQJechd.
username cadmin privilege 15 secret 5 $1$PE7E$Yyud3NJ2bl0OPSVkN0PQ//
!
redundancy inter-device
 scheme standby VPNHA
!
!
redundancy
crypto ikev2 proposal aes-sha-256-proposal
 encryption aes-cbc-256
 integrity sha256
 group 14
!
crypto ikev2 policy ike2policy
 proposal aes-sha-256-proposal
!
crypto ikev2 keyring VPN-KEYS
 peer Customer
  address 20.19.60.26
  pre-shared-key local cisco123
  pre-shared-key remote cisco123
 !
!
crypto ikev2 keyring Test-KEYS
 peer Test
  address 19.26.116.137
  pre-shared-key cisco123
 !
!
!
crypto ikev2 profile Customer
 match identity remote address 20.19.60.26 255.255.255.255
 identity local address 19.26.116.141
 authentication local pre-share
 authentication remote pre-share
 keyring VPN-KEYS
!
crypto ikev2 profile Test
 match identity remote address 0.0.0.0
 match identity remote address 19.26.116.137 255.255.255.255
 identity local address 19.26.116.141
 authentication local pre-share
 authentication remote pre-share
 keyring Test-KEYS
!
!
!
ip ssh time-out 10
ip ssh logging events
ip ssh version 2
!
track 1 interface GigabitEthernet0/0 line-protocol
!
track 2 interface GigabitEthernet0/1 line-protocol
!
class-map type port-filter match-any TCP23
 match  port tcp 23
!      
!
policy-map type port-filter FILTERTCP23
 class TCP23
   drop
    log
!
!
!
crypto isakmp policy 1
 encr aes 256
 hash sha256
 group 14
crypto isakmp key cisco123 address 20.19.60.26 no-xauth
crypto isakmp keepalive 10
crypto isakmp aggressive-mode disable
!
!
crypto ipsec transform-set mysec esp-aes 256 esp-sha256-hmac
!
crypto map vpn 10 ipsec-isakmp
 set peer 20.19.60.26
 set transform-set mysec
 set pfs group14
 match address Gand
 reverse-route
!
!
!
!
!
interface Embedded-Service-Engine0/0
 no ip address
 shutdown
!
interface GigabitEthernet0/0
 ip address 19.26.116.139 255.255.255.192
 ip accounting output-packets
 standby 199 ip 19.26.116.141
 standby 199 priority 105
 standby 199 preempt
 standby 199 name VPNHA
 standby 199 track 2 decrement 10
 duplex auto
 speed auto
 crypto map vpn redundancy VPNHA stateful
!
interface GigabitEthernet0/1
 ip address 192.168.20.139 255.255.255.0
 standby 200 ip 192.168.20.141
 standby 200 priority 105
 standby 200 preempt
 standby 200 name CLIENTS
 standby 200 track 1 decrement 10
 duplex auto
 speed auto
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 19.26.116.161
!
ip access-list extended Gand
 permit ip host 192.168.20.25 172.21.90.0 0.0.1.255
 permit icmp host 192.168.20.25 172.21.90.0 0.0.1.255
!
logging trap debugging
logging 10.9.20.33
access-list 101 permit ip 10.9.200.0 0.0.0.255 any log
access-list 101 permit ip 19.26.116.0 0.0.0.255 any log
access-list 110 permit ip host 192.168.20.25 host 172.21.91.37
access-list 110 permit ip host 172.21.91.37 host 192.168.20.25
!
!
!
!
!
!
!
!
control-plane
!
!
privilege exec level 7 show configuration
privilege exec level 7 show
banner motd ^C
****************************************************************
* This is a private computing facility.                        *
* Unauthorized use of this device is strictly prohibited.      *
* Violators will be prosecuted to the maximum extent possible. *
*                                                              *
* TACACS+/RADIUS Authentication and Authorization are in place.*
* All actions/commands are monitored and recorded.             *
* By using the network you expressly consent to such           *
* monitoring and recording.                                    *
****************************************************************
^C
!
line con 0
 exec-timeout 5 0
 logging synchronous
 login authentication CONAUTH
 stopbits 1
line aux 0
line 2
 no activation-character
 no exec
 transport preferred none
 transport input all
 transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
 stopbits 1
line vty 0 4
 access-class 101 in
 exec-timeout 5 0
 logging synchronous
 login authentication VTYAUTH
 transport input ssh
line vty 5 15
 access-class 101 in
 exec-timeout 5 0
 absolute-timeout 15
 logging synchronous
 login authentication VTYAUTH
 transport input ssh
!
scheduler allocate 20000 1000
ntp server 0.ca.pool.ntp.org
ntp server 1.ca.pool.ntp.org
ntp server 2.ca.pool.ntp.org
ntp server 3.ca.pool.ntp.org
end


Here are some summarize for all steps from Cisco forum post:

In general what you need to do is (typical scenario)

On all systems (including CA)
– Setup correct time (NTP highly recommended)
– config hostname and domain name.
– generate RSA keys. private and public they will be used to encrypt/sign certificates.

On ASA/IOS device you wish to enroll:
– configured trustpoint with what-need-you (crl, enrollemtn method etc etc).
– you authenticate a trustpoint by introducing CA who issues your certificate.
– you then generate CSR or enroll via SCEP.
– You download/import certificate from CA. It is signed by public key of CA.

Your certification is normally two parts – your identity certificate, trusted third party certificate who issued you your certificate.

It all boils down to who you trust, if you want one side to use entrust and other to use verisign, you need to have appropriate CA authenticated in you device.

Now all modern operatin system provide you will a list of well known trusted third parties in your certificate store. Which is why when you as user going to “my_internet_bank.com” don’t need to trust anything.
This is not the case on ASA or IOS, there is no default list of trusted third parties, all has to be done manually.

By Jon

Leave a Reply