Cisco VPN Client & Certificate

Hello Experts,

I have a Multiple Domains UCC SSL Certificate for our Exchange 2007. I was wondering if I could somehow use this certificate for my Cisco VPN Client 5.0. There is a tab called "Certificates" and wanted to make use of my SSL certificate if possible.

Thanks!
LVL 1
katredrumAsked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
Steve JenningsConnect With a Mentor IT ManagerCommented:
You can use a cisco router as a CA and enrillment server. You set up the CA, then the enrollent server, then set up a remote router with RSA keys and point it toward the enrollment server. The enrollment server creates the cert and then is able to open an IPSec tunnrl using the cert to authenticste. The head end router (where all the ipsec tunnels terminate) also enrolls and can be set up as a cert revocation point for the CA to publish a CRL to.

I have done this with a cisco 3845 for hundreds of remote routers and saved a ton of money over purchasing verisign certs. Essentially you are using self signed certs and dont need access to an external (costly) CA.

I have greatly oversimplified the explanation. Google "cisco ios ca" and you should be able to find a detailed documnent, or post questions and I will answer what I can.

Steve
0
 
jmeggersSr. Network and Security EngineerCommented:
Maybe I'm missing something but you don't typically need a certificate for IPsec tunnels unless you're using certificate-based authentication.  If you use pre-shared keys, you don't need it.  If you do choose to do certificate-based authentication, you'll need a CA server on the inside.  It's my understanding the ASA cannot act as a CA server for IPsec connections, only SSL VPN.
0
 
katredrumAuthor Commented:
I thought so too, but then I was like why is there an option to import certificates into a IPSec VPN client...

Here's what the manual says:

Connecting with Digital Certificates

Before you create a VPN Client connection entry using a digital certificate, you must have already enrolled in a Public Key Infrastructure (PKI), have received approval from the Certificate Authority (CA), and have one or more certificates installed on the VPN Client system. If this is not the case, then you need to obtain a digital certificate. You can obtain one by enrolling with a PKI directly using the Certificate Manager feature, or you can obtain an Entrust profile through Entrust Entelligence. Currently, we have tested the following PKIs:

http://www.cisco.com/en/US/docs/security/vpn_client/cisco_vpn_client/vpn_client500_501/administration/5vcAch4.html
0
Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

 
Steve JenningsIT ManagerCommented:
You either need to provide your own PKI infrastructure (using Cisco IOS CA, its cheap) or one of the few public PKI that cisco supports, either Microsoft or Entrust.

Preshared keys doesnt scale well which is why certs with IPSec is a good idea..  . unless you have a small network and you can manage the psk stuff..
0
 
katredrumAuthor Commented:
SteveJ, thanks for shedding some light on this. So I'm trying to figure out how to do this. When you say I need to provide my own PKI infrastructure public what do you mean? Could you please elaborate how I would set this up? Thanks in advance!
0
 
Steve JenningsIT ManagerCommented:
By the way, all the PKI stuff can be done on a single router. If you want to be able to recover certs
, you need to set up storage for them. Or make them non exportable and if something bad happens simply re-enroll the device.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.