
The first one is the preshared keys, where two or more devices have same shared secret key and this is used by the peers for authentication. They compute a data and send it in order to authenticate themselves.
The receiver is expected to create the same hash and this does not depend on the preshared key. It is based on the concept of using the same secret in order to build trust. This method looks very similar to olden ways of communication and it is not very scalable.
The other popular method include self-signed certificate where a device is used for this purpose. It generates own certificate and takes ownership of it and signs it to be valid. One has to use this certificate in a limited manner. A very good example which illustrates the usage of this certificate is SSH. One can also find HTTPS access to be a good example and what it requires is all a username and a password. This is the primary requirement in order to establish a connection. One must be aware of the reloading of the persistent self-signed certificates which has the ability to survive reloads. It has the ability to be store in non-volatile RAM. This factor makes it to be persistent. SSl VPN is an excellent example for persistent SSI which has got a nonvolatile RAM. Another popular certificate is the certificate authority in which a third party is used for the validation process. He is used to authenticate the parties that are trying to communicate. Each party is given with a public and a private key.
The public key is employed for the encryption process and the private key is used with the decryption process. Since they are using the certificates, which were generated from the same source they are given assurance of the identities. In order to obtain the digital certificate one can use the ASA device. This is used to obtain the certificate from the third party.
One has to undergo an enrollment process and this can either be a manual or an automatic enrollment process. This method and the digital certificate is based on third party product and the certificate service is vendor based. One has to contact the vendor to obtain more information on this. One or more pre-shared keys are used with Cisco Adaptive security or third parties are involved in providing digital certificates which are used in the authentication of IPSec. Self-signed digital certificates can also be produced which are used with SSH, HTTPS.
The Cisco Adaptive Security Device Manager also uses this for its connections to the device. One can refer the document in order to understand the procedures for obtaining a digital certificate. This document does not include the procedure for the method of enrollment. One can find the use of ASDM and also the final command-line interface in the document.
One can refer various examples in order to get better enlightenment about the things in the Cisco IOS platform. A popular example includes the IOS certificate enrollment. One can also refer to related examples in order to understand about VPN 3000 series.
One must make sure the following rules are satisfied before proceeding to configuration.
Configure your window server.
Then make sure your server support Cisco axa pix version 7. 0
If required install extra dll files, in order to run the Cisco axa in window server.
Try to get the add-on dll as exe extension. These help you to add your Cisco application easily with the window server.
Make sure the date and time zone is configured properly in the window server.
Modules involved
Cisco asa with recent version should be used.
Cisco adaptive manager version should be minimum 5. 0
Window server should contain its certificate to ensure ability to run the program properly.
Added modules – This configuration also used in Cisco pix series also.
Step by step procedure to configure Asdm.
Click on Asdm application panel to choose configuration button.
Try to choose device manager from driver menu.
Enter the domain and the host name properly.
Then after configuration, click the save button.
Configure asa with proper time and date, and make sure the time setting is correct and matches with their time zones. To do the above configuration login in to ntp server.
Click the application panel, choose clock under device administration.
You can now able to see the calendar, choose the correct date and time in the calendar. Click the save button and close the window.
Now let us see how to configure the asa.
In the application panel, choose key pair under the certificate option.
Click add button, you get a pop up that asks you to fill the key name and size of key name.
Click generate key now and close the window.
Let us see the steps to add the network under trust worthy option in server.
Click on application panel and click add.
Here click the edit trustworthy configuration.
Fill the available key pair and give the related Microsoft URL address for the key used in server.
Let us see the steps to configure control retrieval methods.
Make sure you uncheck the directory access protocol.
Enable the simple http protocol by just putting check mark in check box.
Click save button and close it.