After completing this chapter, you will be able to perform the following tasks:
Understand the basics of a CA
Install a root CA certificate
Install identity certificates
Implement a CA-based remote-access VPN
Configure a Cisco VPN Concentrator for CA support
Configure the Cisco VPN Client for CA support
So far this book has covered the creation of a remote-access virtual private network (VPN) using preshared keys. Public Key Cryptography implemented as a Public Key Infrastructure (PKI) is a way to implement a scalable authentication solution that provides more security than using preshared keys. This chapter provides an overview of certification authority (CA) and ...