O'Reilly logo

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks by Francois Dessart, Srinivas Tenneti, Andre Karamanian

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Deploying VPNs with PKI Using Cisco Security Manager

This chapter covers the following topics:

• Deploying PKI as a Service Using CSM

• Cisco ASA IPsec VPN Remote Access Using CSM

• DMVPN Using CSM

• GETVPN Using CSM

Chapter 6, “Integration in Large-Scale Site-to-Site VPN Solutions,” discusses that it takes a number of steps to deploy VPN technologies using the Cisco command-line interface, which includes configuring enrollment options, ISAKMP policy, IPsec profile, and VPN technology-specific configurations. This multistep process becomes more tedious when configuring on multiple devices. Moreover, configuring over command-line interface does not support any kind of validation of the configurations. Therefore, using a management ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required