This chapter covers the following topics:
• Deploying PKI as a Service Using CSM
• Cisco ASA IPsec VPN Remote Access Using CSM
• DMVPN Using CSM
• GETVPN Using CSM
Chapter 6, “Integration in Large-Scale Site-to-Site VPN Solutions,” discusses that it takes a number of steps to deploy VPN technologies using the Cisco command-line interface, which includes configuring enrollment options, ISAKMP policy, IPsec profile, and VPN technology-specific configurations. This multistep process becomes more tedious when configuring on multiple devices. Moreover, configuring over command-line interface does not support any kind of validation of the configurations. Therefore, using a management ...