Chapter 11. Deploying VPNs with PKI Using Cisco Security Manager

This chapter covers the following topics:

• Deploying PKI as a Service Using CSM

• Cisco ASA IPsec VPN Remote Access Using CSM

• DMVPN Using CSM

• GETVPN Using CSM

Chapter 6, “Integration in Large-Scale Site-to-Site VPN Solutions,” discusses that it takes a number of steps to deploy VPN technologies using the Cisco command-line interface, which includes configuring enrollment options, ISAKMP policy, IPsec profile, and VPN technology-specific configurations. This multistep process becomes more tedious when configuring on multiple devices. Moreover, configuring over command-line interface does not support any kind of validation of the configurations. Therefore, using a management ...

Get PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.