Introduction |
|
XIII | |
Part I Core Concepts |
|
|
|
1 | (14) |
|
Confidentiality, Integrity, Authenticity, Nonrepudiation |
|
|
2 | (3) |
|
|
2 | (1) |
|
|
2 | (1) |
|
Authenticity and Nonrepudiation |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
Example Algorithm: DES and 3DES |
|
|
4 | (1) |
|
|
5 | (1) |
|
Asymmetric Encryption Application: Authentication |
|
|
5 | (1) |
|
Asymmetric Encryption Application: Encryption |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (2) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Internet Key Exchange (IKE) |
|
|
8 | (4) |
|
|
9 | (3) |
|
|
12 | (1) |
|
Device Configuration: Certificates |
|
|
12 | (1) |
|
|
13 | (2) |
|
Chapter 2 Understanding PKI Building Blocks |
|
|
15 | (22) |
|
|
15 | (7) |
|
|
15 | (4) |
|
|
19 | (3) |
|
Certification Authority (CA) |
|
|
22 | (2) |
|
|
23 | (1) |
|
Private Versus Public CAs |
|
|
23 | (1) |
|
Subordinate Certification Authorities (Sub-CA) |
|
|
24 | (2) |
|
|
24 | (1) |
|
|
24 | (2) |
|
Registration Authority (RA) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Endpoint Entities: Users and Devices |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Key and Certificate Storage |
|
|
28 | (8) |
|
|
28 | (1) |
|
Microsoft Windows Certificate Stores |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (3) |
|
|
32 | (2) |
|
|
34 | (1) |
|
Standards of Interests (ITU-T, PKCS, and ISO) |
|
|
35 | (1) |
|
|
36 | (1) |
|
Chapter 3 PKI Processes and Procedures |
|
|
37 | (20) |
|
|
37 | (7) |
|
|
38 | (5) |
|
|
43 | (1) |
|
Certificate Expiration and Renewal |
|
|
44 | (2) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Certificate Verification and Enforcement |
|
|
46 | (7) |
|
Certificate Revocation Lists |
|
|
47 | (3) |
|
Online Certificate Status Protocol |
|
|
50 | (1) |
|
|
51 | (2) |
|
|
53 | (1) |
|
Certificate Authority Resiliency |
|
|
53 | (1) |
|
|
54 | (3) |
|
Chapter 4 Troubleshooting |
|
|
57 | (40) |
|
Keying Material Generation |
|
|
57 | (6) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
Issues When Importing Key Pairs |
|
|
60 | (3) |
|
|
63 | (13) |
|
Certificate Use and Validation |
|
|
76 | (16) |
|
Troubleshooting Flow Charts |
|
|
92 | (3) |
|
|
95 | (2) |
Part II Design and Solutions |
|
|
Chapter 5 Generic PKI Designs |
|
|
97 | (12) |
|
Basic Design with Flat CA Architecture |
|
|
97 | (1) |
|
|
98 | (1) |
|
Hierarchical Architecture |
|
|
98 | (4) |
|
Hierarchical Architecture Without Chaining |
|
|
102 | (2) |
|
Hierarchical Architecture with Chaining |
|
|
104 | (4) |
|
|
104 | (4) |
|
|
108 | (1) |
|
Chapter 6 Integration in Large-Scale Site-to-Site VPN Solutions |
|
|
109 | (46) |
|
How Do VPN Technologies Use PKI as a Service? |
|
|
109 | (1) |
|
IKE Using Digital Certificates |
|
|
110 | (1) |
|
PKI Design and Leading Practices |
|
|
110 | (25) |
|
|
112 | (3) |
|
DMVPN Integration with PKI |
|
|
115 | (2) |
|
DMVPN with Hub-and-Spoke Model |
|
|
117 | (7) |
|
DMVPN Integration with PKI Using a Spoke-to-Spoke Model |
|
|
124 | (6) |
|
DMVPN Migration from Preshared Authentication to Digital Certificates |
|
|
130 | (5) |
|
GETVPN PKI Design and Leading Practices |
|
|
135 | (19) |
|
|
135 | (1) |
|
GET VPN Deployment Models |
|
|
135 | (1) |
|
GETVPN Deployment with Dual Key Servers and Dual Subordinate CAs |
|
|
136 | (2) |
|
PKI Integration with GETVPN |
|
|
138 | (8) |
|
PKI Troubleshooting with VPN Examples |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (8) |
|
|
154 | (1) |
|
Chapter 7 Integration in Remote Access VPN Solutions |
|
|
155 | (32) |
|
Cisco IPsec VPN Remote Access |
|
|
155 | (8) |
|
|
156 | (1) |
|
Deploying IPsec VPN Remote Access on the ASA |
|
|
156 | (1) |
|
|
157 | (6) |
|
Cisco VPN Client Using Digital Certificates |
|
|
163 | (14) |
|
|
177 | (6) |
|
|
177 | (6) |
|
Troubleshooting the AnyConnect Solution |
|
|
183 | (2) |
|
|
185 | (2) |
|
Chapter 8 Using 802.1X Certificates in Identity-Based Networking |
|
|
187 | (10) |
|
EAP-TLS: Certificate-Based 802.1x |
|
|
188 | (7) |
|
Step 1: Enroll ACS in the Certificate Authority |
|
|
189 | (2) |
|
Step 2: Add the CA in the Identity Store |
|
|
191 | (1) |
|
Step 3: Add AD as an External Database |
|
|
192 | (1) |
|
Step 4: Configure a Certificate Authentication Profile |
|
|
192 | (1) |
|
Step 5: Add an Access Service for 802.1x |
|
|
192 | (2) |
|
Step 6: Configure the Access Service Identity Policy |
|
|
194 | (1) |
|
Step 7: Configure Service Selection Rule |
|
|
194 | (1) |
|
Setting Up the Switch for EAP |
|
|
195 | (1) |
|
|
195 | (2) |
|
Chapter 9 PKI in Unified Communications |
|
|
197 | (12) |
|
|
197 | (3) |
|
Manufacturer Installed Certificate (MIC) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (2) |
|
Certificates Distribution |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (6) |
|
Call Authentication and Encryption |
|
|
201 | (2) |
|
Software and Configuration Security |
|
|
203 | (1) |
|
802.1x and Network Admission Control |
|
|
204 | (2) |
|
|
206 | (1) |
|
|
207 | (1) |
|
ASA TLS Proxy—CUCM Server |
|
|
207 | (1) |
|
|
207 | (2) |
Part III Case Studies |
|
|
Chapter 10 Understanding Cisco Virtual Office |
|
|
209 | (8) |
|
|
212 | (3) |
|
|
215 | (2) |
|
Chapter 11 Deploying VPNs with PKI Using Cisco Security Manager |
|
|
217 | (30) |
|
Cisco ASA IPsec VPN Remote Access |
|
|
218 | (16) |
|
|
218 | (1) |
|
Deploying IPsec VPN Remote Access on the ASA Using CSM |
|
|
218 | (1) |
|
Adding the Device into the CSM Domain |
|
|
219 | (3) |
|
Configure Enrollment Options |
|
|
222 | (3) |
|
Configure the Certificate Map |
|
|
225 | (2) |
|
Configure Remote Access VPN |
|
|
227 | (7) |
|
Deploying DMVPN Using CSM |
|
|
234 | (6) |
|
|
236 | (4) |
|
GETVPN Deployment Using CSM |
|
|
240 | (5) |
|
|
245 | (2) |
Index |
|
247 | |