Identifying authentication requirements
A closer look at self-signed certificates
Figure 2-2. Sidewinder self-signed certificate summary
If not already done, decide if you will use
Table
Scenario | Profile |
|
|
Using | No CA needed |
(for a small number of VPN | Requires one VPN association for each client |
clients) |
|
|
|
Using | Uses a private or public CA |
(for a medium to large | Single VPN association for all clients |
number of VPN clients) | Can make VPN deployment and management |
| more efficient |
|
|
A VPN implemented using Sidewinder
| 1 | Firewall |
| Firewall |
| Cert. | 4 | Cert. | |
|
| |||
|
|
| ||
|
| *.pem |
|
|
Protected Network | Sidewinder | Internet |
| |
| ||||
|
| Client |
| Client |
|
| Cert. | 5 | Cert. |
|
| 2 *.pem |
| |
|
|
|
|
|
| 3 | |
1 | Admin creates firewall private key and | *.pk1 |
|
| PK12 object for | ||
| certificate |
| importing to |
2 | Admin creates client private key/ |
| |
|
| ||
| certificate pair(s) |
|
|
3Admin converts client private key & exports certificate files to PK12 object
|
| Note: A | |
4 | Firewall certificate imported to | on Sidewinder remains valid for one | |
year beginning from the date it is | |||
| (private key remains on Sidewinder) |
created.
5Client private key and certificate file (PKCS12) imported into
Planning Your VPN Configuration