
vii
Configuring the local asymmetric key pair ···············································································································212
Creating a local asymmetric key pair···············································································································212
Displaying or exporting the local RSA or DSA host public key ·····································································212
Destroying an asymmetric key pair···················································································································213
Configuring a remote host's public key·····················································································································213
Displaying and maintaining public keys ···················································································································214
Public key configuration examples·····························································································································215
Configuring a remote host's public key manually ···························································································215
Importing a remote host's public key from a public key file···········································································216
Configuring PKI ······················································································································································· 219
PKI terms·······························································································································································219
PKI architecture····················································································································································220
PKI applications···················································································································································220
Operation·····························································································································································221
Configuration task list··················································································································································221
Configuring an entity DN············································································································································222
Configuring a PKI domain ··········································································································································223
Submitting a PKI certificate request····························································································································225
Submitting a certificate request in auto mode··································································································225
Submitting a certificate request in manual mode·····························································································225
Retrieving a certificate manually ································································································································226
Configuring PKI certificate verification ······················································································································227
Configuring CRL-checking-enabled PKI certificate verification ·······································································227
Configuring CRL-checking-disabled PKI certificate verification ······································································228
Destroying a local RSA or DSA key pair···················································································································228
Deleting a certificate····················································································································································229
Configuring an access control policy ························································································································229
Displaying and maintaining PKI·································································································································230
PKI configuration examples·········································································································································230
Requesting a certificate from a CA server running RSA Keon ·······································································230
Requesting a certificate from a CA server running Windows 2003 Server ·················································234
Applying RSA digital signature in IKE negotiation ··························································································237
Configuring a certificate attribute-based access control policy ·····································································240
Troubleshooting PKI ·····················································································································································241
Failed to retrieve a CA certificate······················································································································241
Failed to request a local certificate ···················································································································242
Failed to retrieve CRLs ········································································································································242
Configuring IPsec···················································································································································· 243
Implementation ····················································································································································243
Basic concepts ·····················································································································································244
IPsec tunnel interface···········································································································································245
IPsec for IPv6 routing protocols··························································································································247
IPsec RRI ·······························································································································································247
Protocols and standards ·····································································································································247
Configuring IPsec ·························································································································································248
Implementing ACL-based IPsec···································································································································248
Configuration task list ·········································································································································248
Configuring ACLs ················································································································································249
Configuring an IPsec proposal ··························································································································252
Configuring an IPsec policy ·······························································································································253
Applying an IPsec policy group to an interface·······························································································259
Enabling the encryption engine ·························································································································259
Enabling ACL checking of de-encapsulated IPsec packets ·············································································260
Configuring the IPsec anti-replay function ········································································································260