Device administration using certificates

Unanswered Question
Mar 25th, 2009

Rather then specifying SSH subnets for device administration, is it possible to use certificates instead?

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)

Here are the basic steps for enrolling with a CA and getting an identity certificate to use for authenticating tunnels. This example shows both automatic (SCEP) enrollment and manual enrollment. For information on fields not defined in this procedure, click the Help button.

1. Generating a key pair for the identity certificate. The key pair is RSA.

2. Creating a trustpoint.

3. Configuring an enrollment URL.

4. Authenticating the CA.

5. Enrolling with the CA, which places an identity certificate onto the security appliance


This Discussion