In accordance with the security policy of one of my clients, I need to integrate ASA5510 with a CA to authenticate Remote Access VPN users when connecting to the ASA. This is a small network with only about 50 VPN users.
I have tried speaking with some CAs such as VeriSign and Secure Computing but they said they do not provide such service to small companies like my client. Can anyone recommend a CA I can use who would be able to accomodate a small company like my client?
Does this mean that I need to have a dedicated server with a public IP address with Microsoft CA implemented on it? How would this server be protected since it is sitting before the firewall and not on the LAN?
Wouldn't the essence of having a CA authenticate Remote Access VPN clients be defeated since a hacker can compromise the Microsoft CA server that I would install and place before the ASA Outside interface?
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...