View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

Certificate

SEC0116 - SSL VPN ASA Certificate Install

The video gets you started on SSL VPN on Cisco ASA with certificate installation. You will learn how to generate a Certificate Signing Request (CSR) on the ASA, submit it to your Certificate Authority (CA), and import the signed certificate back to the ASA. Installing a trusted certificate should be your first step of implementing SSL VPN to save users from unnecessarily encountering certificate warnig.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0029 - Windows 2008 CA User and Computer Certificate Auto-Enrollment

The video walks you through steps to deploy user and computer digital certificates from Windows 2008 Certificate Authority (CA) server through auto-enrollment and Group Policy. This method allows you to automatically distribute certificates to your Windows users, which is very effective for a large scale security deployment that requires either or both user and machine authentication using client-based certificate such as EAP-TLS. This lab assumes you have existing Windows certificate server and Active Directory (AD) infrastructure.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0014 - Certificate Installation on Router and ASA

The video demonstrates how to install a SSL certificate on Cisco router and ASA firewall manually and via SCEP. Windows 2008 running Enterprise CA server is used in this lab to provide auto-enrollment. For manual enrollment, a Certificate Signing Request (CSR) is created on a network device and submitted to the CA through web enrollment. The issued certificate is then imported to the device. SCEP, on the other hand, automates the enrollment process into a single command through HTTP transaction given the CA is reachable to the devices.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0

SEC0011 - Windows 2008 CA SCEP Auto-Enrollment Options

The video presents you with various options to implement certificate Auto-Enrollment for network devices using SCEP. By default, a one-time challenge password needs to be generated and used per network device. This can be cumbersome and impractical in case the number of device is large. An alternative is to disable the use of challenge password entirely, but this could post security concern, although is potentially desirable in lab environment. An acceptable solution might be disabling auto-approval and have the CA admin approve certificate requests manually.

Rating: 
0
No votes yet
Difficulty Level: 
1

SEC0009 - Windows 2008 Enterprise CA SCEP Installation

The video walks you through an installation of Enterprise Certificate Authority (CA) and Network Device Enrollment Service (NDES) (aka SCEP) on a Windows 2008. We will test the server with a certificate request through web enrollment from a Windows client, as well as SCEP from a Cisco router. SCEP communication is captured and reviewed on Wireshark. At the end of the video, you should have a working CA server that you can use for certificate authentication in future labs.

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0
Subscribe to RSS - Certificate