




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、Cisco asa 5500 配置Cisco Secure Desktop (CSD) on ASA for Windows Configuration Example using ASDM1. Download the CSD software securedesktop-asa*.pkg and readme files onto yourmanagement station from the Cisco Software Download website.2. Log in to ASDM and click the Configuration button. From the left
2、Manager button, and click the Cisco Secure Desktop link., click the CSD3. Click Upload to display the Upload Image window.a. Either enter the path of the new .pkg file on the management station or clickBrowse Local Files to locate file.b. Either enter the location on flash in which to place the file
3、 or click Browse Flash.c. Click Upload File.d. When prompted, click OK > Close > OK.4. Once the client image is loaded to flash, check the Enable SSLand then click Apply.5. Click Save, and then click Yes to accept the changes.Client check box,Define Windows LocationsComplete these steps to def
4、ine Windows Locations.1. Click the Configuration button.2. From the leftlink., click the CSD Manager button, and click the Cisco Secure Desktop3. From the navigation pane, click Windows Location Settings.4. Type a location name in the Location to Add field and click Add.Note the three locations in t
5、his example: Office, Home, and Others.o Office represents workstations that are located inside the security boundary of the corporation.o Home represents users who work from home.o Other represents any location other than the two locations mentioned.5. Create your own locations dependent on the layo
6、ut of your network architecture for sales, guests, partners, and others.6. As you create Windows Locations, the navigation pane expands with configurable modules for each new location. Click Apply All.7. Click Save, and then click Yes to accept the changes.Windows Location IdentificationComplete the
7、se steps to define Windows Location Identification.1. Identify the locations that were created in Define Windows Locations.2. To identify the location Office, click Office in the navigation pane.a. Uncheck Secure Desktop and Cache Cleaner because these are internal computers.b. Check Enable identifi
8、cation using IP criteria.c. Enter the IP address ranges of your internal computers.d. Check Enable identification using registry or file criteria. This differentiates internal office workers from the occasional guests on the network.3. Click Configure Criteria. A simple example of a file "DoNot
9、Delete.txt" is configured. This file must exist on your internal Windows computers and is simply a placeholder. You can also configure a Windows registry key to identify internal office computers. Click OK inthe Add File Criterion window. Click OK in the Registry and File Criteria window.4. Cli
10、ck Apply All in the Identification for Office window. Click Save, and then click Yes to accept the changes.5. To identify the location Home, click Home in the navigation pane.a. Check Enable identification using registry or file criteria.b. Click Configure Criteria.6. Home computer clients must have
11、 been configured with this registry key by an Administrator. Click OK in the Add Registry Criterion window. Click OK in the Registryand File Criteria window.7. Under Location Module, check Secure Desktop. Click Apply All in the Identification for Home window. Click Save, and then click Yes to accept
12、 the changes.8. To identify the location Other, click Other in the navigation pane.a. Check only the Cache Cleaner box and uncheck all other boxes.b. Click Apply All in the Identification for Other window.c. Click Save, and then click Yes to accept the changes.Configure Windows Location ModuleComple
13、te these steps to configure the modules under each of the three locations you created.1. For Office clients, do nothing since Secure Desktop and Cache Cleaner were not chosen in the previous steps. The ASDM application allows you to configure the Cache Cleaner even if it were not chosen in a previou
14、s step. Keep the default settings for the Officelocations.Note: TheFeature Policy is not discussed in this step, but it will be discussed in asubsequent step for all locations.2. For Home clients, click Home and Keystroke Logger in the navigation pane.a. In the Keystroke Logger window, check Check f
15、or keystroke loggers.b. Click Apply All in the Keystroke Logger window.c. Click Save, and then click Yes to accept the changes.3. Under Home, choose Cache Cleaner and the parameters to suit your environment.4. Under Home, choose Secure Desktop General and the parameters to suit yourenvironment.5. Un
16、der Home, choose Secure Desktop Settings.a. Check Allowapplications to work transparently, and configure the othersettings to suit your environment.b. Click Apply All.c. Click Save, and then click Yes to accept the changes.Configure Windows Location FeaturesConfigure theFeature policy for each of th
17、e locations you created.1. In the navigation pane, clickOffice, and then click2. Click the Group-Based Policy tab.Feature Policy.a. Click the Always use Success Group-Policy radio button.b. Click the Web browsing tab, and check the Always Enabled radio button.c. Follow the same procedure for the Fil
18、e access, Port forwarding, and Full tunneling tabs.d. Click Apply All.e. Click Save, and then click Yes to accept the changes.3. For Home users, each corporation can require specific policies before access is allowed. Inthe navigation pane, click Home, and clicka. Click the Group-Based Policy tab.Fe
19、ature Policy.b. Click the Use Success Group-Policy radio button if preconfigured criteria match,such as a specific registry key, known file name, or digitalc. Check theLocation Module checkbox and choose Secure Desktop.d. Choose the Anti-, Anti-Spyware, Firewall, and OS areas in accordancewith your
20、company security policy. Home users will not be allowed onto thenetwork unless their computers meet your configured criteria.4. In the navigation pane, click Other and clicka. Click the Group-Based Policy tab.Feature Policy.b. Click the Always use Success Group-Policy radio button.5. For clients in
21、thisFeature Policy location, click the Web Browsing tab, and click theAlways Enabled radio dial.a. Click the File Access tab, and click the Disable radio button.b. Repeat the step with the Port Forwarding and Full Tunneling tabs.c. Click Apply All.d. Click Save, and then click Yes to accept the chan
22、ges.Optional Configurations for Windows CE, Macintosh, and Linux ClientsThese configurations are optional.1. If you choose Windows CE from the navigation pane, check the Web browsing checkbox.2. If you choose Mac and Linux Cache Cleaner from the navigation pane, check theLaunch cleanup upon global t
23、imeout radio dial.a. Change the timeout to your specification.b. Under theFeature Policy area, check the Web browsing , File access, andPort forwarding radio dials for these clients.3. Whether you choose Windows CE or Mac and Linux Cache Cleaner, click Apply All.4. Click Save, and then click Yes to
24、accept the changes.ConfigureConfigurationThis configuration reflects the changes ASDM made to enable CSD: Most of the CSDconfigurations are kept in a separate file on flash.Ciscoasaciscoasa#show running-config Building configuration.ASA Version 7.2(1)!hostname ciscoasa domain-name enable password 2K
25、FQnbNIdI.2KYOU encrypted names!interface Ethernet0/0 nameif outside security-level 0ip address 60 !interface Ethernet0/1 nameif inside security-level 100ip address !interface Ethernet0/2 shutdownno nameifno security-level no ip address!interface Managemen
26、t0/0 shutdownno nameifno security-level no ip address management-only!passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passivedns server-group DefauNS domain-name no pager logging enablelogging asdm informational mtu outside 1500mtu inside 1500!- ASDM location on disk0asdm image disk0:/asdm521.bin no asdm
27、 history enablearp timeout 14400 nat-controltimeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:000:05:00-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00sip-disconnect 0:02:00timeout uauth 0:05:00 abso
28、lute!- some group policy attributes group-policy GroupPolicy1 internal group-policy GroupPolicy1 attributes-tunnel-protocol IPSec l2tp-ipsec web webfunctions url-entry file-access file-entry file-browsingusername user1 password mbO2jYs13AXlIAGa encrypted privilege 15username user1 attributes-group-p
29、olicy GroupPolicy1username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15username cisco attributes-group-policy DfltGrpPolicy webport-forward noneport-forward-name value Application Access http server enablehttp insideno snmp-server locationno snmp-server contactsnmp-s
30、erver enable traps snmp authentication linkup linkdown coldstart!- tunnel group informationtunnel-group DefaultWEBGroup general-attributes default-group-policy GroupPolicy1tunnel-group DefaultWEBGroup web-attributes hic-fail-group-policy GroupPolicy1nbns-server 0 timeout 2 retry 2telnet timeout 5ssh timeout 5console timeout 0!class-map inspecti
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年江西省考公務員考試縣鄉崗和省市崗結構化面試真題試題試卷答案解析
- 2024年農作物種子知識試題及答案
- 智能化農田改造工程可行性研究報告(范文參考)
- 掌握監管要點2024籃球裁判員考試試題及答案
- 模具設計師資格考試階段性調整試題及答案
- 高端物流設施園區項目可行性研究報告
- 2024年模具設計師資格認證熱題及答案
- 理解農作物種子職業教育的試題及答案
- 2024年體育經紀人考試考生必看試題及答案
- 2024年體育經紀人考試核心考點試題及答案
- 國際農業技術轉移與合作-深度研究
- 4-2-電商文案開頭、結尾、正文的寫作
- 2025年廣州水務投資集團有限公司招聘筆試參考題庫含答案解析
- 2025年江蘇揚州水利建筑工程公司招聘筆試參考題庫含答案解析
- 合肥濱湖濕地森林公園觀光火車項目設計方案
- 4-2 討論:你是否支持設計試管嬰兒 說課稿-高二下學期生物滬科版選擇性必修3
- 高校太極拳傳承困境及對策研究
- 皮膚瘀斑的護理查房
- 《視網膜靜脈阻塞》課件
- 大學假期安全教育班會
- 小學生手工串珠教學課件
評論
0/150
提交評論