網絡設備配置實訓教程昊提供資源第5章cisco asa5500_第1頁
網絡設備配置實訓教程昊提供資源第5章cisco asa5500_第2頁
網絡設備配置實訓教程昊提供資源第5章cisco asa5500_第3頁
網絡設備配置實訓教程昊提供資源第5章cisco asa5500_第4頁
網絡設備配置實訓教程昊提供資源第5章cisco asa5500_第5頁
已閱讀5頁,還剩21頁未讀 繼續免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、Cisco asa 5500 配置Cisco Secure Desktop (CSD) on ASA for Windows Configuration Example using ASDM1. Download the CSD software securedesktop-asa*.pkg and readme files onto yourmanagement station from the Cisco Software Download website.2. Log in to ASDM and click the Configuration button. From the left

2、Manager button, and click the Cisco Secure Desktop link., click the CSD3. Click Upload to display the Upload Image window.a. Either enter the path of the new .pkg file on the management station or clickBrowse Local Files to locate file.b. Either enter the location on flash in which to place the file

3、 or click Browse Flash.c. Click Upload File.d. When prompted, click OK > Close > OK.4. Once the client image is loaded to flash, check the Enable SSLand then click Apply.5. Click Save, and then click Yes to accept the changes.Client check box,Define Windows LocationsComplete these steps to def

4、ine Windows Locations.1. Click the Configuration button.2. From the leftlink., click the CSD Manager button, and click the Cisco Secure Desktop3. From the navigation pane, click Windows Location Settings.4. Type a location name in the Location to Add field and click Add.Note the three locations in t

5、his example: Office, Home, and Others.o Office represents workstations that are located inside the security boundary of the corporation.o Home represents users who work from home.o Other represents any location other than the two locations mentioned.5. Create your own locations dependent on the layo

6、ut of your network architecture for sales, guests, partners, and others.6. As you create Windows Locations, the navigation pane expands with configurable modules for each new location. Click Apply All.7. Click Save, and then click Yes to accept the changes.Windows Location IdentificationComplete the

7、se steps to define Windows Location Identification.1. Identify the locations that were created in Define Windows Locations.2. To identify the location Office, click Office in the navigation pane.a. Uncheck Secure Desktop and Cache Cleaner because these are internal computers.b. Check Enable identifi

8、cation using IP criteria.c. Enter the IP address ranges of your internal computers.d. Check Enable identification using registry or file criteria. This differentiates internal office workers from the occasional guests on the network.3. Click Configure Criteria. A simple example of a file "DoNot

9、Delete.txt" is configured. This file must exist on your internal Windows computers and is simply a placeholder. You can also configure a Windows registry key to identify internal office computers. Click OK inthe Add File Criterion window. Click OK in the Registry and File Criteria window.4. Cli

10、ck Apply All in the Identification for Office window. Click Save, and then click Yes to accept the changes.5. To identify the location Home, click Home in the navigation pane.a. Check Enable identification using registry or file criteria.b. Click Configure Criteria.6. Home computer clients must have

11、 been configured with this registry key by an Administrator. Click OK in the Add Registry Criterion window. Click OK in the Registryand File Criteria window.7. Under Location Module, check Secure Desktop. Click Apply All in the Identification for Home window. Click Save, and then click Yes to accept

12、 the changes.8. To identify the location Other, click Other in the navigation pane.a. Check only the Cache Cleaner box and uncheck all other boxes.b. Click Apply All in the Identification for Other window.c. Click Save, and then click Yes to accept the changes.Configure Windows Location ModuleComple

13、te these steps to configure the modules under each of the three locations you created.1. For Office clients, do nothing since Secure Desktop and Cache Cleaner were not chosen in the previous steps. The ASDM application allows you to configure the Cache Cleaner even if it were not chosen in a previou

14、s step. Keep the default settings for the Officelocations.Note: TheFeature Policy is not discussed in this step, but it will be discussed in asubsequent step for all locations.2. For Home clients, click Home and Keystroke Logger in the navigation pane.a. In the Keystroke Logger window, check Check f

15、or keystroke loggers.b. Click Apply All in the Keystroke Logger window.c. Click Save, and then click Yes to accept the changes.3. Under Home, choose Cache Cleaner and the parameters to suit your environment.4. Under Home, choose Secure Desktop General and the parameters to suit yourenvironment.5. Un

16、der Home, choose Secure Desktop Settings.a. Check Allowapplications to work transparently, and configure the othersettings to suit your environment.b. Click Apply All.c. Click Save, and then click Yes to accept the changes.Configure Windows Location FeaturesConfigure theFeature policy for each of th

17、e locations you created.1. In the navigation pane, clickOffice, and then click2. Click the Group-Based Policy tab.Feature Policy.a. Click the Always use Success Group-Policy radio button.b. Click the Web browsing tab, and check the Always Enabled radio button.c. Follow the same procedure for the Fil

18、e access, Port forwarding, and Full tunneling tabs.d. Click Apply All.e. Click Save, and then click Yes to accept the changes.3. For Home users, each corporation can require specific policies before access is allowed. Inthe navigation pane, click Home, and clicka. Click the Group-Based Policy tab.Fe

19、ature Policy.b. Click the Use Success Group-Policy radio button if preconfigured criteria match,such as a specific registry key, known file name, or digitalc. Check theLocation Module checkbox and choose Secure Desktop.d. Choose the Anti-, Anti-Spyware, Firewall, and OS areas in accordancewith your

20、company security policy. Home users will not be allowed onto thenetwork unless their computers meet your configured criteria.4. In the navigation pane, click Other and clicka. Click the Group-Based Policy tab.Feature Policy.b. Click the Always use Success Group-Policy radio button.5. For clients in

21、thisFeature Policy location, click the Web Browsing tab, and click theAlways Enabled radio dial.a. Click the File Access tab, and click the Disable radio button.b. Repeat the step with the Port Forwarding and Full Tunneling tabs.c. Click Apply All.d. Click Save, and then click Yes to accept the chan

22、ges.Optional Configurations for Windows CE, Macintosh, and Linux ClientsThese configurations are optional.1. If you choose Windows CE from the navigation pane, check the Web browsing checkbox.2. If you choose Mac and Linux Cache Cleaner from the navigation pane, check theLaunch cleanup upon global t

23、imeout radio dial.a. Change the timeout to your specification.b. Under theFeature Policy area, check the Web browsing , File access, andPort forwarding radio dials for these clients.3. Whether you choose Windows CE or Mac and Linux Cache Cleaner, click Apply All.4. Click Save, and then click Yes to

24、accept the changes.ConfigureConfigurationThis configuration reflects the changes ASDM made to enable CSD: Most of the CSDconfigurations are kept in a separate file on flash.Ciscoasaciscoasa#show running-config Building configuration.ASA Version 7.2(1)!hostname ciscoasa domain-name enable password 2K

25、FQnbNIdI.2KYOU encrypted names!interface Ethernet0/0 nameif outside security-level 0ip address 60 !interface Ethernet0/1 nameif inside security-level 100ip address !interface Ethernet0/2 shutdownno nameifno security-level no ip address!interface Managemen

26、t0/0 shutdownno nameifno security-level no ip address management-only!passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passivedns server-group DefauNS domain-name no pager logging enablelogging asdm informational mtu outside 1500mtu inside 1500!- ASDM location on disk0asdm image disk0:/asdm521.bin no asdm

27、 history enablearp timeout 14400 nat-controltimeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:000:05:00-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00sip-disconnect 0:02:00timeout uauth 0:05:00 abso

28、lute!- some group policy attributes group-policy GroupPolicy1 internal group-policy GroupPolicy1 attributes-tunnel-protocol IPSec l2tp-ipsec web webfunctions url-entry file-access file-entry file-browsingusername user1 password mbO2jYs13AXlIAGa encrypted privilege 15username user1 attributes-group-p

29、olicy GroupPolicy1username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15username cisco attributes-group-policy DfltGrpPolicy webport-forward noneport-forward-name value Application Access http server enablehttp insideno snmp-server locationno snmp-server contactsnmp-s

30、erver enable traps snmp authentication linkup linkdown coldstart!- tunnel group informationtunnel-group DefaultWEBGroup general-attributes default-group-policy GroupPolicy1tunnel-group DefaultWEBGroup web-attributes hic-fail-group-policy GroupPolicy1nbns-server 0 timeout 2 retry 2telnet timeout 5ssh timeout 5console timeout 0!class-map inspecti

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論