




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Cisco asa 5500 配置Cisco Secure Desktop (CSD) on ASA for Windows Configuration Example using ASDM1. Download the CSD software securedesktop-asa*.pkg and readme files onto yourmanagement station from the Cisco Software Download website.2. Log in to ASDM and click the Configuration button. From the left
2、Manager button, and click the Cisco Secure Desktop link., click the CSD3. Click Upload to display the Upload Image window.a. Either enter the path of the new .pkg file on the management station or clickBrowse Local Files to locate file.b. Either enter the location on flash in which to place the file
3、 or click Browse Flash.c. Click Upload File.d. When prompted, click OK > Close > OK.4. Once the client image is loaded to flash, check the Enable SSLand then click Apply.5. Click Save, and then click Yes to accept the changes.Client check box,Define Windows LocationsComplete these steps to def
4、ine Windows Locations.1. Click the Configuration button.2. From the leftlink., click the CSD Manager button, and click the Cisco Secure Desktop3. From the navigation pane, click Windows Location Settings.4. Type a location name in the Location to Add field and click Add.Note the three locations in t
5、his example: Office, Home, and Others.o Office represents workstations that are located inside the security boundary of the corporation.o Home represents users who work from home.o Other represents any location other than the two locations mentioned.5. Create your own locations dependent on the layo
6、ut of your network architecture for sales, guests, partners, and others.6. As you create Windows Locations, the navigation pane expands with configurable modules for each new location. Click Apply All.7. Click Save, and then click Yes to accept the changes.Windows Location IdentificationComplete the
7、se steps to define Windows Location Identification.1. Identify the locations that were created in Define Windows Locations.2. To identify the location Office, click Office in the navigation pane.a. Uncheck Secure Desktop and Cache Cleaner because these are internal computers.b. Check Enable identifi
8、cation using IP criteria.c. Enter the IP address ranges of your internal computers.d. Check Enable identification using registry or file criteria. This differentiates internal office workers from the occasional guests on the network.3. Click Configure Criteria. A simple example of a file "DoNot
9、Delete.txt" is configured. This file must exist on your internal Windows computers and is simply a placeholder. You can also configure a Windows registry key to identify internal office computers. Click OK inthe Add File Criterion window. Click OK in the Registry and File Criteria window.4. Cli
10、ck Apply All in the Identification for Office window. Click Save, and then click Yes to accept the changes.5. To identify the location Home, click Home in the navigation pane.a. Check Enable identification using registry or file criteria.b. Click Configure Criteria.6. Home computer clients must have
11、 been configured with this registry key by an Administrator. Click OK in the Add Registry Criterion window. Click OK in the Registryand File Criteria window.7. Under Location Module, check Secure Desktop. Click Apply All in the Identification for Home window. Click Save, and then click Yes to accept
12、 the changes.8. To identify the location Other, click Other in the navigation pane.a. Check only the Cache Cleaner box and uncheck all other boxes.b. Click Apply All in the Identification for Other window.c. Click Save, and then click Yes to accept the changes.Configure Windows Location ModuleComple
13、te these steps to configure the modules under each of the three locations you created.1. For Office clients, do nothing since Secure Desktop and Cache Cleaner were not chosen in the previous steps. The ASDM application allows you to configure the Cache Cleaner even if it were not chosen in a previou
14、s step. Keep the default settings for the Officelocations.Note: TheFeature Policy is not discussed in this step, but it will be discussed in asubsequent step for all locations.2. For Home clients, click Home and Keystroke Logger in the navigation pane.a. In the Keystroke Logger window, check Check f
15、or keystroke loggers.b. Click Apply All in the Keystroke Logger window.c. Click Save, and then click Yes to accept the changes.3. Under Home, choose Cache Cleaner and the parameters to suit your environment.4. Under Home, choose Secure Desktop General and the parameters to suit yourenvironment.5. Un
16、der Home, choose Secure Desktop Settings.a. Check Allowapplications to work transparently, and configure the othersettings to suit your environment.b. Click Apply All.c. Click Save, and then click Yes to accept the changes.Configure Windows Location FeaturesConfigure theFeature policy for each of th
17、e locations you created.1. In the navigation pane, clickOffice, and then click2. Click the Group-Based Policy tab.Feature Policy.a. Click the Always use Success Group-Policy radio button.b. Click the Web browsing tab, and check the Always Enabled radio button.c. Follow the same procedure for the Fil
18、e access, Port forwarding, and Full tunneling tabs.d. Click Apply All.e. Click Save, and then click Yes to accept the changes.3. For Home users, each corporation can require specific policies before access is allowed. Inthe navigation pane, click Home, and clicka. Click the Group-Based Policy tab.Fe
19、ature Policy.b. Click the Use Success Group-Policy radio button if preconfigured criteria match,such as a specific registry key, known file name, or digitalc. Check theLocation Module checkbox and choose Secure Desktop.d. Choose the Anti-, Anti-Spyware, Firewall, and OS areas in accordancewith your
20、company security policy. Home users will not be allowed onto thenetwork unless their computers meet your configured criteria.4. In the navigation pane, click Other and clicka. Click the Group-Based Policy tab.Feature Policy.b. Click the Always use Success Group-Policy radio button.5. For clients in
21、thisFeature Policy location, click the Web Browsing tab, and click theAlways Enabled radio dial.a. Click the File Access tab, and click the Disable radio button.b. Repeat the step with the Port Forwarding and Full Tunneling tabs.c. Click Apply All.d. Click Save, and then click Yes to accept the chan
22、ges.Optional Configurations for Windows CE, Macintosh, and Linux ClientsThese configurations are optional.1. If you choose Windows CE from the navigation pane, check the Web browsing checkbox.2. If you choose Mac and Linux Cache Cleaner from the navigation pane, check theLaunch cleanup upon global t
23、imeout radio dial.a. Change the timeout to your specification.b. Under theFeature Policy area, check the Web browsing , File access, andPort forwarding radio dials for these clients.3. Whether you choose Windows CE or Mac and Linux Cache Cleaner, click Apply All.4. Click Save, and then click Yes to
24、accept the changes.ConfigureConfigurationThis configuration reflects the changes ASDM made to enable CSD: Most of the CSDconfigurations are kept in a separate file on flash.Ciscoasaciscoasa#show running-config Building configuration.ASA Version 7.2(1)!hostname ciscoasa domain-name enable password 2K
25、FQnbNIdI.2KYOU encrypted names!interface Ethernet0/0 nameif outside security-level 0ip address 60 !interface Ethernet0/1 nameif inside security-level 100ip address !interface Ethernet0/2 shutdownno nameifno security-level no ip address!interface Managemen
26、t0/0 shutdownno nameifno security-level no ip address management-only!passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passivedns server-group DefauNS domain-name no pager logging enablelogging asdm informational mtu outside 1500mtu inside 1500!- ASDM location on disk0asdm image disk0:/asdm521.bin no asdm
27、 history enablearp timeout 14400 nat-controltimeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:000:05:00-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00sip-disconnect 0:02:00timeout uauth 0:05:00 abso
28、lute!- some group policy attributes group-policy GroupPolicy1 internal group-policy GroupPolicy1 attributes-tunnel-protocol IPSec l2tp-ipsec web webfunctions url-entry file-access file-entry file-browsingusername user1 password mbO2jYs13AXlIAGa encrypted privilege 15username user1 attributes-group-p
29、olicy GroupPolicy1username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15username cisco attributes-group-policy DfltGrpPolicy webport-forward noneport-forward-name value Application Access http server enablehttp insideno snmp-server locationno snmp-server contactsnmp-s
30、erver enable traps snmp authentication linkup linkdown coldstart!- tunnel group informationtunnel-group DefaultWEBGroup general-attributes default-group-policy GroupPolicy1tunnel-group DefaultWEBGroup web-attributes hic-fail-group-policy GroupPolicy1nbns-server 0 timeout 2 retry 2telnet timeout 5ssh timeout 5console timeout 0!class-map inspecti
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025山西航空产业集团有限公司校园招聘(第一批)43人笔试参考题库附带答案详解
- 2025四川雅安市宝兴县兴绿林业投资有限公司招聘(第二批)2人笔试参考题库附带答案详解
- 纺织行业考生的学习信念试题及答案
- 纺织工程师项目执行规范试题及答案
- 客房入股合同协议书
- 推拿合同协议书
- 施工安全合同协议书
- 店员处罚合同协议书
- 企业合同协议书
- 工程合同终止协议书
- DL∕T 1099-2009 防振锤技术条件和试验方法
- 2024年春七年级历史下册 第一单元 隋唐时期 繁荣与开放的时代 第1课 隋朝的统一与灭亡教案 新人教版
- 2024年生态环境部黄河流域生态环境监督管理局直属事业单位招聘9人高频考题难、易错点模拟试题(共500题)附带答案详解
- IQC来料不合格品处理流程管理规定
- 2023年拍卖师考试真题模拟汇编(共469题)
- 公立医院运营分析总结报告
- MOOC 引领世界的中国乒乓-西南交通大学 中国大学慕课答案
- 低碳示范区评价技术规范低碳景区
- 语法填空谓语和非谓语动词解题技巧课件(共16张)
- 人教版七年级上册数学《整式的加减》单元作业设计
- (2024年)劳动法课件劳务派遣
评论
0/150
提交评论