Cisco 5520 Configuration Guide

Cisco 5520 - ASA IPS Edition Bundle Manual

Cisco 5520 manual content summary:

  • Cisco 5520 | Configuration Guide - Page 1
    Cisco Secure Desktop Configuration Guide for Cisco ASA 5500 Series Administrators Software Release 3.1.1 October 2006 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part
  • Cisco 5520 | Configuration Guide - Page 2
    addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Secure Desktop Configuration Guide © 2006 Cisco Systems, Inc. All rights
  • Cisco 5520 | Configuration Guide - Page 3
    Information xiii Installing or Upgrading the CSD Software 1-1 Enabling and Disabling CSD 2-1 Using CLI to Enable or Disable CSD 2-1 Using ASDM to Enable or Disable CSD 2-3 Introduction 3-1 CSD Capabilities 3-1 Navigation 3-2 Saving and Resetting the Running CSD Configuration 3-5 Tutorial 4-1 Step
  • Cisco 5520 | Configuration Guide - Page 4
    that Match Location Criteria 5-13 Configuring a VPN Feature Policy for a Location 5-13 Configuring a Group-based Policy for a Location 5-13 Configuring Web Browsing, File Access, Port Forwarding, and Full Tunneling VPN Policies for a Location 5-16 Configuring Keystroke Logger for a Location 5-19
  • Cisco 5520 | Configuration Guide - Page 5
    Desktop? A-6 Networking and Firewall Questions A-6 Does the Secure Desktop or Cache Cleaner detect a second network card for location determination? A-6 I am using a personal firewall. What application must I "Allow" to access the network? A-6 OL-8607-02 Cisco Secure Desktop Configuration Guide v
  • Cisco 5520 | Configuration Guide - Page 6
    Contents INDEX Cisco Secure Desktop Configuration Guide vi OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 7
    , learn about Cisco product security, report security problems, and obtain technical assistance. Audience and Scope Written for network managers and administrators, this guide describes how to install, configure, and enable Cisco Secure Desktop (CSD) on a Cisco ASA 5500 Series security appliance to
  • Cisco 5520 | Configuration Guide - Page 8
    the Cisco ASA 5500 Series • Cisco ASA 5500 Series Hardware Installation Guide • Migrating to ASA for VPN 3000 Concentrator Series Administrators • Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide for the ASA 5510, ASA 5520, and ASA 5540 • Cisco Security Appliance Command Line
  • Cisco 5520 | Configuration Guide - Page 9
    About This Guide Obtaining Documentation • Selected ASDM VPN Configuration Procedures for the Cisco ASA 5500 Series • Cisco Security Appliance Logging Configuration and System Log Messages Obtaining Documentation Cisco documentation and additional literature are available on Cisco.com. This
  • Cisco 5520 | Configuration Guide - Page 10
    expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Cisco Secure Desktop Configuration Guide x OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 11
    the All Tools (A-Z) tab, and then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search options: by product ID or model name; by tree view; or, for certain products, by copying and pasting OL-8607-02 Cisco Secure Desktop Configuration Guide xi
  • Cisco 5520 | Configuration Guide - Page 12
    is severely degraded, or significant aspects of your business operations are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation. Cisco Secure Desktop Configuration Guide xii OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 13
    key features, sample part numbers, and abbreviated technical specifications for many Cisco products that are sold through channel partners. It is updated twice a year and includes the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go
  • Cisco 5520 | Configuration Guide - Page 14
    Obtaining Additional Publications and Information About This Guide • World-class networking training is available from Cisco. You can view current offerings at this URL: http://www.cisco.com/en/US/learning/index.html Cisco Secure Desktop Configuration Guide xiv OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 15
    or Upgrading the CSD Software CSD Release 3.1 requires that you install ASA Release 7.1.1 and ASDM Release 5.1.1 or later. Note You do not need to boot the security appliance after you install the CSD software. Install or upgrade the Cisco Secure Desktop (CSD) software as follows: Step 1 Step
  • Cisco 5520 | Configuration Guide - Page 16
    Figure 1-1 CSD Manager Not Installed Chapter 1 Installing or Upgrading the CSD Software Step 4 Click the "Cisco Secure Desktop" link. ASDM opens the Configuration > VPN > WebVPN > CSD Setup pane (Figure 1-2). Cisco Secure Desktop Configuration Guide 1-2 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 17
    installed in the ASA 5500. ASDM opens the Upload Image dialog box. Click Browse Local to prepare to select the file on your local PC. The Selected File Path dialog box displays the contents of the latest, local folder you accessed (Figure 1-3). OL-8607-02 Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 18
    Chapter 1 Installing or Upgrading the CSD Software Figure 1-3 Select File Path (Upload Image) Step 7 Step 8 Step 9 Flash to specify the target directory for the file. The Browse Flash Dialog box displays the contents of the flash card (Figure 1-4). Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 19
    message: File is uploaded to flash successfully. Step 13 Step 14 Click OK. ASDM closes the dialog box, transfers a copy of the file to the flash card, and removes the text from the fields in the Upload Image dialog box. Click Close. OL-8607-02 Cisco Secure Desktop Configuration Guide 1-5
  • Cisco 5520 | Configuration Guide - Page 20
    Use disk0:/securedesktop_asa_n_n.pkg as your new current image? Step 15 Click OK to install the CSD software. The Uninstall CSD dialog box opens if the installed image in the Secure Desktop Image field. Refer to "Enabling and Disabling CSD" to continue. Cisco Secure Desktop Configuration Guide 1-6
  • Cisco 5520 | Configuration Guide - Page 21
    from the flash device to the running configuration. If you transfer or replace the data.xml file, disable and then enable CSD to load the file. You can enter the following CLI command in privileged EXEC mode to display the status of the CSD image: show webvpn csd EXAMPLE F1-asa1(config)# show webvpn
  • Cisco 5520 | Configuration Guide - Page 22
    (config-webvpn)# csd enable F1-asa1(config-webvpn)# Enter write memory to save the running configuration. For example, F1-asa1(config-webvpn)# F1-asa1(config-webvpn)# write memory Building configuration... Cryptochecksum: 71fa1950 45b7f82f 12b4e7c1 934111bb Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 23
    CSD Setup pane opens (Figure 2-1). Figure 2-1 CSD Setup (Enable/Disable) Note The Secure Desktop Image field displays the image (and version) that is currently installed. The Enable Secure Desktop check box indicates whether CSD is enabled. OL-8607-02 Cisco Secure Desktop Configuration Guide 2-3
  • Cisco 5520 | Configuration Guide - Page 24
    Using ASDM to Enable or Disable CSD Chapter 2 Enabling and Disabling CSD Step 2 Check or uncheck Enable Secure Desktop and click Apply. ASDM enables or disables CSD. Cisco Secure Desktop Configuration Guide 2-4 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 25
    in order to secure enterprise networks and data. You can configure System Detection to confirm the presence of the CSD modules Secure Desktop or Cache Cleaner; and antivirus software, antispyware software, personal firewall software, and/or the Microsoft® Windows operating system and service packs
  • Cisco 5520 | Configuration Guide - Page 26
    DHCP-assigned IP addresses within a corporate address range connect from the Work location. After you create a location, you can configure the VPN Feature Policy, Keystroke Logger, Cache Cleaner, and Secure Desktop features for that location. Cisco Secure Desktop Configuration Guide 3-2 OL-8607
  • Cisco 5520 | Configuration Guide - Page 27
    Cleaner - Click to configure the Cache Cleaner and a VPN Feature Policy (enable or restrict web browsing, remote server file access, and port forwarding) for Macintosh and Linux clients. Note Port forwarding permits the use of the Secure Desktop to connect a client application installed on the local
  • Cisco 5520 | Configuration Guide - Page 28
    , you might configure a secure location to provide full access rights - web browsing, remote server file access, port forwarding, and full VPN tunneling - but limit an insecure location to web browsing. Windows locations allow deployment of the Secure Desktop functions on a location-specific basis
  • Cisco 5520 | Configuration Guide - Page 29
    /data.xml file. Use these buttons as follows: • To save the running CSD configuration to the data.xml file, click Apply All. • To overwrite all settings in the running CSD configuration with those stored in the data.xml file, click Reset All. OL-8607-02 Cisco Secure Desktop Configuration Guide 3-5
  • Cisco 5520 | Configuration Guide - Page 30
    Saving and Resetting the Running CSD Configuration Chapter 3 Introduction Cisco Secure Desktop Configuration Guide 3-6 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 31
    security policies to assign to those criteria. In addition, because it is physically impossible to ensure 100 percent removal of all data sent to a remote system, organizations may use Cisco Secure Desktop to minimize access to trusted assets. OL-8607-02 Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 32
    session to the next. If you enable this option, users must enter a password (up to 127 characters in length) when CSD creates the Secure Desktop. - Advanced features require company antivirus software, company antispyware, company firewall, and Windows 2000 Service Pack 4 or Windows XP - Check for
  • Cisco 5520 | Configuration Guide - Page 33
    in the menu on the left. The Identification pane opens. Check Enable identification using Registry or File criteria. Add a registry criteria such as, "HKEY_LOCAL_MACHINE\SOFTWARE\Company exists." Do not deploy a security module because the hosts in this location are inside the office; uncheck both
  • Cisco 5520 | Configuration Guide - Page 34
    to "Use Module." Click Apply All to save the running CSD configuration to the flash device. Step Three: Configure Windows Location Modules This section describes how to customize the CSD deployment for each location. Each location in the menu has six options: VPN Feature Policy, Keystroke Logger
  • Cisco 5520 | Configuration Guide - Page 35
    Chapter 4 Tutorial Figure 4-1 Secure Desktop General Step Three: Configure Windows Location Modules Step 5 Step 6 Step 7 Step 8 Check Enable switching between Secure Desktop and Local Desktop. Check Enable Vault Reuse. Uncheck Enable Secure Desktop inactivity timeout. With this attribute
  • Cisco 5520 | Configuration Guide - Page 36
    Step Four: Configure Windows Location Features Chapter 4 Tutorial Click Apply All to save the running CSD configuration to the flash device. Step Four: Configure Windows Location Features CSD creates security modules for each location when you create it. Refer to the following sections to specify
  • Cisco 5520 | Configuration Guide - Page 37
    , Port Forwarding, and Full Tunneling are unchecked. Click OK. See the option descriptions in "Configuring a VPN Feature Policy for a Location" for more information. Click Apply All to save the running CSD configuration to the flash device. OL-8607-02 Cisco Secure Desktop Configuration Guide 4-7
  • Cisco 5520 | Configuration Guide - Page 38
    ON. Set Port Forwarding to OFF. See the option descriptions in "Setting Up CSD for Macintosh and Linux Clients" for more information about the settings in this window. Click Apply All to save the running CSD configuration to the flash device. Cisco Secure Desktop Configuration Guide 4-8 OL-8607
  • Cisco 5520 | Configuration Guide - Page 39
    a configuration that meets the security requirements of your network. Click Windows Location Settings in the menu on the left to define the location-based settings (also called adaptive policies) for CSD. Figure 5-1 shows the default settings. OL-8607-02 Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 40
    web if the Secure Desktop installation fails or the remote client PC does not match any of the configured locations criteria. In the interest of security, we recommend that you do not check this option. By default, this attribute is unchecked. Cisco Secure Desktop Configuration Guide 5-2 OL-8607
  • Cisco 5520 | Configuration Guide - Page 41
    not match any of the configured locations criteria. In the interest of security, we recommend that you do not check this option. By default, this attribute is unchecked. • Port forwarding-Check to let the remote user connect a client application installed on the local PC to the TCP/IP port of a peer
  • Cisco 5520 | Configuration Guide - Page 42
    -Check if you want to require the Cache Cleaner to be present on the remote client as a criterion for assigning this location entry. • Both Secure Desktop and Cache Cleaner-Leave unchecked to let CSD apply the configured VPN feature policy. Cisco Secure Desktop Configuration Guide 5-4 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 43
    certificates, see the "Frequently Asked Questions" section on page A-1. Use one of the following instructions to examine the certificate Subject and Issuer fields to identify the values to be completed in the Issuer field of the certificate. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-5
  • Cisco 5520 | Configuration Guide - Page 44
    the value you specified in the "Issued By" field • Value in the Issuer field that matches the value you specified in the "Issued To" field Cisco Secure Desktop Configuration Guide 5-6 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 45
    7 Open the Control Panel. Choose IP address ranges. CSD checks the IP addresses of remote client PCs trying to connect. If a client has an address within the specified range, CSD assigns the properties of the location to the remote client. OL-8607-02 Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 46
    do so, it becomes a double, horizontal arrow. Drag the arrow to the left or right to expose the contents of the column. Refer to the section that identifies the type of criteria you would like to configure: • Registry Criteria • File Criteria Cisco Secure Desktop Configuration Guide 5-8 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 47
    strings. Step 2 Click one radio button from the following list and assign the associated values: • Exists-Click if the mere presence of the named registry key on the remote client PC is sufficient to match the location you are configuring. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-9
  • Cisco 5520 | Configuration Guide - Page 48
    satisfy the requirement you are configuring. String value menu-Choose one of the following options to specify the relationship of the String value of the registry key to the value to be entered to the right: - contains - differs - matches 5-10 Cisco Secure Desktop Configuration Guide OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 49
    protective software application is active: HKEY_LOCAL_MACHINE\SOFTWARE\< of a specific file as a criterion for assigning the location you are configuring for the remote Refer to the subsequent attribute descriptions for examples File paths. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-11
  • Cisco 5520 | Configuration Guide - Page 50
    radio button from the following list and assign the associated values: • Exists-Click if the file must be present on the remote client PC to assign the location you are configuring. EXAMPLE Click Exists to ensure the following security application is installed: C:\Program Files\
  • Cisco 5520 | Configuration Guide - Page 51
    a VPN Feature Policy for a Location CSD applies the configured VPN feature policy if you choose neither the Secure Desktop nor the Cache Cleaner location modules in the Identification for pane (Figure 5-2). Use the instructions in the following sections to configure the VPN feature policy
  • Cisco 5520 | Configuration Guide - Page 52
    access rights that are more limited than those associated with the success group policy. With this option set, CSDM dims the attributes in the Criteria area. If you click this radio button, you cannot change other settings on this tab. 5-14 Cisco Secure Desktop Configuration Guide OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 53
    is not active, the client fails the VPN feature policy criteria check. Step 4 Check Anti-Virus, Anti-Spyware, Firewall, and OS if you want to require their presence as conditions for assigning the success group policy. If you enable more than one category, the end user's computer must pass in each
  • Cisco 5520 | Configuration Guide - Page 54
    Note For the complete list of applications checked by System Detection, see Figure 5-7 or refer to "System Detection Questions." Click Apply All to save the running CSD configuration. Configuring Web Browsing, File Access, Port Forwarding, and Full Tunneling VPN Policies for a Location This section
  • Cisco 5520 | Configuration Guide - Page 55
    is the default VPN policy setting for web browsing, file access, port forwarding, and full tunneling. If set, CSDM dims the attributes in the Criteria area. If you click this radio button, you cannot change other settings on this tab; your configuration of a VPN policy for this feature ends at this
  • Cisco 5520 | Configuration Guide - Page 56
    this tab; your configuration of a VPN policy for this feature ends at this step. • Enabled if criteria match to make the feature available to the remote the personal firewall requirement. • OS-Check to enable System Detection for the presence of a particular operating system and service pack. CSD
  • Cisco 5520 | Configuration Guide - Page 57
    Setting Up CSD for Microsoft Windows Clients Configuring the Secure Desktop for Clients that Match Location Criteria Note For the complete list of applications checked by System Detection, see Figure 5-8 or refer to "System Detection Questions." Configuring Keystroke Logger for a Location You can
  • Cisco 5520 | Configuration Guide - Page 58
    next to all of the keystroke loggers in the list to indicate they are safe. Otherwise, the user must terminate the session. Note Unchecking this attribute deactivates but does not delete the contents of the "List of Safe Modules" window. 5-20 Cisco Secure Desktop Configuration Guide OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 59
    the dialog box and lists the entry in the List of Safe Modules window. Note To remove a program from the list, click the entry in the "Path of safe modules" list, then click Delete. Step 6 Click Apply All to save the configuration changes. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-21
  • Cisco 5520 | Configuration Guide - Page 60
    pane appears. Figure 5-11 shows the default settings. Figure 5-11 Cache Cleaner for Windows This window lets you configure the Cache Cleaner for the associated location only. Check the following fields as required by your security policy: • Launch hidden URL after installation-Check to use a URL
  • Cisco 5520 | Configuration Guide - Page 61
    to save the running CSD configuration. Configuring Secure Desktop General for a Location Click Secure Desktop General under the location name to enable or disable the Secure Desktop features and customize the user experience. The Secure Desktop General pane appears. Figure 5-12 shows the default
  • Cisco 5520 | Configuration Guide - Page 62
    risk is a bigger issue than the deployment advantages of the alternative. Operating System limitations may prevent CSD from enforcing prevention of desktop switching, even if you disable this feature. You can configure both the Secure Desktop component of CSD and Cisco SSL VPN Client (SVC) to run
  • Cisco 5520 | Configuration Guide - Page 63
    " window. • Do not encrypt files on removable drives-Check to prevent the user from saving encrypted files onto portable drives while on the Secure Desktop. The Secure Desktop Manager dims this attribute if you check the previous attribute. OL-8607-02 Cisco Secure Desktop Configuration Guide 5-25
  • Cisco 5520 | Configuration Guide - Page 64
    transparent or nontransparent files from outside of Outlook, such as from a Windows Explorer window, during a Secure Desktop session removes the file only from the Secure Desktop. Click Apply All to save the running CSD configuration. 5-26 Cisco Secure Desktop Configuration Guide OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 65
    Browser pane appears. Figure 5-14 shows the default settings. Figure 5-14 Secure Desktop Browser For the duration of the CSD session, the browser does not list the user's bookmarks or favorites. It lists only the ones shown in this pane. Configure the Secure Desktop Browser as follows: Step
  • Cisco 5520 | Configuration Guide - Page 66
    Configuring the Secure Desktop for Clients that Match Location Criteria Chapter 5 Setting Up CSD for Microsoft Windows Clients 5-28 Cisco Secure Desktop Configuration Guide OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 67
    supports only web browsing by clients in unknown locations and access outside of the CSD environment. • File Access-Check to let the remote user use the Secure Desktop to access files on a remote server. Click Apply All to save the running configuration to the flash device. OL-8607-02 Cisco Secure
  • Cisco 5520 | Configuration Guide - Page 68
    Chapter 6 Setting Up CSD for Microsoft Windows CE Clients Cisco Secure Desktop Configuration Guide 6-2 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 69
    Linux Clients CSD supports the Cache Cleaner and VPN feature policy for remote clients running Macintosh or Linux. To configure the Secure Desktop experience configure both the Cache Cleaner and VPN feature policy for all Mac and Linux clients. OL-8607-02 Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 70
    -Check to permit the use of the Secure Desktop to connect a client application installed on the local PC to the TCP/IP port of a peer application on a remote server. Click Apply All to save the running configuration to the flash device. Cisco Secure Desktop Configuration Guide 7-2 OL-8607-02
  • Cisco 5520 | Configuration Guide - Page 71
    settings in the Secure Desktop Manager, you must deploy those settings by clicking the Apply All button in CSDM. The settings take effect the next time that a user starts either the Cache Cleaner application or the Secure Desktop application. OL-8607-02 Cisco Secure Desktop Configuration Guide A-1
  • Cisco 5520 | Configuration Guide - Page 72
    , CSD saves the data to a Vault or erases it from the disk. Also, CSD uninstalls the Secure Desktop software if you configure it to do so. Do Macintosh and Linux have a timeout setting? Yes, you can set a time-out for the Macintosh & Linux Cache Cleaner. Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 73
    an end user use the Vault after downloading it the first time? Once you have downloaded and installed the Secure Desktop, it appears as an entry in the Start menu. Users who want to reuse the Vault can click Start > Programs > Cisco Secure Desktop and enter the password with which they protected the
  • Cisco 5520 | Configuration Guide - Page 74
    support? The personal firewall applications that System Detection checks for includes: - Cisco Security Agent (4.0 to 4.5) - Internet Connection Firewall (ICF) (Windows XP to XP SP2) - ISS BlackICE PC Protection (3.6) - McAfee Personal Firewall (4.0 to 5.0) Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 75
    and plug-ins > Enable To launch Java using the Microsoft Virtual Machine: • Scripting > Active scripting > Enable • Scripting > Scripting of Java applets > Enable • ActiveX controls and plug-ins > Download signed ActiveX controls > Enable OL-8607-02 Cisco Secure Desktop Configuration Guide A-5
  • Cisco 5520 | Configuration Guide - Page 76
    How long can the password be for Vault reuse? The password can be up to IP address of the first network card. I am using a personal firewall. What application must I "Allow" to access the network? You must allow the program main.exe to access the network. Cisco Secure Desktop Configuration Guide
  • Cisco 5520 | Configuration Guide - Page 77
    (CBC) A-6 Cisco Security Agent A-4 Clean the whole cache in addition to the current session cache, attribute 5-22 CN certificate field 5-5, 5-6, 5-7 command prompt, disable 5-26 configuration example See tutorial configuration settings, transfer to another security appliance 3-5 Customize bookmarks
  • Cisco 5520 | Configuration Guide - Page 78
    CE 6-1 File access VPN Feature Policy, Windows installation failure 5-3 VPN Feature Policy, Windows installation success 5-16 file criteria 5-4, 5-8 firewall A-6 Firewall, attribute 5-16, 5-18 folders in favorites or bookmarks 5-27 Force admin control on list of safe modules, attribute 5-20 Force
  • Cisco 5520 | Configuration Guide - Page 79
    5-22, 5-24 insecure location, example configuration 4-2, 5-1 installing CSD 1-1 to 1-6 Internet Connection Firewall (ICF) A-4 Internet Explorer settings on client A-5 IP address range 5-4, 5-7 ISS BlackICE PC Protection A-4 Issued By, attribute of Enable identification using certificate criteria
  • Cisco 5520 | Configuration Guide - Page 80
    5-24 prompt to uninstall 5-24 Settings window 3-4, 5-25 to 5-26 Use Module, attribute 5-4 security settings A-5 service packs A-5 Shift_JIS A-2 Show success message at the end of successful installation, attribute 5-22 SSL VPN Client 3-4, 5-3, 5-17, 5-24 String value, attribute of a registry key as
  • Cisco 5520 | Configuration Guide - Page 81
    5-2 success 5-16 Windows CE, menu option 6-1 Windows Location Settings examples 4-2 menu option 3-2, 5-1 Windows operating systems and service packs A-5 work, example configuration 4-2, 5-1 X xml 3-5 Z ZoneAlarm Personal Firewall A-5 OL-8607-02 Index Cisco Secure Desktop Configuration Guide IN-11
  • Cisco 5520 | Configuration Guide - Page 82
    Index IN-12 Cisco Secure Desktop Configuration Guide OL-8607-02
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Cisco Secure Desktop Configuration
Guide
for Cisco ASA 5500 Series Administrators
Software Release 3.1.1
October 2006
Text Part Number: OL-8607-02