Cisco 5520 Configuration Guide - Page 31

Tutorial - physical connectivity

Page 31 highlights

Tutorial CH A P T E R 4 CSD is a highly customizable suite of security tools that you can deploy in many different ways to secure remote systems and enforce your company's network security polices. Becoming familiar with the configuration procedure can help you understand the following: • How to deploy CSD • Which security decisions you need to make to best accommodate your users and secure your network Note This tutorial introduces you to the CSD configuration settings. Subsequent sections reinforce the instructions with detailed descriptions. The following sections guide you through the CSD configuration sequence: • Step One: Define Windows Locations • Step Two: Define Windows Location Identification • Step Three: Configure Windows Location Modules • Step Four: Configure Windows Location Features • Step Five: Configure Windows CE Features • Step Six: Configure Macintosh and Linux Features Step One: Define Windows Locations Begin configuring CSD by defining Windows locations. Windows locations apply to supported Microsoft Windows clients only; they do not apply to Windows CE, Macintosh, and Linux clients. Locations let you deploy an appropriately secure environment to hosts that connect through the VPN. They let you increase security on hosts that you determine are likely to be insecure, and offer flexibility to clients you determine are secure. You can restrict user privileges when they connect from unknown computers. You can also deploy the Secure Desktop and Cache Cleaner modules on insecure hosts to minimize session information that might contain confidential company information. We recommend that you consider the different types of hosts that will connect through the VPN before you determine the criteria needed to secure those hosts and the security policies to assign to those criteria. In addition, because it is physically impossible to ensure 100 percent removal of all data sent to a remote system, organizations may use Cisco Secure Desktop to minimize access to trusted assets. OL-8607-02 Cisco Secure Desktop Configuration Guide 4-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

CHAPTER
4-1
Cisco Secure Desktop Configuration Guide
OL-8607-02
4
Tutorial
CSD is a highly customizable suite of security tools that you can deploy in many different ways to secure
remote systems and enforce your company’s network security polices. Becoming familiar with the
configuration procedure can help you understand the following:
How to deploy CSD
Which security decisions you need to make to best accommodate your users and secure your
network
Note
This tutorial introduces you to the CSD configuration settings. Subsequent sections reinforce the
instructions with detailed descriptions.
The following sections guide you through the CSD configuration sequence:
Step One: Define Windows Locations
Step Two: Define Windows Location Identification
Step Three: Configure Windows Location Modules
Step Four: Configure Windows Location Features
Step Five: Configure Windows CE Features
Step Six: Configure Macintosh and Linux Features
Step One: Define Windows Locations
Begin configuring CSD by defining Windows locations. Windows locations apply to supported
Microsoft Windows clients only; they do not apply to Windows CE, Macintosh, and Linux clients.
Locations let you deploy an appropriately secure environment to hosts that connect through the VPN.
They let you increase security on hosts that you determine are likely to be insecure, and offer flexibility
to clients you determine are secure. You can restrict user privileges when they connect from unknown
computers. You can also deploy the Secure Desktop and Cache Cleaner modules on insecure hosts to
minimize session information that might contain confidential company information. We recommend that
you consider the different types of hosts that will connect through the VPN before you determine the
criteria needed to secure those hosts and the security policies to assign to those criteria. In addition,
because it is physically impossible to ensure 100 percent removal of all data sent to a remote system,
organizations may use Cisco Secure Desktop to minimize access to trusted assets.