Cisco 5520 Configuration Guide - Page 7

About This Guide - series

Page 7 highlights

About This Guide Refer to the following sections to understand the audience, topics, and conventions in this guide, and the titles of related documents. Subsequent sections describe how to obtain documentation, provide feedback, learn about Cisco product security, report security problems, and obtain technical assistance. Audience and Scope Written for network managers and administrators, this guide describes how to install, configure, and enable Cisco Secure Desktop (CSD) on a Cisco ASA 5500 Series security appliance to provide a safe computing environment through which clients can connect from a variety of locations. This guide describes how to specify the types of locations from which Microsoft® Windows users connect, the criteria used to identify those locations, and the access rights and restrictions to assign to clients that match the location criteria. It also describes how to configure features to support Windows CE, Macintosh, and Linux clients. Organization and Use Table 1 describes the contents of this guide. Table 1 Document Organization Topic Purpose Installing or Upgrading the Describes how to obtain the CSD software, and install or upgrade it. CSD Software Enabling and Disabling CSD Describes how to enable or disable remote client access to CSD. Introduction Describes CSD capabilities, how to access the Secure Desktop Manager (the browser-enabled interface for CSD administrators), how to navigate the Secure Desktop Manager, and how to save configuration changes. Tutorial Steps you through an example configuration to provide an overview of how to deploy CSD, and introduces you to the security decisions that you need to make to best accommodate your users and secure your network. OL-8607-02 Cisco Secure Desktop Configuration Guide vii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

vii
Cisco Secure Desktop Configuration Guide
OL-8607-02
About This Guide
Refer to the following sections to understand the audience, topics, and conventions in this guide, and the
titles of related documents. Subsequent sections describe how to obtain documentation, provide
feedback, learn about Cisco product security, report security problems, and obtain technical assistance.
Audience and Scope
Written for network managers and administrators, this guide describes how to install, configure, and
enable Cisco Secure Desktop (CSD) on a Cisco ASA 5500 Series security appliance to provide a safe
computing environment through which clients can connect from a variety of locations.
This guide describes how to specify the types of locations from which Microsoft
®
Windows users
connect, the criteria used to identify those locations, and the access rights and restrictions to assign to
clients that match the location criteria. It also describes how to configure features to support
Windows CE, Macintosh, and Linux clients.
Organization and Use
Table 1
describes the contents of this guide.
Table 1
Document Organization
Topic
Purpose
Installing or Upgrading the
CSD Software
Describes how to obtain the CSD software, and install or upgrade it.
Enabling and Disabling CSD
Describes how to enable or disable remote client access to CSD.
Introduction
Describes CSD capabilities, how to access the Secure Desktop
Manager (the browser-enabled interface for CSD administrators), how
to navigate the Secure Desktop Manager, and how to save
configuration changes.
Tutorial
Steps you through an example configuration to provide an overview of
how to deploy CSD, and introduces you to the security decisions that
you need to make to best accommodate your users and secure your
network.