Cisco 3005 - VPN Concentrator - Gateway Uživatelský manuál Strana 3

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 10
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 2
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 10
Zero-Touch Remote
Administration
Central site configuration provides integration, with no administration on the remote client side needed
Supported operating systems: Microsoft Windows 2000 and Windows XP
Advanced Endpoint Security with the Cisco Secure Desktop Minimizes the Risk of Data Theft
SSL VPN deployments enable universal access from both secure and non-corporate-managed endpoints, as well as the ability to extend
network resources to diverse user communities. With this extension of the network, the points for potential network security attacks also
increase. Whether users are accessing the network from a corporate-managed PC, personal machine, or public terminal, the Cisco Secure
Desktop seeks to minimize data leakage from the SSL session.
The Cisco Secure Desktop Host Integrity Verification feature performs pre-connection posture assessment to verify that the endpoint
seeking access possesses the particular antivirus, firewall, and OS or service pack features required, and detects certain installed malware
before granting access to the network. The Cisco Secure Desktop then creates a secure vault for session information by generating a virtual
“sandbox”, on the machine. During the session, information is encrypted and written to the Cisco Secure Desktop partition on the hard
drive. At the close of the session, the secure vault is eradicated using a U.S. Department of Defense (DoD) sanitization algorithm. Session
information, including cache files, history, cookies, file downloads, and passwords are encrypted in real time, reducing the risk that data is
left behind. This feature is unique from many comparable cache cleaning products that attempt a post-session cleanup of tracked files.
Similarly, the automatic timeout features of the Cisco Secure Desktop help ensure that session information is erased, whether or not the
user takes the active role in terminating the session. The Cisco Secure Desktop can often run with guest permissions, providing advanced
protection on endpoints regardless of Web settings, browser types, or system privileges.
Table 2 lists features of Cisco Secure Desktop.
Table 2. Cisco Secure Desktop: Comprehensive Security of Information from the Network to the Endpoint
Feature Description
Available with Guest Permissions Users accessing the network from remote machines may not have administrator privileges on all systems. Cisco Secure
Desktop can often be installed with only guest permissions, helping to ensure delivery and installation on all systems.
Pre-Connection Posture Assessment Host Integrity Verification checking detects the presence of antivirus software, personal firewall software, and Windows
service packs on the endpoint system prior to granting network access.
Comprehensive Session Protection Additional protection is provided for all data associated with the session, including passwords, file downloads, history,
cookies, and cache files. Session data is encrypted to the secure vault of the Cisco Secure Desktop.
End-of-Session Data Cleanup Data in the secure vault is overwritten at the end of the session.
Keystroke Logger Detection Performs an initial check for certain software-based keystroke logging software at the start of the session. If an
anomalous program begins running inside the secure vault, after session initiation, the user is prompted to stop the
suspicious activity.
Terminal Server Support for Citrix
Businesses are experiencing a growing need to provide remote access to corporate information—securely, reliably, immediately, and with
increasing cost efficiency. To minimize costs while maximizing remote connectivity options, many businesses are centralizing their
application management and distribution to allow access to internal computing resources through a terminal server architecture. For this
reason, it is important that a robust remote-access solution support Citrix deployments with a simple, dependable, and easy-to-use protocol,
while providing a local system-based experience for application use. Typical SSL solutions require either a software client or the existence
of an applet download (Java or ActiveX) to access internal terminal server resources; this slows application initiation and creates potential
access problems, due to software conflicts or browser settings. Cisco VPN 3000 Series Concentrators provide truly clientless Citrix support
without relying on additional Java-based port forwarding mechanisms, delivering rapid and highly stable system access, regardless of
browser or security settings.
Zobrazit stránku 2
1 2 3 4 5 6 7 8 9 10

Komentáře k této Příručce

Žádné komentáře