Cisco S170 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro ne Cisco S170. Web Security with Cisco Ironport Web Security Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 117
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
BRKSEC-2101
Web Security Deployment
Follow us on Twitter for real time updates of the event:
@ciscoliveeurope, #CLEUR
Zobrazit stránku 0
1 2 3 4 5 6 ... 116 117

Shrnutí obsahu

Strany 1 - @ciscoliveeurope, #CLEUR

BRKSEC-2101 Web Security Deployment Follow us on Twitter for real time updates of the event: @ciscoliveeurope, #CLEUR

Strany 2 - Housekeeping

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 10 Web Application Control  Many Applications work on top of HTTP t

Strany 3 - Reference

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 100 Web Security & AnyConnect Configuration for Web Security wit

Strany 4

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 101 Web Security & AnyConnect Configuration – Client Profile Sc

Strany 5

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 102 Web Security & AnyConnect Configuration – Client Profile Ex

Strany 6 - Today‘s Websites

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 103 Web Security & AnyConnect Configuration – Client Profile Ac

Strany 7 - Appliance or Cloud?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 104 Web Security & AnyConnect Configuration – Client Profile Au

Strany 8

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 105 Web Security & AnyConnect Configuration – Config on ASA if u

Strany 9 - Reporting and tracking

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 106 Web Security & AnyConnect Configuration for Web Security wi

Strany 10 - Web Application Control

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 107 Beacon Server for the AnyConnect Web Security module  Beacon Se

Strany 11 - About Reputation

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 108 DEMO – AnyConnect with Web Security

Strany 12

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 109 Scansafe & IPv6 Support  Current version of Web Security do

Strany 13 -  Agressive Advertising

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 11 About Reputation  Cisco SIO gathers statistical informations fro

Strany 14 -  Site with good history

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 110 Upcoming: Easy ID  Clientless User authentication via webbrowse

Strany 15 - Network Participation

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 111 Agenda  Overview Web Security  Web Security with Cisco Ironpor

Strany 16

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 112 Secure Mobility Future – Hybrid Security Internet Remote User w

Strany 17 -  WSA connects to website

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 113 Summary  Cisco Web Security Solution leverages a comprehensive

Strany 18

Recommended Reading Please visit the Cisco Store for suitable reading.

Strany 19

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 115 Please complete your Session Survey  Don't forget to compl

Strany 20 -  Via script

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 116

Strany 21 - WPAD Server

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 117 Thank you.

Strany 22 -  More details found here:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 12 About Reputation  Malicious websites are tracked globally throu

Strany 23 - - WSA can host PAC files

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 13 Examples: Reputation Values  Known Botnet or Phising Site  Agr

Strany 24 -  WSA proxies the request

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 14 Examples: Reputation Values (2)  Neutral Site  Site with good h

Strany 25

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 15 Network Participation  Admin can define the level of participati

Strany 26

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 16 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strany 27 - MASKING

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 17 Explicit Proxy Internet Internet Web server Web Security Applianc

Strany 28

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 18 How does the Browser find the Proxy?  Proxy setting in the brows

Strany 29 - WCCP input redirect

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 19 How does the Browser find the Proxy?  Automatic Configuration vi

Strany 30

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 2 Housekeeping  We value your feedback- don't forget to comple

Strany 31 - How WCCP registration works

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 20 PAC Deployment  Via AD and GPO  Via script  Via manual setting

Strany 32 - WCCP Protocol

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 21 WPAD Server  WPAD Server hosts PAC file as wpad.dat  File is re

Strany 33

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 22 WPAD and Windows 2008  Starting with W2008 DNS Server, its no lo

Strany 34

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 23 Explicit Deployment - Summary  Requires Client Settings in the B

Strany 35

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 24 Transparent Proxy via WCCP Internet Internet Web server Web Secur

Strany 36

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 25 Background on WCCP  WCCPv1 developed in 1997 by Cisco Systems an

Strany 37 - L2 Redirect

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 26 Details Assignment The WCCP assignment method is used to determin

Strany 38 - Assign seperate VLAN for the

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 27 Gory Details for HASH and MASK  Hash - Combines packet’s src/des

Strany 39 - WCCP with L3 Switch

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 28 Details Redirect and Return  Redirect Method - WCCP GRE - Entire

Strany 40

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 29 WCCP input redirect Ingress Interface Egress Interface WCCP Input

Strany 41 - WCCP with ASA

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 3 For Your Reference  There are (many...) slides in your print-outs

Strany 42 - VLAN50 172.16.10.0 /24

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 30 WCCP output redirect and input exclude Ingress Interface Egress I

Strany 43 -  Redirect is GRE and Hash

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 31 How WCCP registration works WCCP Client WCCP Server 1. Registrati

Strany 44

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 32 Buckets 86–170 Buckets 86–128 Buckets 1–85 Buckets 129–170 Bucket

Strany 45 - Platform Recommendations

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 33 Using WCCP for Traffic Redirection  WCCPv2 support is availible

Strany 46 - Symptoms:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 34 Using WCCP for Traffic Redirection (2) Performance Considerations

Strany 47

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 35 WCCP Protocol Service Group  The routers/switches and WCCP clien

Strany 48

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 36 Current (Cisco) Service Groups ID Product Name Protocol Port

Strany 49 -  Enable HTTP Probes on ACE

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 37 VLAN10 WCCP with L3 Switch (3560/3750) L2 Redirect VLAN10 Interne

Strany 50

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 38 VLAN40 WCCP with L3 Switch (3560/3750) L2 Redirect VLAN10 Interne

Strany 51 - Corporate Network

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 39 WCCP with L3 Switch L2 Redirect - Verification munlab-3560X#show

Strany 52

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 4 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strany 53

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 40 WCCP with L3 Switch (CAT6500) L2 or GRE Redirect r1 r2 WAN SiSiS

Strany 54 - Policy - Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 41 WCCP with ASA access-list WCCPRedirectionList extended deny ip 17

Strany 55 - Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 42 Internet WCCP with ASA – Virtual Context Virtual Firewalls with s

Strany 56 - Surrogates

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 43 WCCP with Router – ISR, ISRG2 ip cef ip wccp version 2 ip wccp 91

Strany 57

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 44 WCCP Router Redirect and Return Support WCCP GRE Redirect WCCP L

Strany 58 - HTTP Response Codes

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 45 WCCP Platform Recommendations Function Support / Recommend Softw

Strany 59 - NTLM Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 46 Transparent Redirection and HTTPS Symptoms:  Successfully config

Strany 60 - LDAP Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 47 Transparent Deployment - Summary  No client settings necessary 

Strany 61 - Authentication against LDAP

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 48 DEMO – WSA with transparent redirection

Strany 62

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 49 Deploying using external Loadbalancer  Scalable up to 16 Gig Thr

Strany 63 - Testing the query

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 5 1996

Strany 64 -  Works for HTTPS

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 50 General Consideration - Upstream Proxy  WSA can be deployed behi

Strany 65

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 51 Special Case...not yet validated  Internet Internet Web server W

Strany 66

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 52 Clientless SSL with WSA - Example For Your Reference For Your Ref

Strany 67 - IE8/IE9 with Single-Sign On

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 53 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strany 68 - Web Security Release 7.5

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 54 Policy - Authentication  Policy objects can be managed from cent

Strany 69

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 55 Authentication User Directory Web Security Appliance  Authentic

Strany 70 - Specify the

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 56 Surrogates  Surrogates define how Users are tracked once the hav

Strany 71 - Add custom field “%m”

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 57 Proxy and Authentication Types Proxy Type Authentication Browser

Strany 72

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 58 HTTP Response Codes  200 – OK Request was sent successfully  30

Strany 73

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 59 NTLM Authentication  NTLM requires Account in the AD Domain  Cr

Strany 74

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 6 Today‘s Websites...

Strany 75 - Sizing for WSA

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 60 LDAP Authentication  LDAP queries on port 389 or 636 (Secure LDA

Strany 76

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 61 Authentication against LDAP  Knowing the LDAP Base DN is fundame

Strany 77

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 62 Authentication against LDAP  Knowing the LDAP Base DN is fundame

Strany 78 -  Central reporting and

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 63 Testing the query  After defining the query, check result! For

Strany 79 - Web requests

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 64 Authentication in Explicit Deployment Web Security Appliance Use

Strany 80 - See BRKSEC-2346:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 65 Authentication in Transparent Deployment Web Security Appliance

Strany 81 - Outbreak Intelligence

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 66 Authentication in Transparent Deployment What the client thinks

Strany 82

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 67 IE8/IE9 with Single-Sign On  SSO on WSA correctly configured but

Strany 83 - Network

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 68 Transparent User Identification (TUI) Web Security Release 7.5 In

Strany 84

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 69 Transparent User Identification (TUI) Web Security Release 7.5 –

Strany 85

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 7 Appliance or Cloud?

Strany 86 -  HTTP only

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 70 Transparent User Identification (TUI) Web Security Release 7.5 -

Strany 87 - GPO Update

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 71 Transparent User Identification (TUI) Web Security Release 7.5 -

Strany 88

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 72 DEMO – WSA with Transparent User Identification

Strany 89 - Browsers

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 73 Transparent User Identification – Summary & Caveats  Uses an

Strany 90 - How Does PIM Work in Detail?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 74 Cisco Ironport WSA & IPv6 Support  Current version of WSA do

Strany 91 - Standalone Connector

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 75 Sizing for WSA  Main Parameter for sizing is “requests per secon

Strany 92

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 76 Summary – Cisco Ironport Web Security Appliance  Scalable On-pre

Strany 93 - content-scan out

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 77 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strany 94 - Solution Guide

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 78 Websecurity through Cloudservice  Hosted Websecurity through Cis

Strany 95 -  Phase 2: Apr 2012

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 79 Data Flow with ScanSafe Web requests Allowed traffic Filtered tra

Strany 96 - Roaming Users

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 8 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strany 97 - Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 80 Scalability & Reliability See BRKSEC-2346: Inside the Scansa

Strany 98 - Websecurity

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 81 Outbreak Intelligence <html> <js> <swf> <pdf

Strany 99 - How Does it Work?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 82 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strany 100 - Websecurity Module

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 83 Corporate Network Challenge: Branch Office with local Breakout In

Strany 101 - Client Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 84  Firewall directs web traffic to ScanSafe security service via T

Strany 102

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 85 ASA 8.3 Port Forwarding Config object network scansafe-protected-

Strany 103

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 86  HTTP only  Non standard HTTP ports must get a dedicated NAT Ru

Strany 104

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 87  Proxy Settings are pushed to browsers via Active Directory GPO

Strany 105 - Assign Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 88 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strany 106 - Key for

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 89  PIM is a small EXECUTABLE, run by Login Script or GPO  Runs GP

Strany 107 - Cisco Public BRKSEC-2101

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 9 Cisco Web Security Appliance  Web Proxy incl. Caching (http,htt

Strany 108

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 90  PIM adds -XS headers to the browser’s user agent string  Inclu

Strany 109 - Scansafe & IPv6 Support

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 91  Proxy Settings are pushed to browsers via AD,GPO or PAC file 

Strany 110 - Upcoming: Easy ID

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 92 ISR G2 with integrated Connector 92  Connector is integrated in

Strany 111 -  Overview Web Security

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 93 ISR G2 with integrated Connector Simple Config 93 parameter-map t

Strany 112

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 94 ISR G2 with integrated Connector Solution Guide 94 www.cisco.com/

Strany 113 - Summary

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 95 Sizing and scalability for ISR with Connector 3945E 3925E 3945 39

Strany 114 - Recommended Reading

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 96  Installs a Network Driver which binds to all connections (LAN,

Strany 115 - 1. Scan the QR code

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 97 Web Security & AnyConnect 97  Supported on Windows & MAC

Strany 116

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 98 Web Security & AnyConnect 98  Single and modular client VPN

Strany 117 - Thank you

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 99 How Does it Work?  Authenticates and directs your external clien

Komentáře k této Příručce

Žádné komentáře