Cisco S170 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Nie Cisco S170. Web Security with Cisco Ironport Web Security Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 117
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
BRKSEC-2101
Web Security Deployment
Follow us on Twitter for real time updates of the event:
@ciscoliveeurope, #CLEUR
Przeglądanie stron 0
1 2 3 4 5 6 ... 116 117

Podsumowanie treści

Strona 1 - @ciscoliveeurope, #CLEUR

BRKSEC-2101 Web Security Deployment Follow us on Twitter for real time updates of the event: @ciscoliveeurope, #CLEUR

Strona 2 - Housekeeping

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 10 Web Application Control  Many Applications work on top of HTTP t

Strona 3 - Reference

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 100 Web Security & AnyConnect Configuration for Web Security wit

Strona 4

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 101 Web Security & AnyConnect Configuration – Client Profile Sc

Strona 5

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 102 Web Security & AnyConnect Configuration – Client Profile Ex

Strona 6 - Today‘s Websites

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 103 Web Security & AnyConnect Configuration – Client Profile Ac

Strona 7 - Appliance or Cloud?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 104 Web Security & AnyConnect Configuration – Client Profile Au

Strona 8

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 105 Web Security & AnyConnect Configuration – Config on ASA if u

Strona 9 - Reporting and tracking

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 106 Web Security & AnyConnect Configuration for Web Security wi

Strona 10 - Web Application Control

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 107 Beacon Server for the AnyConnect Web Security module  Beacon Se

Strona 11 - About Reputation

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 108 DEMO – AnyConnect with Web Security

Strona 12

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 109 Scansafe & IPv6 Support  Current version of Web Security do

Strona 13 -  Agressive Advertising

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 11 About Reputation  Cisco SIO gathers statistical informations fro

Strona 14 -  Site with good history

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 110 Upcoming: Easy ID  Clientless User authentication via webbrowse

Strona 15 - Network Participation

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 111 Agenda  Overview Web Security  Web Security with Cisco Ironpor

Strona 16

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 112 Secure Mobility Future – Hybrid Security Internet Remote User w

Strona 17 -  WSA connects to website

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 113 Summary  Cisco Web Security Solution leverages a comprehensive

Strona 18

Recommended Reading Please visit the Cisco Store for suitable reading.

Strona 19

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 115 Please complete your Session Survey  Don't forget to compl

Strona 20 -  Via script

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 116

Strona 21 - WPAD Server

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 117 Thank you.

Strona 22 -  More details found here:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 12 About Reputation  Malicious websites are tracked globally throu

Strona 23 - - WSA can host PAC files

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 13 Examples: Reputation Values  Known Botnet or Phising Site  Agr

Strona 24 -  WSA proxies the request

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 14 Examples: Reputation Values (2)  Neutral Site  Site with good h

Strona 25

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 15 Network Participation  Admin can define the level of participati

Strona 26

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 16 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strona 27 - MASKING

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 17 Explicit Proxy Internet Internet Web server Web Security Applianc

Strona 28

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 18 How does the Browser find the Proxy?  Proxy setting in the brows

Strona 29 - WCCP input redirect

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 19 How does the Browser find the Proxy?  Automatic Configuration vi

Strona 30

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 2 Housekeeping  We value your feedback- don't forget to comple

Strona 31 - How WCCP registration works

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 20 PAC Deployment  Via AD and GPO  Via script  Via manual setting

Strona 32 - WCCP Protocol

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 21 WPAD Server  WPAD Server hosts PAC file as wpad.dat  File is re

Strona 33

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 22 WPAD and Windows 2008  Starting with W2008 DNS Server, its no lo

Strona 34

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 23 Explicit Deployment - Summary  Requires Client Settings in the B

Strona 35

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 24 Transparent Proxy via WCCP Internet Internet Web server Web Secur

Strona 36

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 25 Background on WCCP  WCCPv1 developed in 1997 by Cisco Systems an

Strona 37 - L2 Redirect

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 26 Details Assignment The WCCP assignment method is used to determin

Strona 38 - Assign seperate VLAN for the

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 27 Gory Details for HASH and MASK  Hash - Combines packet’s src/des

Strona 39 - WCCP with L3 Switch

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 28 Details Redirect and Return  Redirect Method - WCCP GRE - Entire

Strona 40

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 29 WCCP input redirect Ingress Interface Egress Interface WCCP Input

Strona 41 - WCCP with ASA

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 3 For Your Reference  There are (many...) slides in your print-outs

Strona 42 - VLAN50 172.16.10.0 /24

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 30 WCCP output redirect and input exclude Ingress Interface Egress I

Strona 43 -  Redirect is GRE and Hash

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 31 How WCCP registration works WCCP Client WCCP Server 1. Registrati

Strona 44

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 32 Buckets 86–170 Buckets 86–128 Buckets 1–85 Buckets 129–170 Bucket

Strona 45 - Platform Recommendations

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 33 Using WCCP for Traffic Redirection  WCCPv2 support is availible

Strona 46 - Symptoms:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 34 Using WCCP for Traffic Redirection (2) Performance Considerations

Strona 47

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 35 WCCP Protocol Service Group  The routers/switches and WCCP clien

Strona 48

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 36 Current (Cisco) Service Groups ID Product Name Protocol Port

Strona 49 -  Enable HTTP Probes on ACE

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 37 VLAN10 WCCP with L3 Switch (3560/3750) L2 Redirect VLAN10 Interne

Strona 50

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 38 VLAN40 WCCP with L3 Switch (3560/3750) L2 Redirect VLAN10 Interne

Strona 51 - Corporate Network

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 39 WCCP with L3 Switch L2 Redirect - Verification munlab-3560X#show

Strona 52

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 4 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strona 53

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 40 WCCP with L3 Switch (CAT6500) L2 or GRE Redirect r1 r2 WAN SiSiS

Strona 54 - Policy - Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 41 WCCP with ASA access-list WCCPRedirectionList extended deny ip 17

Strona 55 - Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 42 Internet WCCP with ASA – Virtual Context Virtual Firewalls with s

Strona 56 - Surrogates

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 43 WCCP with Router – ISR, ISRG2 ip cef ip wccp version 2 ip wccp 91

Strona 57

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 44 WCCP Router Redirect and Return Support WCCP GRE Redirect WCCP L

Strona 58 - HTTP Response Codes

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 45 WCCP Platform Recommendations Function Support / Recommend Softw

Strona 59 - NTLM Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 46 Transparent Redirection and HTTPS Symptoms:  Successfully config

Strona 60 - LDAP Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 47 Transparent Deployment - Summary  No client settings necessary 

Strona 61 - Authentication against LDAP

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 48 DEMO – WSA with transparent redirection

Strona 62

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 49 Deploying using external Loadbalancer  Scalable up to 16 Gig Thr

Strona 63 - Testing the query

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 5 1996

Strona 64 -  Works for HTTPS

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 50 General Consideration - Upstream Proxy  WSA can be deployed behi

Strona 65

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 51 Special Case...not yet validated  Internet Internet Web server W

Strona 66

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 52 Clientless SSL with WSA - Example For Your Reference For Your Ref

Strona 67 - IE8/IE9 with Single-Sign On

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 53 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strona 68 - Web Security Release 7.5

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 54 Policy - Authentication  Policy objects can be managed from cent

Strona 69

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 55 Authentication User Directory Web Security Appliance  Authentic

Strona 70 - Specify the

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 56 Surrogates  Surrogates define how Users are tracked once the hav

Strona 71 - Add custom field “%m”

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 57 Proxy and Authentication Types Proxy Type Authentication Browser

Strona 72

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 58 HTTP Response Codes  200 – OK Request was sent successfully  30

Strona 73

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 59 NTLM Authentication  NTLM requires Account in the AD Domain  Cr

Strona 74

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 6 Today‘s Websites...

Strona 75 - Sizing for WSA

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 60 LDAP Authentication  LDAP queries on port 389 or 636 (Secure LDA

Strona 76

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 61 Authentication against LDAP  Knowing the LDAP Base DN is fundame

Strona 77

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 62 Authentication against LDAP  Knowing the LDAP Base DN is fundame

Strona 78 -  Central reporting and

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 63 Testing the query  After defining the query, check result! For

Strona 79 - Web requests

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 64 Authentication in Explicit Deployment Web Security Appliance Use

Strona 80 - See BRKSEC-2346:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 65 Authentication in Transparent Deployment Web Security Appliance

Strona 81 - Outbreak Intelligence

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 66 Authentication in Transparent Deployment What the client thinks

Strona 82

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 67 IE8/IE9 with Single-Sign On  SSO on WSA correctly configured but

Strona 83 - Network

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 68 Transparent User Identification (TUI) Web Security Release 7.5 In

Strona 84

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 69 Transparent User Identification (TUI) Web Security Release 7.5 –

Strona 85

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 7 Appliance or Cloud?

Strona 86 -  HTTP only

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 70 Transparent User Identification (TUI) Web Security Release 7.5 -

Strona 87 - GPO Update

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 71 Transparent User Identification (TUI) Web Security Release 7.5 -

Strona 88

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 72 DEMO – WSA with Transparent User Identification

Strona 89 - Browsers

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 73 Transparent User Identification – Summary & Caveats  Uses an

Strona 90 - How Does PIM Work in Detail?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 74 Cisco Ironport WSA & IPv6 Support  Current version of WSA do

Strona 91 - Standalone Connector

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 75 Sizing for WSA  Main Parameter for sizing is “requests per secon

Strona 92

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 76 Summary – Cisco Ironport Web Security Appliance  Scalable On-pre

Strona 93 - content-scan out

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 77 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strona 94 - Solution Guide

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 78 Websecurity through Cloudservice  Hosted Websecurity through Cis

Strona 95 -  Phase 2: Apr 2012

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 79 Data Flow with ScanSafe Web requests Allowed traffic Filtered tra

Strona 96 - Roaming Users

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 8 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strona 97 - Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 80 Scalability & Reliability See BRKSEC-2346: Inside the Scansa

Strona 98 - Websecurity

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 81 Outbreak Intelligence <html> <js> <swf> <pdf

Strona 99 - How Does it Work?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 82 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strona 100 - Websecurity Module

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 83 Corporate Network Challenge: Branch Office with local Breakout In

Strona 101 - Client Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 84  Firewall directs web traffic to ScanSafe security service via T

Strona 102

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 85 ASA 8.3 Port Forwarding Config object network scansafe-protected-

Strona 103

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 86  HTTP only  Non standard HTTP ports must get a dedicated NAT Ru

Strona 104

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 87  Proxy Settings are pushed to browsers via Active Directory GPO

Strona 105 - Assign Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 88 Agenda  Overview Web Security  Web Security with Cisco Ironport

Strona 106 - Key for

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 89  PIM is a small EXECUTABLE, run by Login Script or GPO  Runs GP

Strona 107 - Cisco Public BRKSEC-2101

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 9 Cisco Web Security Appliance  Web Proxy incl. Caching (http,htt

Strona 108

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 90  PIM adds -XS headers to the browser’s user agent string  Inclu

Strona 109 - Scansafe & IPv6 Support

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 91  Proxy Settings are pushed to browsers via AD,GPO or PAC file 

Strona 110 - Upcoming: Easy ID

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 92 ISR G2 with integrated Connector 92  Connector is integrated in

Strona 111 -  Overview Web Security

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 93 ISR G2 with integrated Connector Simple Config 93 parameter-map t

Strona 112

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 94 ISR G2 with integrated Connector Solution Guide 94 www.cisco.com/

Strona 113 - Summary

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 95 Sizing and scalability for ISR with Connector 3945E 3925E 3945 39

Strona 114 - Recommended Reading

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 96  Installs a Network Driver which binds to all connections (LAN,

Strona 115 - 1. Scan the QR code

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 97 Web Security & AnyConnect 97  Supported on Windows & MAC

Strona 116

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 98 Web Security & AnyConnect 98  Single and modular client VPN

Strona 117 - Thank you

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 99 How Does it Work?  Authenticates and directs your external clien

Komentarze do niniejszej Instrukcji

Brak uwag