Cisco S170 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Nein Cisco S170 herunter. Web Security with Cisco Ironport Web Security Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 117
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
BRKSEC-2101
Web Security Deployment
Follow us on Twitter for real time updates of the event:
@ciscoliveeurope, #CLEUR
Seitenansicht 0
1 2 3 4 5 6 ... 116 117

Inhaltsverzeichnis

Seite 1 - @ciscoliveeurope, #CLEUR

BRKSEC-2101 Web Security Deployment Follow us on Twitter for real time updates of the event: @ciscoliveeurope, #CLEUR

Seite 2 - Housekeeping

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 10 Web Application Control  Many Applications work on top of HTTP t

Seite 3 - Reference

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 100 Web Security & AnyConnect Configuration for Web Security wit

Seite 4

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 101 Web Security & AnyConnect Configuration – Client Profile Sc

Seite 5

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 102 Web Security & AnyConnect Configuration – Client Profile Ex

Seite 6 - Today‘s Websites

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 103 Web Security & AnyConnect Configuration – Client Profile Ac

Seite 7 - Appliance or Cloud?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 104 Web Security & AnyConnect Configuration – Client Profile Au

Seite 8

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 105 Web Security & AnyConnect Configuration – Config on ASA if u

Seite 9 - Reporting and tracking

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 106 Web Security & AnyConnect Configuration for Web Security wi

Seite 10 - Web Application Control

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 107 Beacon Server for the AnyConnect Web Security module  Beacon Se

Seite 11 - About Reputation

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 108 DEMO – AnyConnect with Web Security

Seite 12

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 109 Scansafe & IPv6 Support  Current version of Web Security do

Seite 13 -  Agressive Advertising

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 11 About Reputation  Cisco SIO gathers statistical informations fro

Seite 14 -  Site with good history

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 110 Upcoming: Easy ID  Clientless User authentication via webbrowse

Seite 15 - Network Participation

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 111 Agenda  Overview Web Security  Web Security with Cisco Ironpor

Seite 16

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 112 Secure Mobility Future – Hybrid Security Internet Remote User w

Seite 17 -  WSA connects to website

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 113 Summary  Cisco Web Security Solution leverages a comprehensive

Seite 18

Recommended Reading Please visit the Cisco Store for suitable reading.

Seite 19

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 115 Please complete your Session Survey  Don't forget to compl

Seite 20 -  Via script

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 116

Seite 21 - WPAD Server

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 117 Thank you.

Seite 22 -  More details found here:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 12 About Reputation  Malicious websites are tracked globally throu

Seite 23 - - WSA can host PAC files

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 13 Examples: Reputation Values  Known Botnet or Phising Site  Agr

Seite 24 -  WSA proxies the request

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 14 Examples: Reputation Values (2)  Neutral Site  Site with good h

Seite 25

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 15 Network Participation  Admin can define the level of participati

Seite 26

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 16 Agenda  Overview Web Security  Web Security with Cisco Ironport

Seite 27 - MASKING

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 17 Explicit Proxy Internet Internet Web server Web Security Applianc

Seite 28

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 18 How does the Browser find the Proxy?  Proxy setting in the brows

Seite 29 - WCCP input redirect

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 19 How does the Browser find the Proxy?  Automatic Configuration vi

Seite 30

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 2 Housekeeping  We value your feedback- don't forget to comple

Seite 31 - How WCCP registration works

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 20 PAC Deployment  Via AD and GPO  Via script  Via manual setting

Seite 32 - WCCP Protocol

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 21 WPAD Server  WPAD Server hosts PAC file as wpad.dat  File is re

Seite 33

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 22 WPAD and Windows 2008  Starting with W2008 DNS Server, its no lo

Seite 34

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 23 Explicit Deployment - Summary  Requires Client Settings in the B

Seite 35

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 24 Transparent Proxy via WCCP Internet Internet Web server Web Secur

Seite 36

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 25 Background on WCCP  WCCPv1 developed in 1997 by Cisco Systems an

Seite 37 - L2 Redirect

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 26 Details Assignment The WCCP assignment method is used to determin

Seite 38 - Assign seperate VLAN for the

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 27 Gory Details for HASH and MASK  Hash - Combines packet’s src/des

Seite 39 - WCCP with L3 Switch

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 28 Details Redirect and Return  Redirect Method - WCCP GRE - Entire

Seite 40

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 29 WCCP input redirect Ingress Interface Egress Interface WCCP Input

Seite 41 - WCCP with ASA

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 3 For Your Reference  There are (many...) slides in your print-outs

Seite 42 - VLAN50 172.16.10.0 /24

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 30 WCCP output redirect and input exclude Ingress Interface Egress I

Seite 43 -  Redirect is GRE and Hash

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 31 How WCCP registration works WCCP Client WCCP Server 1. Registrati

Seite 44

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 32 Buckets 86–170 Buckets 86–128 Buckets 1–85 Buckets 129–170 Bucket

Seite 45 - Platform Recommendations

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 33 Using WCCP for Traffic Redirection  WCCPv2 support is availible

Seite 46 - Symptoms:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 34 Using WCCP for Traffic Redirection (2) Performance Considerations

Seite 47

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 35 WCCP Protocol Service Group  The routers/switches and WCCP clien

Seite 48

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 36 Current (Cisco) Service Groups ID Product Name Protocol Port

Seite 49 -  Enable HTTP Probes on ACE

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 37 VLAN10 WCCP with L3 Switch (3560/3750) L2 Redirect VLAN10 Interne

Seite 50

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 38 VLAN40 WCCP with L3 Switch (3560/3750) L2 Redirect VLAN10 Interne

Seite 51 - Corporate Network

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 39 WCCP with L3 Switch L2 Redirect - Verification munlab-3560X#show

Seite 52

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 4 Agenda  Overview Web Security  Web Security with Cisco Ironport

Seite 53

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 40 WCCP with L3 Switch (CAT6500) L2 or GRE Redirect r1 r2 WAN SiSiS

Seite 54 - Policy - Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 41 WCCP with ASA access-list WCCPRedirectionList extended deny ip 17

Seite 55 - Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 42 Internet WCCP with ASA – Virtual Context Virtual Firewalls with s

Seite 56 - Surrogates

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 43 WCCP with Router – ISR, ISRG2 ip cef ip wccp version 2 ip wccp 91

Seite 57

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 44 WCCP Router Redirect and Return Support WCCP GRE Redirect WCCP L

Seite 58 - HTTP Response Codes

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 45 WCCP Platform Recommendations Function Support / Recommend Softw

Seite 59 - NTLM Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 46 Transparent Redirection and HTTPS Symptoms:  Successfully config

Seite 60 - LDAP Authentication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 47 Transparent Deployment - Summary  No client settings necessary 

Seite 61 - Authentication against LDAP

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 48 DEMO – WSA with transparent redirection

Seite 62

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 49 Deploying using external Loadbalancer  Scalable up to 16 Gig Thr

Seite 63 - Testing the query

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 5 1996

Seite 64 -  Works for HTTPS

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 50 General Consideration - Upstream Proxy  WSA can be deployed behi

Seite 65

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 51 Special Case...not yet validated  Internet Internet Web server W

Seite 66

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 52 Clientless SSL with WSA - Example For Your Reference For Your Ref

Seite 67 - IE8/IE9 with Single-Sign On

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 53 Agenda  Overview Web Security  Web Security with Cisco Ironport

Seite 68 - Web Security Release 7.5

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 54 Policy - Authentication  Policy objects can be managed from cent

Seite 69

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 55 Authentication User Directory Web Security Appliance  Authentic

Seite 70 - Specify the

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 56 Surrogates  Surrogates define how Users are tracked once the hav

Seite 71 - Add custom field “%m”

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 57 Proxy and Authentication Types Proxy Type Authentication Browser

Seite 72

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 58 HTTP Response Codes  200 – OK Request was sent successfully  30

Seite 73

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 59 NTLM Authentication  NTLM requires Account in the AD Domain  Cr

Seite 74

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 6 Today‘s Websites...

Seite 75 - Sizing for WSA

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 60 LDAP Authentication  LDAP queries on port 389 or 636 (Secure LDA

Seite 76

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 61 Authentication against LDAP  Knowing the LDAP Base DN is fundame

Seite 77

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 62 Authentication against LDAP  Knowing the LDAP Base DN is fundame

Seite 78 -  Central reporting and

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 63 Testing the query  After defining the query, check result! For

Seite 79 - Web requests

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 64 Authentication in Explicit Deployment Web Security Appliance Use

Seite 80 - See BRKSEC-2346:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 65 Authentication in Transparent Deployment Web Security Appliance

Seite 81 - Outbreak Intelligence

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 66 Authentication in Transparent Deployment What the client thinks

Seite 82

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 67 IE8/IE9 with Single-Sign On  SSO on WSA correctly configured but

Seite 83 - Network

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 68 Transparent User Identification (TUI) Web Security Release 7.5 In

Seite 84

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 69 Transparent User Identification (TUI) Web Security Release 7.5 –

Seite 85

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 7 Appliance or Cloud?

Seite 86 -  HTTP only

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 70 Transparent User Identification (TUI) Web Security Release 7.5 -

Seite 87 - GPO Update

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 71 Transparent User Identification (TUI) Web Security Release 7.5 -

Seite 88

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 72 DEMO – WSA with Transparent User Identification

Seite 89 - Browsers

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 73 Transparent User Identification – Summary & Caveats  Uses an

Seite 90 - How Does PIM Work in Detail?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 74 Cisco Ironport WSA & IPv6 Support  Current version of WSA do

Seite 91 - Standalone Connector

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 75 Sizing for WSA  Main Parameter for sizing is “requests per secon

Seite 92

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 76 Summary – Cisco Ironport Web Security Appliance  Scalable On-pre

Seite 93 - content-scan out

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 77 Agenda  Overview Web Security  Web Security with Cisco Ironport

Seite 94 - Solution Guide

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 78 Websecurity through Cloudservice  Hosted Websecurity through Cis

Seite 95 -  Phase 2: Apr 2012

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 79 Data Flow with ScanSafe Web requests Allowed traffic Filtered tra

Seite 96 - Roaming Users

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 8 Agenda  Overview Web Security  Web Security with Cisco Ironport

Seite 97 - Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 80 Scalability & Reliability See BRKSEC-2346: Inside the Scansa

Seite 98 - Websecurity

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 81 Outbreak Intelligence <html> <js> <swf> <pdf

Seite 99 - How Does it Work?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 82 Agenda  Overview Web Security  Web Security with Cisco Ironport

Seite 100 - Websecurity Module

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 83 Corporate Network Challenge: Branch Office with local Breakout In

Seite 101 - Client Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 84  Firewall directs web traffic to ScanSafe security service via T

Seite 102

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 85 ASA 8.3 Port Forwarding Config object network scansafe-protected-

Seite 103

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 86  HTTP only  Non standard HTTP ports must get a dedicated NAT Ru

Seite 104

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 87  Proxy Settings are pushed to browsers via Active Directory GPO

Seite 105 - Assign Profile

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 88 Agenda  Overview Web Security  Web Security with Cisco Ironport

Seite 106 - Key for

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 89  PIM is a small EXECUTABLE, run by Login Script or GPO  Runs GP

Seite 107 - Cisco Public BRKSEC-2101

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 9 Cisco Web Security Appliance  Web Proxy incl. Caching (http,htt

Seite 108

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 90  PIM adds -XS headers to the browser’s user agent string  Inclu

Seite 109 - Scansafe & IPv6 Support

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 91  Proxy Settings are pushed to browsers via AD,GPO or PAC file 

Seite 110 - Upcoming: Easy ID

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 92 ISR G2 with integrated Connector 92  Connector is integrated in

Seite 111 -  Overview Web Security

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 93 ISR G2 with integrated Connector Simple Config 93 parameter-map t

Seite 112

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 94 ISR G2 with integrated Connector Solution Guide 94 www.cisco.com/

Seite 113 - Summary

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 95 Sizing and scalability for ISR with Connector 3945E 3925E 3945 39

Seite 114 - Recommended Reading

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 96  Installs a Network Driver which binds to all connections (LAN,

Seite 115 - 1. Scan the QR code

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 97 Web Security & AnyConnect 97  Supported on Windows & MAC

Seite 116

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 98 Web Security & AnyConnect 98  Single and modular client VPN

Seite 117 - Thank you

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public BRKSEC-2101 99 How Does it Work?  Authenticates and directs your external clien

Kommentare zu diesen Handbüchern

Keine Kommentare