Примечания к выпуску для Cisco Cisco ASA 5545-X Adaptive Security Appliance - No Payload Encryption
4
Cisco ASA 5580 Series Release Notes Version 8.1(2)
OL-15086-02
System Requirements
•
To copy from an FTP server, enter the following command:
hostname# copy ftp://[user[:password]@]server[/path]/filename {flash:/ | disk0:/ |
disk1:/
}[path/]filename
•
To copy from an HTTP or HTTPS server, enter the following command:
hostname# copy http[s]://[user[:password]@]server[:port][/path]/filename {flash:/ |
disk0:/
| disk1:/}[path/]filename
•
To use secure copy, first enable SSH, then enter the following command:
hostname# ssh scopy enable
Then from a Linux client, enter the following command:
scp -v -pw
password filename username@asa_address
The -v specifies verbose. If -pw is not specified, you are prompted for a password.
Installing or Upgrading Cisco Secure Desktop
Cisco Secure Desktop Release 3.2 requires ASA Version 8.1. You do not need to restart the adaptive
security appliance after you install or upgrade Cisco Secure Desktop.
security appliance after you install or upgrade Cisco Secure Desktop.
Note
Archive and delete the Secure Desktop desktop/data.xml configuration file before upgrading to
Cisco Secure Desktop 3.2. To create a clean configuration file, uninstall Cisco Secure Desktop
before reinstalling it.
Cisco Secure Desktop 3.2. To create a clean configuration file, uninstall Cisco Secure Desktop
before reinstalling it.
The expanded flexibility provided by a prelogin assessment sequence editor, and replacement of the
Cisco Secure Desktop feature policies with a dynamic access policy (DAP) configured on the adaptive
security appliance, are incompatible with Cisco Secure Desktop 3.1.1 configurations. Cisco Secure
Desktop automatically inserts a new, default configuration file when it detects that one is not present.
Cisco Secure Desktop feature policies with a dynamic access policy (DAP) configured on the adaptive
security appliance, are incompatible with Cisco Secure Desktop 3.1.1 configurations. Cisco Secure
Desktop automatically inserts a new, default configuration file when it detects that one is not present.
For consistency with the previous release notes, these instructions provide the CLI commands needed to
install Secure Desktop. You may, however, prefer to use ASDM. To do so, choose Configuration >
Remote Access VPN > Secure Desktop Manager > Setup and click Help.
install Secure Desktop. You may, however, prefer to use ASDM. To do so, choose Configuration >
Remote Access VPN > Secure Desktop Manager > Setup and click Help.
To install or upgrade the Cisco Secure Desktop software, perform the following steps:
Step 1
Download the latest Cisco Secure Desktop package file from the following website and install it on the
flash memory card of the adaptive security appliance:
flash memory card of the adaptive security appliance:
http://www.cisco.com/cisco/software/navigator.html
Step 2
Enter the following commands to access webvpn configuration mode:
hostname# config terminal
hostname(config)# webvpn
hostname(config-webvpn)#
Step 3
To validate the Cisco Secure Desktop distribution package and add it to the running configuration, enter
the following command in webvpn configuration mode:
the following command in webvpn configuration mode:
hostname(config-webvpn)# csd image disk0:/securedesktop_asa_3_2_0_build.pkg
hostname(config-webvpn)#
Step 4
To enable Cisco Secure Desktop for management and remote user access, use the csd enable command
in webvpn configuration mode. To disable Cisco Secure Desktop, use the no form of this command.
in webvpn configuration mode. To disable Cisco Secure Desktop, use the no form of this command.