Примечания к выпуску для Cisco Cisco ASA 5545-X Adaptive Security Appliance - No Payload Encryption

Скачать
Страница из 24
4
Cisco ASA 5580 Series Release Notes Version 8.1(2)
OL-15086-02
  System Requirements
To copy from an FTP server, enter the following command:
hostname# copy ftp://[user[:password]@]server[/path]/filename {flash:/ | disk0:/ | 
disk1:/
}[path/]filename
To copy from an HTTP or HTTPS server, enter the following command:
hostname# copy http[s]://[user[:password]@]server[:port][/path]/filename {flash:/ | 
disk0:/
 | disk1:/}[path/]filename
To use secure copy, first enable SSH, then enter the following command:
hostname# ssh scopy enable
Then from a Linux client, enter the following command:
scp -v -pw
 password filename username@asa_address
The -v specifies verbose. If -pw is not specified, you are prompted for a password.
Installing or Upgrading Cisco Secure Desktop
Cisco Secure Desktop Release 3.2 requires ASA Version 8.1. You do not need to restart the adaptive 
security appliance after you install or upgrade Cisco Secure Desktop.
Note
Archive and delete the Secure Desktop desktop/data.xml configuration file before upgrading to 
Cisco Secure Desktop 3.2. To create a clean configuration file, uninstall Cisco Secure Desktop 
before reinstalling it.
The expanded flexibility provided by a prelogin assessment sequence editor, and replacement of the 
Cisco Secure Desktop feature policies with a dynamic access policy (DAP) configured on the adaptive 
security appliance, are incompatible with Cisco Secure Desktop 3.1.1 configurations. Cisco Secure 
Desktop automatically inserts a new, default configuration file when it detects that one is not present.
For consistency with the previous release notes, these instructions provide the CLI commands needed to 
install Secure Desktop. You may, however, prefer to use ASDM. To do so, choose Configuration > 
Remote Access VPN > Secure Desktop Manager > Setup and click Help.
To install or upgrade the Cisco Secure Desktop software, perform the following steps:
 
Step 1
Download the latest Cisco Secure Desktop package file from the following website and install it on the 
flash memory card of the adaptive security appliance:
http://www.cisco.com/cisco/software/navigator.html
Step 2
Enter the following commands to access webvpn configuration mode:
hostname# config terminal
hostname(config)# webvpn
hostname(config-webvpn)#
Step 3
To validate the Cisco Secure Desktop distribution package and add it to the running configuration, enter 
the following command in webvpn configuration mode:
hostname(config-webvpn)# csd image disk0:/securedesktop_asa_3_2_0_build.pkg
hostname(config-webvpn)#
Step 4
To enable Cisco Secure Desktop for management and remote user access, use the csd enable command 
in webvpn configuration mode. To disable Cisco Secure Desktop, use the no form of this command.