EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1445 background imageLoading...
Page #1445 background image
65-21
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 65 Configuring Dynamic Access Policies
Understanding VPN Access Policies
• Client Type (Application)—Indicate the type of remote access connection, AnyConnect, Clientless,
Cut-through Proxy, IPsec, or L2TP.
• Checksum (File)—Select the file and click the Compute Checksum button to arrive at this value.
• Compute CRC32 Checksum (File)—Use this calculator to determine the checksum value of a file.
• Posture Status (NAC)—Contains the posture token string received from ACS.
• OS Version (Operating System)—Windows (various), MAC, Linux, Pocket PC.
• Service Pack (Operating System)—Identify the service pack for the operating system.
• Endpoint ID (File, Process, Registry)—A string that identifies an endpoint for files, processes or
registry entries. DAP uses this ID to match Cisco Secure Desktop host scan attributes for DAP
selection. You must configure Host Scan before you configure this attribute. When you configure
Host Scan, the configuration displays in this pane, so you can select it, reducing the possibility of
errors in typing or syntax.
• Path (Process, Policy)—Configure Host Scan before you configure this attribute. When you
configure Host Scan, the configuration displays in this pane, so you can select it, reducing the
possibility of errors in typing or syntax.
• Value (Registry)—dword or string
• Caseless (Registry)—Select to disregard case in registry entries.
• VLAN ID (VLAN)—A valid 802.1q number ranging from 1 to 4094
• VLAN Type (VLAN)—Possible values include the following:
• Policy (Location)—Enter the Cisco Secure Desktop Microsoft Windows location profile, case
sensitive.
Modes
The following table shows the modes in which this feature is available:
ACCESS Posture assessment passed
STATIC No posture assessment applied
TIMEOUT Posture assessment failed due to no response
AUTH Posture assessment still active
GUEST Posture assessment passed, switch to guest VLAN
QUARANTINE Posture assessment failed, switch to quarantine VLAN
ERROR Posture assessment failed due to fatal error
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
•••——

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals