6-11
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 6 ASA and Cisco TrustSec
Guidelines for Cisco TrustSec
2.
Choose
Policy
>
Policy Elements
>
Results
>
Security Group Access
>
Security Group
.
3.
Add a security group for the ASA. (Security groups are global and not ASA specific.)
The ISE creates an entry under Security Groups with a tag.
4.
In the Security Group Access area, configure device ID credentials and a password for the ASA.
Generate the PAC File
To generate the PAC file, perform the following steps:
1.
Log into the ISE.
2.
Choose
Administration
>
Network Resources
>
Network Devices
.
3.
From the list of devices, choose the ASA.
4.
Under the Security Group Access (SGA), click
Generate PAC
.
5.
To encrypt the PAC file, enter a password.
The password (or encryption key) that you enter to encrypt the PAC file is independent of the
password that was configured on the ISE as part of the device credentials.
The ISE generates the PAC file. The ASA can import the PAC file from flash or from a remote server via
TFTP, FTP, HTTP, HTTPS, or SMB. (The PAC file does not have to reside on the ASA flash before you
can import it.)
Note
The PAC file includes a shared key that allows the ASA and ISE to secure the RADIUS transactions that
occur between them. For this reason, make sure that you store it securely on the ASA.
Guidelines for Cisco TrustSec
This section includes the guidelines and limitations that you should review before configuring Cisco
TrustSec.
Failover
•
Supports a list of servers via configuration. If the first server is unreachable, the ASA tries to contact
the second server in the list, and so on. However, the server list downloaded as part of the Cisco
TrustSec environment data is ignored.
•
When the ASA is part of a failover configuration, you must import the PAC file to the primary ASA
device.
•
When the ASA is part of a failover configuration, you must refresh the environment data on the
primary ASA device.
Clustering
•
When the ASA is part of a clustering configuration, you must import the PAC file to the master unit.
•
When the ASA is part of a clustering configuration, you must refresh the environment data on the
master unit.
Содержание ASA 5508-X
Страница 11: ...P A R T 1 Access Control ...
Страница 12: ......
Страница 60: ...4 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 4 Access Rules History for Access Rules ...
Страница 157: ...P A R T 2 Network Address Translation ...
Страница 158: ......
Страница 204: ...9 46 Cisco ASA Series Firewall CLI Configuration Guide Chapter 9 Network Address Translation NAT History for NAT ...
Страница 232: ...10 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 10 NAT Examples and Reference DNS and NAT ...
Страница 233: ...P A R T 3 Service Policies and Application Inspection ...
Страница 234: ......
Страница 379: ...P A R T 4 Connection Management and Threat Detection ...
Страница 380: ......
Страница 400: ...16 20 Cisco ASA Series Firewall CLI Configuration Guide Chapter 16 Connection Settings History for Connection Settings ...
Страница 414: ...17 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 Quality of Service History for QoS ...