Cisco ASA 5505 User Manual

Page 90

Advertising
background image

1-20

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 1 Introduction to the Cisco ASA 5500 Series

New Features

SSL SHA-2 digital signature This release supports the use of SHA-2 compliant signature algorithms to authenticate SSL

VPN connections that use digital certificates. Our support for SHA-2 includes all three hash
sizes: SHA-256, SHA-384, and SHA-512. SHA-2 requires AnyConnect 2.5.1 or later (2.5.2 or
later recommended). This release does not support SHA-2 for other uses or products. This
feature does not involve configuration changes.

Caution: To support failover of SHA-2 connections, the standby ASA must be running the
same image. To support this feature, we added the Signature Algorithm field to the show
crypto ca certificate command
to identify the digest algorithm used when generating the
signature.

SCEP Proxy

SCEP Proxy provides the AnyConnect Secure Mobility Client with support for automated
third-party certificate enrollment. Use this feature to support AnyConnect with zero-touch,
secure deployment of device certificates to authorize endpoint connections, enforce policies
that prevent access by non-corporate assets, and track corporate assets. This feature requires
an AnyConnect Premium license and will not work with an Essentials license.

We introduced or modified the following commands: crypto ikev2 enable, scep-enrollment
enable
, scep-forwarding-url, debug crypto ca scep-proxy,
secondary-username-from-certificate, secondary-pre-fill-username.

Host Scan Package Support

This feature provides the necessary support for the ASA to install or upgrade a Host Scan
package and enable or disable Host Scan. This package may either be a standalone Host Scan
package or one that ASA extracts from an AnyConnect Next Generation package.

In previous releases of AnyConnect, an endpoint’s posture was determined by Cisco Secure
Desktop (CSD). Host Scan was one of many features bundled in CSD. Unbundling Host Scan
from CSD gives AnyConnect administrators greater freedom to update and install Host Scan
separately from the other features of CSD.

We introduced the following command: csd hostscan image path.

Kerberos Constrained
Delegation (KCD)

This release implements the KCD protocol transition and constrained delegation extensions on
the ASA. KCD provides Clientless SSL VPN (also known as WebVPN) users with SSO access
to any web services protected by Kerberos. Examples of such services or applications include
Outlook Web Access (OWA), Sharepoint, and Internet Information Server (IIS).

Implementing protocol transition allows the ASA to obtain Kerberos service tickets on behalf
of remote access users without requiring them to authenticate to the KDC (through Kerberos).
Instead, a user authenticates to ASA using any of the supported authentication mechanisms,
including digital certificates and Smartcards, for Clientless SSL VPN (also known as
WebVPN). When user authentication is complete, the ASA requests and obtains an
impersonate ticket, which is a service ticket for ASA on behalf of the user. The ASA may then
use the impersonate ticket to obtain other service tickets for the remote access user.

Constrained delegation provides a way for domain administrators to limit the network
resources that a service trusted for delegation (for example, the ASA) can access. This task is
accomplished by configuring the account under which the service is running to be trusted for
delegation to a specific instance of a service running on a specific computer.

We modified the following commands: kcd-server, clear aaa, show aaa, test aaa-server
authentication
.

Clientless SSL VPN browser
support

The ASA now supports clientless SSL VPN with Apple Safari 5.

Table 1-7

New Features for ASA Version 8.4(1) (continued)

Feature

Description

Advertising