<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSD and RDP Plugin in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437976#M660961</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, so if I now I understand the requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a user has a certain OS and Anti-Virus then you will permit&amp;nbsp; the user to have AnyConnect and if not they only receive the Web Portal where you have enabled the RDP plugin as a resource..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the case what you are trying to do I think you would benefit from checking out the SSL VPN Deployment Guide - specifically the 'Integrating Cisco Secure Desktop with DAP's' section.&amp;nbsp; &lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/ssl_vpn_deployment_guide/deploy.html#wp1128062"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/ssl_vpn_deployment_guide/deploy.html#wp1128062&lt;/A&gt;&lt;/P&gt;&lt;H3 class="p_H_Head2"&gt;&lt;/H3&gt;&lt;P class="p_H_Head2"&gt;&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Essentially you are going to end up with 3 DAP's with one of them being the default policy which in most cases would terminate the session if the user did not match the 2 preceding policies.&amp;nbsp; The first DAP would be the one where the user with AV would hit and be granted AnyConnect, the second would be where the users without AV would get Clientless access only thus being able to use RDP.&lt;/P&gt;&lt;P class="p_H_Head2"&gt;&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Good Luck.&lt;/P&gt;&lt;P class="p_H_Head2"&gt;&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Best regards&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 15 Aug 2010 00:00:51 GMT</pubDate>
    <dc:creator>Paul Carco</dc:creator>
    <dc:date>2010-08-15T00:00:51Z</dc:date>
    <item>
      <title>CSD and RDP Plugin</title>
      <link>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437973#M660877</link>
      <description>&lt;P&gt;I now have a new boss and they have decided to change our remote access policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I already have a working SSL VPN and RDP deployment, thanks in part to the expertise of this forum.&amp;nbsp; Thank you all for that.&lt;/P&gt;&lt;P&gt;Originally we only allowed company hardware to connect to the SSL and everyone else was stuck with the RDP session.&lt;/P&gt;&lt;P&gt;Now I need to be able to allow non-company hardware to connect to the SSL, so I decided to enable CSD and do an OS check and a virus scan check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After enabling CSD, I have found that when users connect to the RDP session it runs all of the CSD checks and is not allowing connections.&amp;nbsp; Is there a way to only use CSD for the SSL Client connections, and for CSD to ignore all of the RDP Plugin connections?&lt;/P&gt;&lt;P&gt;I did a quick search of the Group Policies and did not see a CSD option in there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running ASA 8.x and the newest version of CSD.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437973#M660877</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2019-03-11T18:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: CSD and RDP Plugin</title>
      <link>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437974#M660897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say "RDP deployment"&amp;nbsp; are you referring to Clientless users and the RDP plug-in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do your Dynamic Access Policies look like?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Aug 2010 20:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437974#M660897</guid>
      <dc:creator>Paul Carco</dc:creator>
      <dc:date>2010-08-13T20:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: CSD and RDP Plugin</title>
      <link>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437975#M660935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I am referring to Clientless users using the RDP plug-in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ended up contacting Cisco and they told me that the CSD is a global setting and that I would not be able to avoid using the CSD even with the RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my current config:&lt;BR /&gt;webvpn&lt;BR /&gt; enable IntNet&lt;BR /&gt; enable ExtNet&lt;BR /&gt; csd image disk0:/csd_3.5.1077-k9.pkg&lt;BR /&gt; svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy EDIAccessPlc internal&lt;BR /&gt;group-policy EDIAccessPlc attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; homepage value rdp://10.1.2.40/?geometry=1024x768&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;group-policy TSAccessPlc internal&lt;BR /&gt;group-policy TSAccessPlc attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; homepage value rdp://10.1.2.70/?geometry=1024x768&lt;BR /&gt;group-policy OWAAccessPlc internal&lt;BR /&gt;group-policy OWAAccessPlc attributes&lt;BR /&gt; vpn-idle-timeout 20&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value ECCOOWA&lt;BR /&gt;&amp;nbsp; hidden-shares none&lt;BR /&gt;&amp;nbsp; file-entry disable&lt;BR /&gt;&amp;nbsp; file-browsing disable&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;BR /&gt;group-policy AnyConnectAccessPlc internal&lt;BR /&gt;group-policy AnyConnectAccessPlc attributes&lt;BR /&gt; dns-server value 10.1.2.3 10.1.2.80&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; default-domain value eccogroup.corp&lt;BR /&gt; address-pools value ECCOSSLDHCP&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc rekey time 30&lt;BR /&gt;&amp;nbsp; svc rekey method ssl&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; authentication-server-group LDAP_SRV_GRP&lt;BR /&gt;tunnel-group 216.133.173.98 type ipsec-l2l&lt;BR /&gt;tunnel-group 216.133.173.98 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 213.1.213.226 type ipsec-l2l&lt;BR /&gt;tunnel-group 213.1.213.226 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 203.52.44.138 type ipsec-l2l&lt;BR /&gt;tunnel-group 203.52.44.138 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group AnyConnectVPNCon type remote-access&lt;BR /&gt;tunnel-group AnyConnectVPNCon general-attributes&lt;BR /&gt; authentication-server-group LDAP_SRV_GRP&lt;BR /&gt; default-group-policy AnyConnectAccessPlc&lt;/P&gt;&lt;P&gt;If you have an idea on how to use the CSD and the RDP I would be most interested, as at this point I will end up rebuilding my RDP server into the DMZ, and pin-holing the firewall for it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Aug 2010 20:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437975#M660935</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-08-13T20:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: CSD and RDP Plugin</title>
      <link>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437976#M660961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, so if I now I understand the requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a user has a certain OS and Anti-Virus then you will permit&amp;nbsp; the user to have AnyConnect and if not they only receive the Web Portal where you have enabled the RDP plugin as a resource..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the case what you are trying to do I think you would benefit from checking out the SSL VPN Deployment Guide - specifically the 'Integrating Cisco Secure Desktop with DAP's' section.&amp;nbsp; &lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/ssl_vpn_deployment_guide/deploy.html#wp1128062"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/ssl_vpn_deployment_guide/deploy.html#wp1128062&lt;/A&gt;&lt;/P&gt;&lt;H3 class="p_H_Head2"&gt;&lt;/H3&gt;&lt;P class="p_H_Head2"&gt;&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Essentially you are going to end up with 3 DAP's with one of them being the default policy which in most cases would terminate the session if the user did not match the 2 preceding policies.&amp;nbsp; The first DAP would be the one where the user with AV would hit and be granted AnyConnect, the second would be where the users without AV would get Clientless access only thus being able to use RDP.&lt;/P&gt;&lt;P class="p_H_Head2"&gt;&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Good Luck.&lt;/P&gt;&lt;P class="p_H_Head2"&gt;&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Best regards&lt;/P&gt;&lt;P class="p_H_Head2"&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Aug 2010 00:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csd-and-rdp-plugin/m-p/1437976#M660961</guid>
      <dc:creator>Paul Carco</dc:creator>
      <dc:date>2010-08-15T00:00:51Z</dc:date>
    </item>
  </channel>
</rss>

