Cisco Umbrella WLAN

Cisco Umbrella WLAN在域名系统(DNS)级别提供云交付网络安全服务,可自动检测已知和紧急威胁。

此功能允许您在实际恶意攻击之前阻止托管恶意软件,僵尸网络和网络钓鱼的站点。

Cisco Umbrella WLAN提供:

  • 单点的每用户组策略配置。
  • 对每个网络,每个组,用户,设备或IP地址的策略配置。

策略优先级顺序:
1、Local policy
2、AP group
3、WLAN

  • 可视化安全活动仪表板,实时汇总报告。
  • 安排并通过电子邮件发送报告。
  • 最多支持60个内容类别,并提供添加自定义白名单和黑名单条目的功能。

此功能在以下方案中不起作用:
1、如果应用程序或主机直接使用IP地址,而不是使用DNS来查询域名。
2、如果客户端连接到Web代理,但未发送DNS查询以解析服务器地址。

配置准备:

你需要拥有Cisco Umbrella的账户。

你应该有Cisco Umbrella 的API  token 。

配置步骤:

GUI配置:

上面是关联WLAN,也可以关联AP-Group

To map the profile to an AP group, choose WLANs > Advanced > AP Groups, select the corresponding AP group, click the WLAN tab, and mouse over the blue button and select OpenDNS Profile.

To view OpenDNS mapping, choose Security > OpenDNS > General and click the Profile Mapped Summary hyperlink.

Note 
Each Cisco Umbrella profile will have a unique openDNS-Identity generated on the controller (in the format WLC name _profile name). This will be pushed to the associated Cisco Umbrella account in the cloud.

What to do next

  1. From Cisco Umbrella Dashboard, verify that your Cisco WLC shows up under Device Name, along with their identities
  2. Create classification rules for the user roles, for example, rules for employees and nonemployees.
  3. Configure policies on the Cisco Umbrella server.

CLI配置:

Step 1
config network dns serverip server-ip

Example:

(Cisco Controller) > config network dns serverip 208.67.222.222

Configures the DNS server IP address of the network.

Step 2
config opendns enable

Example:

(Cisco Controller) > config opendns enable

Enables the Cisco Umbrella global configuration.

Step 3
config opendns api-token api-token

Example:

(Cisco Controller) > config opendns api-token D72996C18DC334FB2E3AA46148D600A4001E5997

Registers the Cisco Umbrella API token on the network.

Step 4
config opendns profile create profilename

Example:

(Cisco Controller) > config opendns profile create profile1

Creates an Cisco Umbrella profile that can be applied over a WLAN.

Step 5
config wlan opendns-profile wlan-id profile-name enable

Example:

(Cisco Controller) > config wlan opendns-profile wlan1 profile1 enable

Applies the Cisco Umbrella profile to a WLAN.

Step 6
config wlan apgroup opendns-profile wlan-id site-name profile-name enable

Example:

(Cisco Controller) >config wlan apgroup opendns-profile wlan1 apgrp1 profile1

(Optional) Applies the Cisco Umbrella profile to an AP group with the WLAN.

Step 7
config policy policy-name create

Example:

(Cisco Controller) > config policy ipad create 

Creates a policy name.

In Cisco WLC, policy is generic term that specifies a rule and the associated action when that rule criteria is met for given client.

You can create policy and have rule on that by saying if the rolename from AAA server comes as employee take an action to apply Cisco Umbrella profile associated to that policy. Cisco Umbrella profile is applied to the client if the WLAN of that client is mapped for this policy.

Step 8
config policy policy-name action opendns-profile-name enable

Example:

(Cisco Controller) > config policy ipad action opendns-profile-name enable 

Attaches the policy name to the Cisco Umbrella profile.

接下来:

在opendns.com中配置策略。

根据每个配置文件的类别配置粒度策略以阻止站点(配置文件列为标识)。

为每个配置文件添加白名单和黑名单规则

Configuring Local Policies for Cisco Umbrella (GUI)

When mapped to local policy, the Cisco Umbrella allows for a granular differentiated user browsing experience based on dynamic evaluation of attributes (user role, device type, and so on).

Use this procedure to configure user role based local policy and tie the corresponding Cisco Umbrella profile to it. This procedure also provides information about how to map a local policy to a WLAN.

Procedure


Step 1
Choose Security > Local Policies > New.

This opens the new policy creation page.

  1. In the Policy Name field, enter the local policy name.
  2. Click Apply.
Step 2
From the policies listed under Policy List, choose a Policy Name to configure the Cisco Umbrella profile.

  1. From the Match Criteria sub-section, enter the Match Role String.
  2. From the Action sub-section, select the required option from the OpenDNS Profile drop-down list.
  3. Click Apply.
Step 3
Choose WLAN > WLAN ID > Policy Mapping.

  1. In the Priority Index field, enter the priority index number.
  2. From the Local Policy drop-down list, choose a value.
  3. Click Add.
   

原文地址:https://www.cnblogs.com/MomentsLee/p/10504941.html

时间: 2024-11-26 00:43:27

Cisco Umbrella WLAN的相关文章

史上最大CPU缺陷Meltdown融毁和Spectre幽灵来袭,各网络设备厂家反馈以及解决方案汇总

2018新年快乐 新年好,转眼就到了2018.首先祝福大家新年快乐,万事如意! 热闹的一月 就在大家刚享受完短暂的元旦假期,1月3号互联网上就爆出了一个非常劲爆的消息,Intel,AMD,ARM的CPU暴露两个重大Bug,分别称为Meltdown融毁以及Spectre幽灵,当今所有的CPU都暴露在此Bug之下.攻击者可以通过这些Bug在CPU层面获取包括密码等个人敏感信息. Meltdown融毁和Spectre幽灵攻击简介 若要详细展开说融毁和幽灵攻击的原理,一时半会也说不完.有兴趣的可以阅读G

利用PRTG实现对cisco路由器的cpu负载、端口流量等的监控

一.实验目的及前期准备 用gns3.vmware模拟真实的环境,利用prtg实现对cisco路由器状态的监控 前期准备:GNS3仿真路由软件和VMware虚拟软件,PRTG. 二.实验步骤 1)搭建如下拓扑环境 VMware server有2张网卡,一张(out)桥接到真实主机(Windows7)的网卡,另一张(in)连接到GNS3的R1路由器的e1/0上:R1路由器的e1/1和VMwar winxp的网卡相连. a)VMware安装一个server2003系统和一个xp系统,并虚拟3张虚拟网卡

cisco learn book index

------------------------------------------------------------------ Routing TCP/IP Volume 1 , Second Edition ------------------------------------------------------------------ Routing TCP/IP Volume 2 ---------------------------------------------------

Cisco 的基本配置实例之六----常排错命令

TEST#terminal monitor # 排除网络故障以前,请打开这一命令以便实时的接收到交换机的提示信息. TEST# TEST#sh run #显示所有的配置清单,可将这些配置保存成文本作为交换机的配置备份. Building configuration... Current configuration : 9200 bytes ! version 12.2 no service pad service timestamps debug uptime service timestamp

网络技术Cisco知识点

1,星型拓扑图和网型拓扑的区别?星型拓扑:易于实现,易于扩展,易于故障排查,但中心节点压力大,组网成本高,节点与中心节点直接相连网型拓扑:与星型拓扑相反2,简述IEEE802.3u ,IEEE802.3z标准IEEE802.3u:100m/s快速以太网标准IEEE802.3z:光纤介质实现1Gb/s以太网标准3,二进制转换:1 2 4 8 16 32 64 128 512 10244,osi参考模型分为哪七层?应用层,表示层,会话层,传输层,网络层,数据链路层,物理层5,数据帧是哪一层?数据链路

如何使用GNS3和Cisco IOU搭建路由交换实验-IOU篇

前面介绍了GNS3的概念,安装,配置和使用,本篇将介绍怎么利用GNS3配置IOU从而实现使用GNS3和Cisco IOU搭建路由交换实验. 由于本篇篇幅较长,所以先过一下大纲: 1. IOU模拟环境介绍 2. IOU软件环境的准备 3. VMware虚拟机的安装.导入和配置 4. IOU镜像的上传 5. GNS3的配置 6. IOU模拟环境的实现 IOU模拟环境介绍 IOU即IOS running in Unix,最初是由思科内部人员开发来测试IOS的平台,后来流传到互联网经网友改进有了后来的W

Cisco ISE + Windows Server 2008 实验

实验说明:此实验参考生产环境中某部分环境搭建而成,此环境Windows Server 2008用于登录用户.MAC等账号的认证,Cisco ISE用于认证授权等,无线部分利用VMWLC + Cisco 1702AP测试测试.因为为实验环境,整体网络架构所有节点为单点:Cisco ISE部分功能没有应用上,如测试PC端的补丁.防毒补丁.设备认证等(此部分在生产环境上实施),下图为此实验的网络架构图. Windows AD:  172.16.1.199 Cisco VMISE: 172.16.1.1

1、CISCO交换机QOS限速配置

CISCO交换机QOS限速配置步骤: 1.启用全局qos 2.设置ACL匹配的流量 3.设置一个class-map,来匹配第二步设置的ACL 4.设置一个policy-map匹配class-map,然后再在这里面定义一系列策略,限制的带宽按位(bit)为计算,突发量按字节(byte)计算 5.将policy-map应用到相应的接口上 mls qos ip access-list extended list83 permit ip host 192.168.120.83 any class-map

IterCast教程全套教程:涵Linux,Cisco,数据库等

IterCast教程全套教程:涵Linux,Cisco,数据库等 下载地址:http://pan.baidu.com/s/1pJ2m7Mj