Secure Client HostScan

The AnyConnect Posture Module provides the Secure Client the ability to identify the operating system, anti-malware and firewall software installed on the host. The HostScan application gathers this information. Posture assessment requires HostScan to be installed on the host.

Prerequisites for HostScan/Secure Firewall Posture

The Secure Client with the Secure Firewall Posture/HostScan module requires these minimum ASA components:

  • ASA 8.4

  • ASDM 6.4

You must install Secure Firewall Posture/HostScan to use the SCEP authentication feature.

Refer to Supported VPN Platforms, Cisco ASA Series for what operating systems are supported for Secure Firewall Posture/HostScan installation.

Licensing for HostScan

These are the Secure Client licensing requirements for the HostScan:

  • AnyConnect Apex

  • AnyConnect VPN Only

HostScan Packaging

You can load the HostScan package on to the ASA as a standalone package: hostscan-version.pkg. This file contains the HostScan software as well as the HostScan library and support charts.

Install or Upgrade HostScan/Secure Firewall Posture

Use this procedure to install or upgrade the HostScan or Secure Firewall Posture package and enable it using the command line interface for the ASA.

Before you begin


Note


If you are attempting to upgrade to HostScan version 4.6.x or later from a 4.3.x version or earlier, you will receive an error message due to the fact that all existing AV/AS/FW DAP policies and LUA script(s) that you have previously established are incompatible with HostScan 4.6.x or greater.

There is a one time migration procedure that must be done to adapt your configuration. This procedure involves leaving this dialog box to migrate your configuration to be comptaible with HostScan 4.4.x before saving this configuration. Abort this procedure and refer to the Secure Client HostScan 4.3.x to 4.6.x Migration Guide for detailed instructions. Briefly, migration involves navigating to the ASDM DAP policy page to review and manually deleting the incompatible AV/AS/FW attributes, and then reviewing and rewriting LUA scripts.


  • Log on to the ASA and enter global configuration mode. In global configuration mode, the ASA displays this prompt: hostname(config)#

  • Upload the secure-firewall-posture-version-k9.pkg to the ASA. If you are using HostScan 4.x version, you should upload the hostscan_version-k9.pkg file.

Procedure


Step 1

Enter webvpn configuration mode.

Example:


hostname(config)# webvpn

Step 2

Open ASDM and choose Configuration > Remote Access VPN > Posture (for Secure Firewall) > Posture Image. If you are using the HostScan 4.x version, the path will be Configuration > Remote Access VPN > Secure Desktop Manager > Host Scan Image.

Step 3

Specify the path to the package you want to designate as the HostScan/Secure Firewall Posture image. You can specify a standalone package or the Secure Client package.

hostscan image path

Example:

If you are using the HostScan 4.x version,

ASAName(webvpn)#hostscan image disk0:/hostscan_4.10.06081.pkg

If you are using the Secure Firewall Posture 5.x version,

ASAName(webvpn)#hostscan image disk0:/secure-firewall-posture5.0.00556.pkg

Step 4

Enable the HostScan/Secure Firewall Posture image you designated in the previous step.

Example:


ASAName(webvpn)#hostscan enable

Step 5

Save the running configuration to flash. After successfully saving the new configuration to flash memory, you receive the message [OK].

Example:


hostname(webvpn)# write memory

Step 6


Enable or Disable HostScan

These commands enable or disable an installed HostScan image using the command line interface of the ASA.

Before you begin

Log on to the ASA and enter global configuration mode. In global configuration mode, the ASA displays this prompt: hostname(config)#

Procedure


Step 1

Enter webvpn configuration mode.

Example:

webvpn

Step 2

Enable the standalone HostScan image if it has not been uninstalled from your ASA.

hostscan enable

Step 3

Disable HostScan for all installed HostScan packages.

Note

 

Before you uninstall the enabled HostScan image, you must first disable HostScan using this command.

no hostscan enable


View the HostScan/Secure Firewall Posture Version Enabled on the ASA

Use this procedure to determine the enabled HostScan/Secure Firewall Posture version using ASA’s command line interface.

Before you begin

Log on to the ASA and enter privileged exec mode. In privileged exec mode, the ASA displays this prompt: hostname#

Procedure


Show the version of HostScan/Secure Firewall Posture enabled on the ASA.

show webvpn hostscan


Uninstall HostScan/Secure Firewall Posture

Uninstalling HostScan/Secure Firewall Posture package removes it from view on the ASDM interface and prevents the ASA from deploying it even when it is enabled. Uninstalling HostScan/Secure Firewall Posture does not delete the package from the flash drive.

Before you begin

Log on to the ASA and enter global configuration mode. In global configuration mode, the ASA displays this prompt: hostname(config)#.

Procedure


Step 1

Enter webvpn configuration mode.

webvpn

Step 2

Disable the HostScan/Secure Firewall Posture image you want to uninstall.

no hostscanenable

Step 3

Specify the path to the HostScan/Secure Firewall Posture image you want to uninstall. A standalone package may have been designated as the HostScan/Secure Firewall Posture package.

no hostscan image path

Example:

If you are using the HostScan 4.x version,

ASAName(webvpn)#hostscan image disk0:/hostscan_4.10.06081-k9.pkg

If you are using the Secure Firewall Posture 5.x version,

ASAName(webvpn)#hostscan image disk0:/secure-firewall-posture-5.0.00556-k9.pkg

Step 4

Save the running configuration to flash.After successfully saving the new configuration to flash memory, you receive the message [OK].

write memory


Assign Secure Client Feature Modules to Group Policies

This procedure associates Secure Client feature modules with a group policy. When VPN users connect to the ASA, the ASA downloads and installs these Secure Client feature modules to their endpoint computer.

Before you begin

Log on to the ASA and enter global configuration mode. In global configuration mode, the ASA displays this prompt: hostname(config)#

Procedure


Step 1

Adds an internal group policy for Network Client Access

group-policy name internal

Example:


hostname(config)# group-policy PostureModuleGroup internal

Step 2

Edit the new group policy. After entering the command, you receive the prompt for group policy configuration mode, hostname(config-group-policy)#.

group-policy name attributes

Example:

hostname(config)# group-policy PostureModuleGroup attributes

Step 3

Enter group policy webvpn configuration mode. After you enter the command, the ASA returns this prompt: hostname(config-group-webvpn)#

webvpn

Step 4

Configure the group policy to download the Secure Client feature modules for all users in the group.

anyconnect modules value Secure Firewall Module Name

The value of the anyconnect module command can contain one or more of the following values. When specifying more than one module, separate the values with a comma:

value

Secure Firewall Module/Feature Name

dart

Secure Client DART (Diagnostics and Reporting Tool)

vpngina

Secure Client SBL (Start Before Logon)

posture

Secure Firewall Posture/HostScan

nam

Secure Client Network Access Manager

none

Used by itself to remove all AnyConnect modules from the group policy.

profileMgmt

Secure Client Management Tunnel VPN

Example:


hostname(config-group-webvpn)# anyconnect modules value websecurity,telemetry,posture

To remove one of the modules, re-send the command specifying only the module values you want to keep. For example, this command removes the websecurity module:


hostname(config-group-webvpn)# anyconnect modules value telemetry,posture

Step 5

Save the running configuration to flash.

After successfully saving the new configuration to flash memory, you receive the message [OK] and the ASA returns you to this prompt hostname(config-group-webvpn)#

write memory


HostScan/Secure Firewall Posture Related Documentation

Once HostScan/Secure Firewall Posture gathers the posture credentials from the endpoint computer, you will need to understand subjects like configuring dynamic access policies and using LUA expressions to make use of the information.

These topics are covered in detail in these documents: Cisco Adaptive Security Device Manager Configuration Guides. See also the Cisco Secure Client (including AnyConnect) Administrator Guide for more information about how HostScan/Secure Firewall Posture works with Secure Client.