3-3
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 3 Managing the Device Inventory
Understanding the Device Inventory
Figure 3-2 Device Icons
Shortcut menu options—When you right-click a device or device group, you get a menu of
commands related to that device or group. These commands are shortcuts to commands available in
the regular menus.
Policy selector (2)—Contains the following:
Policy groups—Lists the policy groups that are supported on the selected device type. The policy
groups that are displayed are dependent on four factors:
The type of device selected in the Device selector.
The operating system running on the device.
The target operating system version selected for determining which commands will be available
for generated configurations.
Whether the device contains supported service modules.
For more information about policies, see Understanding Policies, page 5-1.
Shortcut menu options—When you right-click a policy, you get a menu of commands related to that
policy. These commands are shortcuts to commands available in the regular menus.
Contents pane (6)—The main content area.
The information displayed in this area depends on the device you select from the Device selector and the
option you select from the Policy selector.
Understanding Device Names and What Is Considered a Device
Besides managing traditional devices, you can use Security Manager to manage virtual devices that you
can define on some types of security devices. These virtual devices are treated as separate devices in the
device inventory, and they appear as separate entries in the device selectors. Because these virtual
devices actually reside on a host physical device, many actions, such as deployment, will have to include
the host device as well as the virtual device.
1Adaptive Security Appliances (ASA) 5Catalyst Switch
2PIX Firewall 6Catalyst 7600 Series Router
3Catalyst security Services Modules:
Firewall Services Module (FWSM) and
ASA-SM
7VPN 3000 Concentrator
4Cisco IOS Router 8Intrusion Prevention System (IPS)