Main
User Guide for Cisco Security Manager 4.4
Page
CONTENTS
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Preface
Conventions
Page
Page
Page
Getting Started with Security Manager
Product Overview
Primary Benefits of Cisco Security Manager
Page
Security Manager Policy Feature Sets
Page
Security Manager Applications Overview
Device Monitoring Overview
IPv6 Support in Security Manager
Page
Policy Object Changes in Security Manager 4.4
Logging In to and Exiting Security Manager
Understanding User Permissions
Logging In to the Cisco Security Management Suite Server
Logging In to and Exiting the Security Manager Client
Using Configuration Manager - Overview
Configuration Manager Overview
Device View Overview
Policy View Overview
Page
Map View Overview
Task Flow for Configuring Security Policies
Policy and Policy Object Overview
Workflow and Activities Overview
Working in Workflow Mode
Working in Non-Workflow Mode
Comparing Workflow Modes
Page
Using the JumpStart to Learn About Security Manager
Completing the Initial Security Manager Configuration
Page
Configuring an SMTP Server and Default Addresses for E-Mail Notifications
Changing Workflow Modes
Understanding Basic Security Manager Interface Features
Menu Bar Reference for Configuration Manager
File Menu (Configuration Manager)
Edit Menu (Configuration Manager)
View Menu (Configuration Manager)
Policy Menu (Configuration Manager)
Map Menu (Configuration Manager)
Manage Menu (Configuration Manager)
Tools Menu (Configuration Manager)
Activities Menu (Configuration Manager)
Tickets Menu (Configuration Manager)
Launch Menu (Configuration Manager)
Help Menu (Configuration Manager)
Toolbar Reference (Configuration Manager)
Page
Page
Using Global Search
Page
Page
Using Selectors
Filtering Items in Selectors
Create Filter Dialog Box
Using Wizards
Using Tables
Filtering Tables
Table Columns and Column Heading Features
Using Text Fields
Understanding ASCII Limitations for Text
Finding Text in Text Boxes
Navigating Within Text Boxes
Selecting or Specifying a File or Directory in Security Manager
Troubleshooting User Interface Problems
Accessing Online Help
Page
Preparing Devices for Management
Understanding Device Communication Requirements
Page
Setting Up SSL (HTTPS)
Setting Up SSL (HTTPS) on PIX Firewall, ASA and FWSM Devices
Setting Up SSL on Cisco IOS Routers
Setting Up SSH
Critical Line-Ending Conventions for SSH
Testing Authentication
Setting Up SSH on Cisco IOS Routers, Catalyst Switches, and Catalyst 6500/7600 devices
Preventing Non-SSH Connections (Optional)
Setting Up AUS or Configuration Engine
Setting Up AUS on PIX Firewall and ASA Devices
Setting Up CNS on Cisco IOS Routers in Event-Bus Mode
Setting Up CNS on Cisco IOS Routers in Call-Home Mode
Configuring Licenses on Cisco ASA Devices
Configuring Licenses on Cisco IOS Devices
Initializing IPS Devices
Page
Page
Managing the Device Inventory
Understanding the Device Inventory
Understanding the Device View
Page
Understanding Device Names and What Is Considered a Device
Understanding Device Credentials
Page
Understanding Device Properties
Adding Devices to the Device Inventory
Page
Working with Generically Supported Devices
Working with Device Clusters
Page
Adding Devices from the Network
Page
Device Information Page Add Device from Network
Page
Page
Page
Page
Service Module Credentials Dialog Box
IPS Module Discovery Dialog Box
Adding Devices from Configuration Files
Page
Device Information PageConfiguration File
Page
Page
Adding Devices by Manual Definition
Device Information PageNew Device
Page
Page
Adding Devices from an Inventory File
Page
Device Information PageAdd Device from File
Page
Page
Working with the Device Inventory
Adding, Editing, or Deleting Auto Update Servers or Configuration Engines
Server Properties Dialog Box
Page
Available Servers Dialog Box
Adding or Changing Interface Modules
Viewing or Changing Device Properties
Device Properties: General Page
Page
Page
Page
Device Credentials Page
Page
RX-Boot Mode Credentials Dialog Box
SNMP Credentials Dialog Box
Device Groups Page
Cluster Information Page
Policy Object Override Pages
Changing Critical Device Properties
Image Version Changes That Do Not Change the Feature Set in Security Manager
Changes That Change the Feature Set in Security Manager
Page
Showing Device Containment
Cloning a Device
Deleting Devices from the Security Manager Inventory
Device Delete Validation Dialog Box
Working with Device Groups
Understanding Device Grouping
Edit Device Groups Dialog Box
Creating Device Group Types
Creating Device Groups
Deleting Device Groups or Group Types
Adding Devices to or Removing Them From Device Groups
Working with Device Status View
Page
Page
Page
Managing Activities
Understanding Activities
Benefits of Activities
Activity Approval
Activities and Locking
Activities and Multiple Users
Understanding Activity/Ticket States
Page
4-6
4-7
Working with Activities/Tickets
The following topics provide information to help you use activities and configuration sessions:
Accessing Activity Functions in Workflow Mode
Accessing Ticket Functions in Non-Workflow Mode
Activity/Ticket Manager Window
Page
Page
Page
Creating an Activity/Ticket
Responding to the Activity/Ticket Required Dialog Box
Opening an Activity/Ticket
Closing an Activity/Ticket
Viewing Change Reports
Page
Selecting a Change Report in Non-Workflow Mode with Ticket Management Disabled
Validating an Activity/Ticket
Page
Submitting an Activity for Approval (Workflow Mode with Activity Approver)
Approving or Rejecting an Activity (Workflow Mode)
Discarding an Activity/Ticket
Viewing Activity/Ticket Status and History
Page
Managing Policies
Understanding Policies
Settings-Based Policies vs. Rule-Based Policies
Service Policies vs. Platform-Specific Policies
Local Policies vs. Shared Policies
Understanding Rule Inheritance
Page
Inheritance vs. Assignment
Policy Management and Objects
Understanding Policy Locking
Page
Understanding Locking and Policies
Understanding Locking and VPN Topologies
Understanding Locking and Objects
Customizing Policy Management for Routers and Firewall Devices
Page
Discovering Policies
Page
Page
Discovering Policies on Devices Already in Security Manager
Page
Page
Create Discovery Task and Bulk Rediscovery Dialog Boxes
Page
Page
Viewing Policy Discovery Task Status
Discovery Status Dialog Box
Page
Policy Discovery Status Page
Page
Frequently Asked Questions about Policy Discovery
Page
Page
Managing Policies in Device View and the Site-to-Site VPN Manager
Policy Status Icons
Performing Basic Policy Management
Configuring Local Policies in Device View
Page
Copying Policies Between Devices
Page
Unassigning a Policy
Working with Shared Policies in Device View or the Site-to-Site VPN Manager
Using the Policy Banner
Page
Policy Shortcut Menu Commands in Device View and the Site-to-Site VPN Manager
Sharing a Local Policy
Sharing Multiple Policies of a Selected Device
Unsharing a Policy
Assigning a Shared Policy to a Device or VPN Topology
Adding Local Rules to a Shared Policy
Inheriting or Uninheriting Rules
Cloning (Copying) a Shared Policy
Renaming a Shared Policy
Modifying Shared Policy Definitions in Device View or the Site-to-Site VPN Manager
Modifying Shared Policy Assignments in Device View or the Site-to-Site VPN Manager
Managing Shared Policies in Policy View
Page
Policy View Selectors
Policy ViewShared Policy Selector Options
Creating a New Shared Policy
Modifying Policy Assignments in Policy View
Page
Deleting a Shared Policy
Managing Policy Bundles
Creating a New Policy Bundle
Cloning a Policy Bundle
Renaming a Policy Bundle
Assigning Policy Bundles to Devices
Managing Policy Objects
Selecting Objects for Policies
Page
Policy Object Manager
Page
Page
Page
Policy Object Manager: Undocking and Docking
Policy Object Manager Shortcut Menu
Working with Policy ObjectsBasic Procedures
Creating Policy Objects
Page
Page
Editing Objects
Using Category Objects
Cloning (Duplicating) Objects
Viewing Object Details
Generating Object Usage Reports
Page
Deleting Objects
Managing Object Overrides
Understanding Policy Object Overrides for Individual Devices
Allowing a Policy Object to Be Overridden
Creating or Editing Object Overrides for a Single Device
Creating or Editing Object Overrides for Multiple Devices At A Time
Policy Object Overrides Window
Deleting Device-Level Object Overrides
Importing and Exporting Policy Objects
Page
Page
Understanding AAA Server and Server Group Objects
Supported AAA Server Types
Additional AAA Support on ASA, PIX, and FWSM Devices
Page
Predefined AAA Authentication Server Groups
Default AAA Server Groups and IOS Devices
Creating AAA Server Objects
Add or Edit AAA Server Dialog Box
Page
AAA Server Dialog BoxRADIUS Settings
Page
Page
AAA Server Dialog BoxTACACS+ Settings
AAA Server Dialog BoxKerberos Settings
AAA Server Dialog BoxLDAP Settings
Page
Page
AAA Server Dialog BoxNT Settings
AAA Server Dialog BoxSDI Settings
AAA Server Dialog BoxHTTP-FORM Settings
Page
Add and Edit LDAP Attribute Map Dialog Boxes
Add and Edit LDAP Attribute Map Value Dialog Boxes
Add and Edit Map Value Dialog Boxes
Creating AAA Server Group Objects
AAA Server Group Dialog Box
Page
Page
Creating Access Control List Objects
Creating Extended Access Control List Objects
Creating Standard Access Control List Objects
Creating Web Access Control List Objects
Page
Creating Unified Access Control List Objects
Add or Edit Access List Dialog Boxes
Add and Edit Extended Access Control Entry Dialog Boxes
Page
Page
Add and Edit Standard Access Control Entry Dialog Boxes
Add and Edit Web Access Control Entry Dialog Boxes
Page
Add and Edit Unified Access Control Entry Dialog Boxes
Page
Page
Page
Configuring Time Range Objects
Recurring Ranges Dialog Box
Understanding Interface Role Objects
Creating Interface Role Objects
Interface Role Dialog Box
Specifying Interfaces During Policy Definition
Using Interface Roles When a Single Interface Specification is Allowed
Handling Name Conflicts between Interfaces and Interface Roles
Understanding Map Objects
Page
Understanding Networks/Hosts Objects
Contiguous and Discontiguous Network Masks for IPv4 Addresses
Creating Networks/Hosts Objects
Add or Edit Network/Host Dialog Box
Page
Page
Using Unspecified Networks/Hosts Objects
Specifying IP Addresses During Policy Definition
Page
Understanding Pool Objects
Add or Edit IPv4 Pool Dialog Box
Add or Edit IPv6 Pool Dialog Box
Add or Edit MAC Address Pool Dialog Box
Understanding and Specifying Services and Service and Port List Objects
Configuring Port List Objects
Page
Configuring Service Objects
Page
How Policy Objects are Provisioned as Object Groups
How Network/Host, Port List, and Service Objects are Named When Provisioned As Object Groups
How Service Objects are Provisioned as Object Groups
Page
Page
Managing FlexConfigs
Understanding FlexConfig Policies and Policy Objects
Using CLI Commands in FlexConfig Policy Objects
Using Scripting Language Instructions
Scripting Language Example 1: Looping
Scripting Language Example 2: Looping with Two-Dimensional Arrays
7-4
Object Body
Example 3: Looping with If/Else Statements
Object Body
CLI Output
Understanding FlexConfig Object Variables
Example of FlexConfig Policy Object Variables
FlexConfig System Variables
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Predefined FlexConfig Policy Objects
Page
Page
Page
Page
Configuring FlexConfig Policies and Policy Objects
A FlexConfig Creation Scenario
Page
Page
Creating FlexConfig Policy Objects
Page
Add or Edit FlexConfig Dialog Box
Page
Create Text Object Dialog Box
Add or Edit Text Object Dialog Box
FlexConfig Undefined Variables Dialog Box
Property Selector Dialog Box
Editing FlexConfig Policies
FlexConfig Policy Page
Values Assignment Dialog Box
FlexConfig Preview Dialog Box
Troubleshooting FlexConfigs
Page
Managing Deployment
Understanding Deployment
Overview of the Deployment Process
Page
Deployment in Non-Workflow Mode
Deployment Task Flow in Non-Workflow Mode
Job States in Non-Workflow Mode
Deployment in Workflow Mode
Deployment Task Flow in Workflow Mode
Job States in Workflow Mode
Deployment Job Approval
Deployment Jobs and Multiple Users
Including Devices in Deployment Jobs or Schedules
Understanding Deployment Methods
Deploying Directly to a Device
Deploying to a Device through an Intermediate Server
Deploying to a File
Understanding How Out-of-Band Changes are Handled
Handling Device OS Version Mismatches
Page
Page
Overview of the Deployment Manager and Configuration Archive
Understanding What You Can Do with the Deployment Manager
Deployment Manager Window
Page
Page
Page
Deployment Workflow Commentary Dialog Box
Deployment Schedules Tab, Deployment Manager
Page
Configuration Archive Window
Page
Working with Deployment and the Configuration Archive
Viewing Deployment Status and History for Jobs and Schedules
Tips for Successful Deployment Jobs
Deploying Configurations in Non-Workflow Mode
Page
Edit Deploy Method Dialog Box
Warning - Partial VPN Deployment Dialog Box
Deployment Status Details Dialog Box
Page
Deploying Configurations in Workflow Mode
Creating and Editing Deployment Jobs
Page
Page
Submitting Deployment Jobs
Approving and Rejecting Deployment Jobs
Deploying a Deployment Job in Workflow Mode
Discarding Deployment Jobs
Deploying Configurations Using an Auto Update Server or CNS Configuration Engine
Deploying Configurations to a Token Management Server
Page
Previewing Configurations
Detecting and Analyzing Out of Band Changes
Page
OOB (Out of Band) Changes Dialog Box
Redeploying Configurations to Devices
Page
Aborting Deployment Jobs
Creating or Editing Deployment Schedules
Schedule Dialog Box
Add Other Devices Dialog Box
Suspending or Resuming Deployment Schedules
Adding Configuration Versions from a Device to the Configuration Archive
Viewing and Comparing Archived Configuration Versions
Configuration Version Viewer
Page
Viewing Deployment Transcripts
Rolling Back Configurations
Understanding Configuration Rollback
Page
Understanding Rollback for Devices in Multiple Context Mode
Understanding Rollback for Failover Devices
Understanding Rollback for Catalyst 6500/7600 Devices
Understanding Rollback for IPS and IOS IPS
Page
Commands that Can Cause Conflicts after Rollback
Commands to Recover from Failover Misconfiguration after Rollback
Rolling Back Configurations to Devices Using the Deployment Manager
Using Rollback to Deploy Archived Configurations
Performing Rollback When Deploying to a File
Page
Troubleshooting Device Communication and Deployment
Testing Device Connectivity
Page
Device Connectivity Test Dialog Box
Managing Device Communication Settings and Certificates
Manually Adding SSL Certificates for Devices that Use HTTPS Communications
Page
Security Certificate Rejected When Discovering Device
Invalid Certificate Error During Device Discovery
Troubleshooting SSH Connection Problems
Troubleshooting Device Communication Failures
Resolving Red X Marks in the Device Selector
Troubleshooting Deployment
Changing How Security Manager Responds to Device Messages
Memory Violation Deployment Errors for ASA 8.3+ Devices
Error While Attempting to Remove Unreferenced Object
Security Manager Unable to Communicate With Device After Deployment
Updating VPNs That Include Routing Processes
Mixing Deployment Methods with Router and VPN Policies
Deployment Failures for Routers
Deployment Failures for Catalyst Switches and Service Modules
Page
Changing How Security Manager Deploys Configurations to Multiple-Context FWSM
Deployment Failures to Devices Managed by AUS
Troubleshooting the Setup of Configuration Engine-Managed Devices
Page
Page
Managing the Security Manager Server
Overview of Security Manager Server Management and Administration
Managing a Cluster of Security Manager Servers
Overview of Security Manager Server Cluster Management
Splitting a Security Manager Server
Synchronizing Shared Policies Among Security Manager Servers
Exporting the Device Inventory
Exporting the Device Inventory from the Security Manager Client
Page
Page
Supported CSV Formats for Inventory Import/Export
Exporting the Device Inventory from the Command Line
Exporting Shared Policies
Page
Importing Policies or Devices
Page
Page
Installing Security Manager License Files
Certificate Trust Management
Page
Working with Audit Reports
Understanding Audit Reports
Generating the Audit Report
Using the Audit Report Window
Page
Purging Audit Log Entries
Taking Over Another Users Work
Changing Passwords for the Admin or Other Users
Backing up and Restoring the Security Manager Database
Backing Up the Server Database
Page
Restoring the Server Database
Generating Data for the Cisco Technical Assistance Center
Creating a Diagnostics File for the Cisco Technical Assistance Center
Generating Deployment or Discovery Status Reports
Generating a Partial Database Backup for the Cisco Technical Assistance Center
Page
Configuring Security Manager Administrative Settings
API Settings Page
AutoLink Settings Page
Configuration Archive Page
CS-MARS Page
New or Edit CS-MARS Device Dialog Box
Customize Desktop Page
Page
Debug Options Page
Deployment Page
Page
Page
Page
Page
Page
Page
Page
Device Communication Page
Page
Page
Add Certificate Dialog Box
Device Groups Page
Discovery Page
Page
Event Management Page
Page
Page
Health and Performance Monitoring Page
Identity Settings Page
Page
Image Manager Page
Page
IPS Updates Page
Page
Page
Page
Page
Edit Update Server Settings Dialog Box
Page
Edit Auto Update Settings Dialog Box
Edit Signature Download Filter Settings Dialog Box
ISE Settings Page
Licensing Page
CSM Tab, Licensing Page
IPS Tab, Licensing Page
Page
Verifying IPS Devices for License Update or Redeployment
Selecting IPS License Files
License Update Status Details Dialog Box
Logs Page
Policy Management Page
Page
Policy Objects Page
Rule Expiration Page
Server Security Page
Take Over User Session Page
Ticket Management Page
Token Management Page
VPN Policy Defaults Page
Workflow Page
Page
Wall Settings Page
Page
Page
Page
Page
Page
Introduction to Firewall Services
Overview of Firewall Services
Understanding the Processing Order of Firewall Rules
Understanding How NAT Affects Firewall Rules
ACL Names Preserved by Security Manager
ACL Naming Conventions
Resolving ACL Name Conflicts Between Policies
Managing Your Rules Tables
Using Rules Tables
Page
Adding and Removing Rules
Editing Rules
Page
Adding or Editing Address Cells in Rules Tables
Adding or Editing User Cells in Rules Tables
Adding or Editing Services Cells in Rules Tables
Adding or Editing Interfaces or Zones Cells in Rules Tables
Editing Category Cells in Rules Tables
Editing Description Cells in Rules Tables
Showing the Contents of Cells in Rules Tables
Page
Finding and Replacing Items in Rules Tables
Find and Replace Dialog Box
Page
Moving Rules and the Importance of Rule Order
Enabling and Disabling Rules
Using Sections to Organize Rules Tables
Page
Add and Edit Rule Section Dialog Boxes
Combining Rules
Page
Combine Rules Selection Summary Dialog Box
Interpreting Rule Combiner Results
Page
Example Rule Combiner Results
Converting IPv4 Rules to Unified Rules
Generating Policy Query Reports
Querying Device or Policy Dialog Box
Page
Page
Interpreting Policy Query Results
Page
Example Policy Query Result
Optimizing Network Object Groups When Deploying Firewall Rules
Expanding Object Groups During Discovery
Page
Managing Identity-Aware Firewall Policies
Overview of Identity-Aware Firewall Policies
User Identity Acquisition
Requirements for Identity-Aware Firewall Policies
Page
Page
Page
Configuring the Firewall to Provide Identity-Aware Services
Configuring Identity-Aware Firewall Policies
Enabling Identity-Aware Firewall Services
Identifying Active Directory Servers and Agents
Page
Domain AD Server Dialog Box
Identity Configuration Wizard Active Directory Settings
Page
Identity Configuration Wizard Active Directory Agent
Page
Identity Configuration Wizard Preview
Configuring Identity Options
Page
Page
Page
Creating Identity User Group Objects
Page
Selecting Identity Users in Policies
Configuring Identity-Based Firewall Rules
Page
Configuring Cut-Through Proxy
Page
Collecting User Statistics
Filtering VPN Traffic with Identity-Based Rules
Monitoring Identity Firewall Policies
Page
Managing TrustSec Firewall Policies
Overview of TrustSec Firewall Policies
Understanding SGT and SXP Support in Cisco TrustSec
Roles in the Cisco TrustSec Solution
Security Group Policy Enforcement
Page
Page
About Speaker and Listener Roles
Prerequisites for Integrating an ASA with Cisco TrustSec
Configuring TrustSec Firewall Policies
Configuring Cisco TrustSec Services
Configuring Security Exchange Protocol (SXP) Settings
Defining SXP Connection Peers
Add/Edit Connection Peer Dialog Box
Page
Creating Security Group Objects
Selecting Security Groups in Policies
Configuring TrustSec-Based Firewall Rules
Monitoring TrustSec Firewall Policies
Managing Firewall AAA Rules
Understanding AAA Rules
Understanding How Users Authenticate
Page
Configuring AAA Rules for ASA, PIX, and FWSM Devices
Page
Page
Configuring AAA Rules for IOS Devices
Page
Page
AAA Rules Page
Page
Page
Add and Edit AAA Rule Dialog Boxes
Page
Page
Page
Page
Edit AAA Option Dialog Box
AuthProxy Dialog Box
Edit Server Group Dialog Box
AAA Firewall Settings Policies
AAA Firewall Settings Page, Advanced Setting Tab
Page
Interactive Authentication Configuration Dialog Box
Clear Connection Configuration Dialog Box
AAA Firewall Page, MAC-Exempt List Tab
Firewall AAA MAC Exempt Setting Dialog Box
AAA Page
Page
Firewall AAA IOS Timeout Value Setting
Page
Page
Page
Managing Firewall Access Rules
Understanding Access Rules
Page
Understanding Global Access Rules
Understanding Device Specific Access Rule Behavior
Understanding Access Rule Address Requirements and How Rules Are Deployed
Page
Configuring Access Rules
Page
Access Rules Page
Page
Page
Page
Add and Edit Access Rule Dialog Boxes
Page
Advanced and Edit Options Dialog Boxes
Page
Page
Hit Count Selection Summary Dialog Box
Configuring Expiration Dates for Access Rules
Configuring Settings for Access Control
Access Control Settings Page
Page
Firewall ACL Setting Dialog Box
Page
Using Automatic Conflict Detection
Understanding Automatic Conflict Detection
Page
Understanding the Automatic Conflict Detection User Interface
Page
Page
Page
Resolving Conflicts
Page
Viewing Hit Count Details
Page
Sample Hit Count Details Window
Page
Importing Rules
Import Rules WizardEnter Parameters Page
Import Rules WizardStatus Page
Import Rules WizardPreview Page
Examples of Imported Rules
Page
Optimizing Access Rules Automatically During Deployment
Page
Page
Page
Managing Firewall Inspection Rules
Understanding Inspection Rules
Choosing the Interfaces for Inspection Rules
Selecting Which Protocols To Inspect
Understanding Access Rule Requirements for Inspection Rules
Using Inspection To Prevent Denial of Service (DoS) Attacks on IOS Devices
Configuring Inspection Rules
Page
Inspection Rules Page
Page
Page
Add or Edit Inspect/Application FW Rule Wizard
Page
Add or Edit Inspect/Application FW Rule Wizard, Step 2
Page
Page
Page
Add or Edit Inspect/Application FW Rule Wizard, Inspected Protocol Page
Page
Configure DNS Dialog Box
Configure SMTP Dialog Box
Configure ESMTP Dialog Box
Configure Fragments Dialog Box
Configure IMAP or POP3 Dialog Boxes
Configure RPC Dialog Box
Custom Protocol Dialog Box
Configure Dialog Box
Configuring Protocols and Maps for Inspection
Page
Page
Page
Page
Configuring Class Maps for Inspection Policies
Configuring DCE/RPC Maps
Configuring DNS Maps
Page
DNS Map Protocol Conformance Tab
DNS Map Filtering Tab
DNS Class and Policy Maps Add or Edit Match Condition (and Action) Dialog Boxes
Page
Page
Configuring ESMTP Maps
ESMTP Policy Maps Add or Edit Match Condition and Action Dialog Boxes
Page
Configuring FTP Maps
FTP Class and Policy Maps Add or Edit Match Condition (and Action) Dialog Boxes
Page
Configuring GTP Maps
Page
Add and Edit Country Network Codes Dialog Boxes
Add and Edit Permit Response Dialog Boxes
GTP Map Timeouts Dialog Box
GTP Policy Maps Add or Edit Match Condition and Action Dialog Boxes
Page
Configuring H.323 Maps
Page
Add or Edit HSI Group Dialog Boxes
Add or Edit HSI Endpoint IP Address Dialog Boxes
H.323 Class and Policy Maps Add or Edit Match Condition (and Action) Dialog Boxes
Page
Configuring HTTP Maps for ASA 7.1.x, PIX 7.1.x, FWSM 3.x and IOS Devices
HTTP Map General Tab
HTTP Map Entity Length Tab
Page
HTTP Map RFC Request Method Tab
HTTP Map Extension Request Method Tab
HTTP Map Port Misuse Tab
HTTP Map Transfer Encoding Tab
Configuring HTTP Maps for ASA 7.2+ and PIX 7.2+ Devices
Page
Page
Page
Page
Page
Configuring IM Maps for ASA 7.2+, PIX 7.2+ Devices
IM Class and Policy Map (ASA 7.2+/PIX 7.2+) Add or Edit Match Condition (and Action) Dialog Boxes
Page
Configuring IM Maps for IOS Devices
Configuring IP Options Maps
Page
Configuring IPv6 Maps
IPv6 Policy Maps Add or Edit Match Condition and Action Dialog Boxes
Page
Page
Configuring IPsec Pass Through Maps
Configuring NetBIOS Maps
Configuring ScanSafe Maps
Configuring SIP Maps
Page
SIP Class and Policy Maps Add or Edit Match Condition (and Action) Dialog Boxes
Page
Configuring Skinny Maps
Page
Skinny Policy Maps Add or Edit Match Condition and Action Dialog Boxes
Configuring SNMP Maps
Configuring Regular Expression Groups
Configuring Regular Expressions for Inspection Maps
Metacharacters Used to Build Regular Expressions
Configuring Settings for Inspection Rules for IOS Devices
Page
Page
Page
Page
Managing Firewall Web Filter Rules
Understanding Web Filter Rules
Configuring Web Filter Rules for ASA, PIX, and FWSM Devices
Web Filter Rules Page (ASA/PIX/FWSM)
Page
Add and Edit PIX/ASA/FWSM Web Filter Rule Dialog Boxes
Page
Page
Edit Web Filter Type Dialog Box
Edit Web Filter Options Dialog Box
Configuring Web Filter Rules for IOS Devices
Web Filter Rules Page (IOS)
Page
IOS Web Filter Rule and Applet Scanner Dialog Box
IOS Web Filter Exclusive Domain Name Dialog Box
Configuring Settings for Web Filter Servers
Web Filter Settings Page
Page
Page
Web Filter Server Configuration Dialog Box
Page
Managing Firewall Botnet Traffic Filter Rules
Understanding Botnet Traffic Filtering
Task Flow for Configuring the Botnet Traffic Filter
Page
Configuring the Dynamic Database
Adding Entries to the Static Database
Enabling DNS Snooping
Enabling Traffic Classification and Actions for the Botnet Traffic Filter
Page
Page
Botnet Traffic Filter Rules Page
Dynamic Blacklist Configuration Tab
Traffic Classification Tab
BTF Enable Rules Editor
BTF Drop Rules Editor
Whitelist/Blacklist Tab
Device Whitelist or Device Blacklist Dialog Box
Page
Working with ScanSafe Web Security
Configuring ScanSafe Web Security
Page
ScanSafe Web Security Page
Page
Add and Edit Default User Groups Dialog Box
ScanSafe Web Security Settings Page
Page
Page
Managing Zone-based Firewall Rules
Page
Understanding the Zone-based Firewall Rules
Page
The Self Zone
Using VPNs with Zone-based Firewall Policies
Zones and VRF-aware Firewalls
Understanding the Relationship Between Permit/Deny and Action in Zone-based Firewall Rules
Page
Page
Understanding the Relationship Between Services and Protocols in Zone-based Firewall Rules
General Recommendations for Zone-based Firewall Rules
Developing and Applying Zone-based Firewall Rules
Adding Zone-Based Firewall Rules
Page
Page
Configuring Inspection Maps for Zone-based Firewall Policies
Page
Configuring Class Maps for Zone-Based Firewall Policies
Page
Page
Zone-based Firewall IM Application Class Maps: Add or Edit Match Condition Dialog Boxes
Zone-based Firewall P2P Application Class Maps: Add or Edit Match Condition Dialog Boxes
H.323 (IOS) Class Maps Add or Edit Match Criterion Dialog Boxes
HTTP (IOS) Class Add or Edit Match Criterion Dialog Boxes
Page
IMAP and POP3 Class Maps Add or Edit Match Criterion Dialog Boxes
SIP (IOS) Class Add or Edit Match Criterion Dialog Boxes
SMTP Class Maps Add or Edit Match Criterion Dialog Boxes
Page
Page
Sun RPC Class Maps Add or Edit Match Criterion Dialog Boxes
Local Web Filter Class Add or Edit Match Criterion Dialog Boxes
N2H2 and Websense Class Add or Edit Match Criterion Dialog Boxes
Configuring Inspect Parameter Maps
Page
Page
Configuring Protocol Info Parameter Maps
Add or Edit DNS Server for Protocol Info Parameters Dialog Box
Configuring Policy Maps for Zone-Based Firewall Policies
Add or Edit Match Condition and Action Dialog Boxes for Zone-Based Firewall and Web Filter Policies
Configuring Content Filtering Maps for Zone-based Firewall Policies
Page
Configuring Local Web Filter Parameter Maps
Configuring N2H2 or WebSense Parameter Maps
Page
Add or Edit External Filter Dialog Box
Configuring Trend Parameter Maps
Configuring URL Filter Parameter Maps
Page
Add or Edit URL Domain Name Dialog Box for URL Filter Parameters
Configuring URLF Glob Parameter Maps
Page
Configuring Web Filter Maps
Changing the Default Drop Behavior
Configuring Settings for Zone-based Firewall Rules
Zone Based Firewall Page
Page
Zone Based Firewall Page - Content Filter Tab
Zone Dialog Box
Troubleshooting Zone-based Rules and Configurations
21-54
A.
B.
C.
D.
21-55
H.
I.
J.
K.
Page
Zone-based Firewall Rules Page
Page
Adding and Editing Zone-based Firewall Rules
Page
Page
Page
Zone-based Firewall Rule: Advanced Options Dialog Box
Protocol Selector Dialog Box
Configure Protocol Dialog Box
Page
Page
Page
Managing Transparent Firewall Rules
Configuring Transparent Firewall Rules
Page
Transparent Rules Page
Page
Add and Edit Transparent Firewall Rule Dialog Boxes
Page
Edit Transparent EtherType Dialog Box
Edit Transparent Mask Dialog Box
Page
Configuring Network Address Translation
Understanding Network Address Translation
Types of Address Translation
About Simplified NAT on ASA 8.3+ Devices
Page
NAT Policies on Cisco IOS Routers
NAT Page: Interface Specification
NAT Page: Static Rules
NAT Static Rule Dialog Boxes
Page
Disabling the Payload Option for Overlapping Networks
NAT Page: Dynamic Rules
NAT Dynamic Rule Dialog Box
Page
NAT Page: Timeouts
Page
NAT Policies on Security Devices
NAT in Transparent Mode
Translation Options Page
Page
Configuring NAT on PIX, FWSM, and pre-8.3 ASA Devices
Address Pools
Address Pool Dialog Box
Translation Rules: PIX, FWSM, and pre-8.3 ASA
Translation Exemptions (NAT 0 ACL)
Add/Edit Translation Exemption (NAT-0 ACL) Rule Dialog Box
Dynamic Rules Tab
Add/Edit Dynamic Translation Rule Dialog Box
Select Address Pool Dialog Box
Policy Dynamic Rules Tab
Add/Edit Policy Dynamic Rules Dialog Box
Static Rules Tab
Add/Edit Static Rule Dialog Box
Edit Translated Address Dialog Box
Advanced NAT Options Dialog Box
Page
General Tab
Page
Configuring NAT on ASA 8.3+ Devices
Translation Rules: ASA 8.3+
Page
Page
Add and Edit NAT Rule Dialog Boxes
Page
Page
Page
Page
PAT Pools and Round Robin Allocation
Add or Edit Network/Host Dialog Box: NAT Tab
Page
Page
Page
Per-Session NAT Rules: ASA 9.0(1)+
Add and Edit Per Session NAT Rule Dialog Boxes
Page
Page
Page
Page
Managing Site-to-Site VPNs: The Basics
Understanding VPN Topologies
Hub-and-Spoke VPN Topologies
Branch
Main
Point-to-Point VPN Topologies
Site 2Site 1
Secure tunnel
Full Mesh VPN Topologies
Implicitly Supported Topologies
Understanding IPsec Technologies and Policies
Understanding Mandatory and Optional Policies for Site-to-Site VPNs
Page
Overview of Site-to-Site VPN Policies
Understanding Devices Supported by Each IPsec Technology
Page
Including Unmanaged or Non-Cisco Devices in a VPN
Understanding and Configuring VPN Default Policies
Using Device Overrides to Customize VPN Policies
Understanding VRF-Aware IPsec
VRF-Aware IPsec One-Box Solution
VRF-Aware IPsec Two-Box Solution
Page
Enabling and Disabling VRF on Catalyst Switches and 7600 Devices
Accessing Site-to-Site VPN Topologies and Policies
Site-to-Site VPN Manager Window
Configuring VPN Topologies in Device View
Site-To-Site VPN Discovery
Supported and Unsupported Technologies and Topologies for VPN Discovery
Prerequisites for VPN Discovery
VPN Discovery Rules
Page
Page
Discovering Site-to-Site VPNs
Defining or Repairing Discovered VPNs with Multiple Spoke Definitions
Rediscovering Site-to-Site VPNs
Page
Creating or Editing VPN Topologies
Page
Defining the Name and IPsec Technology of a VPN Topology
Page
Selecting Devices for Your VPN Topology
Defining the Endpoints and Protected Networks
Page
Configuring VPN Interface Endpoint Settings
Page
Page
Page
Configuring Dial Backup
Dial Backup Settings Dialog Box
Configuring VPNSM or VPN SPA/VSPA Endpoint Settings
Page
Page
Page
Identifying the Protected Networks for Endpoints
Configuring a Firewall Services Module (FWSM) Interface with VPNSM or VPNSPA/VSPA
Configuring VRF Aware IPsec Settings
Page
Page
Configuring High Availability in Your VPN Topology
Page
Defining GET VPN Group Encryption
Page
Page
Add Certificate Filter Dialog Box
Add New or Edit Security Association Dialog Box
Page
Defining GET VPN Peers
Assigning Initial Policies (Defaults) to a New VPN Topology
Viewing a Summary of a VPN Topologys Configuration
Page
Page
Page
Creating or Editing Extranet VPNs
Page
Page
Page
Deleting a VPN Topology
Page
Configuring IKE and IPsec Policies
Overview of IKE and IPsec Configurations
Page
Comparing IKE Version 1 and 2
Understanding IKE
Deciding Which Encryption Algorithm to Use
Deciding Which Hash Algorithm to Use
Deciding Which Diffie-Hellman Modulus Group to Use
Deciding Which Authentication Method to Use
Configuring an IKE Proposal
Configuring IKEv1 Proposal Policy Objects
Page
Page
Configuring IKEv2 Proposal Policy Objects
Page
Page
Page
Understanding IPsec Proposals
Understanding IPsec Proposals for Site-to-Site VPNs
Understanding Crypto Maps
Understanding Transform Sets
Understanding Reverse Route Injection
Configuring IPsec Proposals in Site-to-Site VPNs
Page
Page
Page
Selecting the IKE Version for Devices in Site-to-Site VPNs
Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects
Page
Page
Page
Configuring VPN Global Settings
Configuring VPN Global ISAKMP/IPsec Settings
Page
Page
Page
Configuring VPN Global IKEv2 Settings
Page
Page
Understanding NAT in VPNs
Configuring VPN Global NAT Settings
Page
Configuring VPN Global General Settings
Page
Page
Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs
Configuring IKEv1 Preshared Key Policies
Page
Page
Understanding Public Key Infrastructure Policies
Requirements for Successful PKI Enrollment
Page
Configuring IKEv1 Public Key Infrastructure Policies in Site-to-Site VPNs
Defining Multiple IKEv1 CA Servers for Site-to-Site VPNs
Configuring Public Key Infrastructure Policies for Remote Access VPNs
Page
PKI Enrollment Dialog Box
PKI Enrollment Dialog BoxCA Information Tab
Page
Page
Page
PKI Enrollment Dialog BoxEnrollment Parameters Tab
Page
PKI Enrollment Dialog BoxCertificate Subject Name Tab
PKI Enrollment Dialog BoxTrusted CA Hierarchy Tab
Configuring IKEv2 Authentication in Site-to-Site VPNs
Page
IKEv2 Authentication Policy
Page
IKEv2 Authentication (Override) Dialog Box
Page
Page
GRE and DM VPNs
Understanding the GRE Modes Page
GRE and Dynamic GRE VPNs
Understanding GRE
Advantages of IPsec Tunneling with GRE
How Does Security Manager Implement GRE?
Prerequisites for Successful Configuration of GRE
Page
Understanding GRE Configuration for Dynamically Addressed Spokes
Configuring IPsec GRE VPNs
Configuring GRE Modes for GRE or GRE Dynamic IP VPNs
Page
Page
Dynamic Multipoint VPNs (DMVPN)
Understanding DMVPN
Enabling Spoke-to-Spoke Connections in DMVPN Topologies
Advantages of DMVPN with GRE
Configuring DMVPN
Configuring GRE Modes for DMVPN
Page
Page
Page
Configuring Large Scale DMVPNs
Configuring Server Load Balancing in Large Scale DMVPN
Edit Load Balancing Parameters Dialog Box
Page
Easy VPN
Understanding Easy VPN
Easy VPN with Dial Backup
Easy VPN with High Availability
Easy VPN with Dynamic Virtual Tunnel Interfaces
Easy VPN Configuration Modes
Easy VPN and IKE Extended Authentication (Xauth)
Overview of Configuring Easy VPN
Important Notes About Easy VPN Configuration
Configuring Client Connection Characteristics for Easy VPN
Page
Configuring Credentials Policy Objects
Configuring an IPsec Proposal for Easy VPN
Page
Configuring Dynamic VTI for Easy VPN
Configuring a Connection Profile Policy for Easy VPN
Configuring a User Group Policy for Easy VPN
Page
Page
Group Encrypted Transport (GET) VPNs
Understanding Group Encrypted Transport (GET) VPNs
Page
Understanding the GET VPN Registration Process
Page
Choosing the Rekey Transport Mechanism
Configuring Redundancy Using Cooperative Key Servers
Configuring Fail-Close to Protect Registration Failures
Page
Understanding the GET VPN Security Policy and Security Associations
Understanding Time-Based Anti-Replay
Configuring GET VPN
Generating and Synchronizing RSA Keys
Page
Configuring the IKE Proposal for GET VPN
Configuring Global Settings for GET VPN
Page
Configuring GET VPN Key Servers
Add Key Server, Group Member Dialog Box
Edit Key Server Dialog Box
Configuring GET VPN Group Members
Edit Group Member Dialog Box
Page
Using Passive Mode to Migrate to GET VPN
Page
Troubleshooting GET VPN Configurations
Page
Managing Remote Access VPNs: The Basics
Understanding Remote Access VPNs
Understanding Remote Access IPSec VPNs
Understanding Remote Access SSL VPNs
Remote Access SSL VPN Example
SSL VPN Access Modes
Understanding and Managing SSL VPN Support Files
Page
Prerequisites for Configuring SSL VPNs
SSL VPN Limitations
Understanding Devices Supported by Each Remote Access VPN Technology
Overview of Remote Access VPN Policies
Page
Page
Discovering Remote Access VPN Policies
Using the Remote Access VPN Configuration Wizard
Creating SSL VPNs Using the Remote Access VPN Configuration Wizard (ASA
SSL VPN Configuration WizardAccess Page (ASA)
SSL VPN Configuration WizardConnection Profile Page (ASA)
Page
Page
Creating User Groups with the Create Group Policy Wizard
Create Group Policy WizardFull Tunnel Page
Page
Create Group Policy WizardClientless and Thin Client Access Modes Page
Page
Creating IPSec VPNs Using the Remote Access VPN Configuration Wizard (ASA and PIX 7.0+ Devices)
Page
Page
Remote Access VPN Configuration WizardIPSec VPN Connection Profile Page (ASA)
Remote Access VPN Configuration WizardIPSec Settings Page (ASA)
Page
Remote Access VPN Configuration WizardDefaults Page
Creating SSL VPNs Using the Remote Access VPN Configuration Wizard (IOS
SSL VPN Configuration WizardGateway and Context Page (IOS)
Page
SSL VPN Configuration WizardPortal Page Customization Page (IOS)
Creating IPSec VPNs Using the Remote Access VPN Configuration Wizard (IOS and PIX 6.3 Devices)
Page
Managing Remote Access VPNs on ASA and PIX 7.0+ Devices
Overview of Remote Access VPN Policies for ASA and PIX 7.0+ Devices
Page
Understanding Cluster Load Balancing (ASA)
Configuring Cluster Load Balance Policies (ASA)
Configuring Connection Profiles (ASA, PIX 7.0+)
Page
Connection Profiles Page
General Tab (Connection Profiles)
Add/Edit Interface Specific Client Address Pools Dialog Box
AAA Tab (Connection Profiles)
Page
Add/Edit Interface Specific Authentication Server Groups Dialog Box
Secondary AAA Tab (Connection Profiles)
Page
IPSec Tab (Connection Profiles)
Page
IPSec Client Software Update Dialog Box
SSL Tab (Connection Profiles)
Page
Add/Edit Connection Alias Dialog Box
Add/Edit Connection URL Dialog Box
Configuring Group Policies for Remote Access VPNs
Understanding Group Policies (ASA)
Creating Group Policies (ASA, PIX 7.0+)
Page
Understanding SSL VPN Server Verification (ASA)
Configuring Trusted Pool Settings (ASA)
Using the Trustpool Manager
Working with IPSec VPN Policies
Configuring Certificate to Connection Profile Map Policies (ASA)
Configuring Certificate to Connection Profile Map Rules (ASA)
Page
Map Rule Dialog Box (Upper Table)
Map Rule Dialog Box (Lower Table)
Configuring an IPsec Proposal on a Remote Access VPN Server (ASA, PIX 7.0+
IPsec Proposal Editor (ASA, PIX 7.0+ Devices)
Page
Page
Working with SSL and IKEv2 IPSec VPN Policies
Understanding SSL VPN Access Policies (ASA)
SSL VPN Access Policy Page
Page
Page
Access Interface Configuration Dialog Box
Configuring an Access Policy
Configuring Other SSL VPN Settings (ASA)
Configuring SSL VPN Performance Settings (ASA)
Configuring SSL VPN Content Rewrite Rules (ASA)
Add/Edit Content Rewrite Dialog Box
Configuring SSL VPN Encoding Rules (ASA)
Page
Configuring SSL VPN Proxies and Proxy Bypass (ASA)
Page
Add or Edit Proxy Bypass Dialog Box
Configuring SSL VPN Browser Plug-ins (ASA)
Page
Understanding SSL VPN AnyConnect Client Settings
Cisco AnyConnect Profile Editor
Configuring SSL VPN AnyConnect Client Settings (ASA)
Page
Add/Edit AnyConnect Client Image Dialog Box
Understanding Kerberos Constrained Delegation (KCD) for SSL VPN (ASA)
Page
Configuring Kerberos Constrained Delegation (KCD) for SSL VPN (ASA)
Configuring AnyConnect Custom Attributes (ASA)
Add/Edit AnyConnect Custom Attribute Dialog Box
Configuring SSL VPN Advanced Settings (ASA)
Configuring SSL VPN Server Verification (ASA)
Configuring SSL VPN Shared Licenses (ASA 8.2+)
Page
Configuring an ASA Device as a Shared License Client
Configuring an ASA Device as a Shared License Server
Customizing Clientless SSL VPN Portals
Configuring ASA Portal Appearance Using SSL VPN Customization Objects
Page
Localizing SSL VPN Web Pages for ASA Devices
Page
Creating Your Own SSL VPN Logon Page for ASA Devices
Configuring SSL VPN Bookmark Lists for ASA and IOS Devices
Page
Using the Post URL Method and Macro Substitutions in SSL VPN Bookmarks
Configuring SSL VPN Smart Tunnels for ASA Devices
Page
Page
Configuring WINS/NetBIOS Name Service (NBNS) Servers To Enable File System Access in SSL VPNs
Page
Page
Managing Dynamic Access Policies for Remote Access VPNs (ASA 8.0+ Devices)
Understanding Dynamic Access Policies
Configuring Dynamic Access Policies
Understanding DAP Attributes
Page
Page
Page
Configuring DAP Attributes
Configuring Cisco Secure Desktop Policies on ASA Devices
Page
Dynamic Access Page (ASA)
Page
Add/Edit Dynamic Access Policy Dialog Box
Main Tab
Page
Page
Page
Page
Page
Add/Edit DAP Entry Dialog Box
Add/Edit DAP Entry Dialog Box > AAA Attributes Cisco
Page
Add/Edit DAP Entry Dialog Box > AAA Attributes LDAP
Add/Edit DAP Entry Dialog Box > AAA Attributes RADIUS
Add/Edit DAP Entry Dialog Box > Anti-Spyware
Add/Edit DAP Entry Dialog Box > Anti-Virus
Add/Edit DAP Entry Dialog Box > AnyConnect Identity
Add/Edit DAP Entry Dialog Box > Application
Add/Edit DAP Entry Dialog Box > Device
Add/Edit DAP Entry Dialog Box > File
Add/Edit DAP Entry Dialog Box > NAC
Add/Edit DAP Entry Dialog Box > Operating System
Add/Edit DAP Entry Dialog Box > Personal Firewall
Add/Edit DAP Entry Dialog Box > Policy
Add/Edit DAP Entry Dialog Box > Process
Add/Edit DAP Entry Dialog Box > Registry
Logical Operations Tab
Page
Page
Advanced Expressions Tab
Cisco Secure Desktop Manager Policy Editor Dialog Box
Page
Page
Managing Remote Access VPNs on IOS and PIX 6.3 Devices
Overview of Remote Access VPN Policies for IOS and PIX 6.3 Devices
Configuring an IPsec Proposal on a Remote Access VPN Server (IOS, PIX 6.3 Devices)
IPsec Proposal Editor (IOS, PIX 6.3 Devices)
Page
VPNSM/VPN SPA/VSPA Settings Dialog Box
Configuring Dynamic VTI/VRF Aware IPsec in Remote Access VPNs (IOS
Page
Page
Page
Configuring High Availability in Remote Access VPNs (IOS)
Page
Configuring User Group Policies
Configuring an SSL VPN Policy (IOS)
SSL VPN Context Editor Dialog Box (IOS)
General Tab
Page
Creating Cisco Secure Desktop Configuration Objects
Page
Page
Configuring Policy Objects for Remote Access VPNs
ASA Group Policies Dialog Box
Page
Page
ASA Group Policies Client Configuration Settings
ASA Group Policies Client Firewall Attributes
Page
ASA Group Policies Hardware Client Attributes
ASA Group Policies IPSec Settings
Page
Add or Edit Client Access Rules Dialog Box
ASA Group Policies SSL VPN Clientless Settings
Page
Add or Edit VDI Server Dialog Box
ASA Group Policies SSL VPN Full Client Settings
Page
Page
Page
ASA Group Policies SSL VPN Settings
Page
Add or Edit Auto Signon Rules Dialog Box
ASA Group Policies DNS/WINS Settings
ASA Group Policies Split Tunneling Settings
ASA Group Policies Connection Settings
Add or Edit Secure Desktop Configuration Dialog Box
Page
Add and Edit File Object Dialog Boxes
Page
File Object Choose a file Dialog Box
Add or Edit Port Forwarding List Dialog Boxes
Page
Add or Edit A Port Forwarding Entry Dialog Box
Add or Edit Single Sign On Server Dialog Boxes
Page
Add or Edit Bookmarks Dialog Boxes
Add and Edit Bookmark Entry Dialog Boxes
Page
Page
Add and Edit Post Parameter Dialog Boxes
Add and Edit SSL VPN Customization Dialog Boxes
Page
SSL VPN Customization Dialog BoxTitle Panel
SSL VPN Customization Dialog BoxLanguage
Page
Add and Edit Language Dialog Boxes
SSL VPN Customization Dialog BoxLogon Form
SSL VPN Customization Dialog BoxInformational Panel
SSL VPN Customization Dialog BoxCopyright Panel
SSL VPN Customization Dialog BoxFull Customization
SSL VPN Customization Dialog BoxToolbar
SSL VPN Customization Dialog BoxApplications
SSL VPN Customization Dialog BoxCustom Panes
Add and Edit Column Dialog Boxes
Add or Edit Custom Pane Dialog Boxes
SSL VPN Customization Dialog BoxHome Page
SSL VPN Customization Dialog BoxLogout Page
Add or Edit SSL VPN Gateway Dialog Box
Page
Add and Edit Smart Tunnel List Dialog Boxes
Add and Edit A Smart Tunnel Entry Dialog Boxes
Page
Add and Edit Smart Tunnel Auto Signon List Dialog Boxes
Add and Edit Smart Tunnel Auto Signon Entry Dialog Boxes
Page
Add or Edit User Group Dialog Box
Page
User Group Dialog BoxGeneral Settings
User Group Dialog BoxDNS/WINS Settings
User Group Dialog BoxSplit Tunneling
User Group Dialog BoxIOS Client Settings
User Group Dialog BoxIOS Xauth Options
User Group Dialog BoxIOS Client VPN Software Update
Add/Edit Client Update Dialog Box
User Group Dialog BoxAdvanced PIX Options
User Group Dialog BoxClientless Settings
User Group Dialog BoxThin Client Settings
User Group Dialog BoxSSL VPN Full Tunnel Settings
User Group Dialog BoxSSL VPN Split Tunneling
Page
User Group Dialog BoxBrowser Proxy Settings
User Group Dialog BoxSSL VPN Connection Settings
Add or Edit WINS Server List Dialog Box
Add or Edit WINS Server Dialog Box
Page
Page
Using Map View
Understanding Maps and Map View
Understanding the Map View Main Page
Page
Map Toolbar
Using the Navigation Window
Maps Context Menus
Managed Device Node Context Menu
Multiple Selected Nodes Context Menu
VPN Connection Context Menu
Layer 3 Link Context Menu
Map Object Context Menu
Map Background Context Menu
Access Permissions for Maps
Working With Maps
Creating New or Default Maps
Opening Maps
Saving Maps
Deleting Maps
Exporting Maps
Arranging Map Elements
Panning, Centering, and Zooming Maps
Selecting Map Elements
Searching for Map Nodes
Using Linked Maps
Setting the Map Background Properties
Displaying Your Network on the Map
Understanding Map Elements
Page
Displaying Managed Devices on the Map
Showing Containment of Catalyst Switches, Firewalls, and Adaptive Security Appliances
Using Map Objects To Represent Network Topology
Add Map Object and Node Properties Dialog Boxes
Select Policy Object Dialog Box
Interface Properties Dialog Box
Creating and Managing Layer 3 Links on the Map
Select Interfaces and Link Properties Dialog Boxes
Add Link Dialog Box
Managing VPNs in Map View
Displaying Existing VPNs on the Map
Creating VPN Topologies in Map View
Editing VPN Policies or Peers From the Map
Managing Device Policies in Map View
Performing Basic Policy Management in Map View
Managing Firewall Policies in Map View
Managing Firewall Settings in Map View
Page
Page
Page
Getting Started with IPS Configuration
Understanding IPS Network Sensing
Capturing Network Traffic
Page
Correctly Deploying the Sensor
Tuning the IPS
Overview of IPS Configuration
Page
Identifying Allowed Hosts
Configuring SNMP
Page
General SNMP Configuration Options
SNMP Trap Configuration Tab
SNMP Trap Communication Dialog Box
Managing User Accounts and Password Requirements
Understanding IPS User Roles
Understanding Managed and Unmanaged IPS Passwords
Understanding How IPS Passwords are Discovered and Deployed
Configuring IPS User Accounts
Add User and Edit User Credentials Dialog Boxes
Configuring User Password Requirements
Configuring AAA Access Control for IPS Devices
Page
Identifying an NTP Server
Identifying DNS Servers
Identifying an HTTP Proxy Server
Configuring the External Product Interface
External Product Interface Dialog Box
Page
Posture ACL Dialog Box
Configuring IPS Logging Policies
IPS Health Monitor
Page
Configuring IPS Security Settings
Page
Managing IPS Device Interfaces
Understanding Interfaces
Understanding Interface Modes
Promiscuous Mode
Inline Interface Mode
Inline VLAN Pair Mode
VLAN Group Mode
Deploying VLAN Groups
Configuring Interfaces
Understanding the IPS Interfaces Policy
Page
Viewing a Summary of IPS Interface Configuration
Page
Configuring Physical Interfaces
Modify Physical Interface Map Dialog Box
Configuring Bypass Mode
Configuring CDP Mode
Configuring Inline Interface Pairs
Configuring Inline VLAN Pairs
Configuring VLAN Groups
Page
Page
Page
Configuring Virtual Sensors
Understanding the Virtual Sensor
Page
Advantages and Restrictions of Virtualization
Inline TCP Session Tracking Mode
Understanding Normalizer Mode
Assigning Interfaces to Virtual Sensors
Identifying the Virtual Sensors for a Device
Defining A Virtual Sensor
Page
Virtual Sensor Dialog Box
Page
Editing Policies for a Virtual Sensor
Deleting A Virtual Sensor
Defining IPS Signatures
Understanding Signatures
Obtaining Detailed Information About a Signature
Understanding Signature Inheritance
IPS Signature Purge
Configuring Signatures
Signatures Page
Page
Page
Signature Shortcut Menu
Edit, Add, Replace Action Dialog Boxes
Edit Fidelity Dialog Box
Viewing Signature Update Levels
Enabling and Disabling Signatures
Editing Signatures
Edit Signature or Add Custom Signature Dialog Boxes
Page
Page
Page
Adding Custom Signatures
Engine Options
Cloning Signatures
Editing Signature Parameters (Tuning Signatures)
Page
Edit Signature Parameters Dialog Box
Page
Page
Page
Editing the Component List for Meta Engine Signatures
Obsoletes Dialog Box
Configuring Signature Settings
Page
Configuring Event Action Rules
Understanding the IPS Event Action Process
Understanding IPS Event Actions
Page
Configuring Event Action Filters
Page
Tips for Managing Event Action Filter Rules
Event Action Filters Page
Page
Filter Item Dialog Box
Page
Page
Page
Configuring Event Action Overrides
Event Action Override Dialog Box
Configuring IPS Event Action Network Information
Configuring Target Value Ratings
Target Value Rating Dialog Box
Understanding Passive OS Fingerprinting
Configuring OS Identification (Cisco IPS 6.x and Later Sensors Only)
Page
OS Map Dialog Box
Configuring Settings for Event Actions
Page
Page
Page
Managing IPS Anomaly Detection
Understanding Anomaly Detection
Worm Viruses
Anomaly Detection Modes
Anomaly Detection Zones
Knowing When to Turn Off Anomaly Detection
Configuring Anomaly Detection Signatures
Page
Configuring Anomaly Detection
Page
Configuring Anomaly Detection Learning Accept Mode
Understanding Anomaly Detection Thresholds and Histograms
Page
Configuring Anomaly Detection Thresholds and Histograms
Dest Port or Protocol Map Dialog Box
Histogram Dialog Box
Page
Configuring Global Correlation
Understanding Global Correlation
Understanding Reputation
Understanding Network Participation
Global Correlation Requirements and Limitations
Configuring Global Correlation Inspection and Reputation
Page
Configuring Network Participation
Page
Configuring Attack Response Controller for Blocking and Rate Limiting
Understanding IPS Blocking
Page
Strategies for Applying Blocks
Understanding Rate Limiting
Understanding Router and Switch Blocking Devices
Page
Understanding the Master Blocking Sensor
Configuring IPS Blocking and Rate Limiting
Blocking Page
Page
General Tab, IPS Blocking Policy
Page
User Profile Dialog Box
Master Blocking Sensor Dialog Box
Router, Firewall, Cat6K Device Dialog Box
Router Block Interface Dialog Box
Cat6k Block VLAN Dialog Box
Never Block Host or Network Dialog Boxes
Page
Managing IPS Sensors
Managing IPS Licenses
Updating IPS License Files
Redeploying IPS License Files
Automating IPS License File Updates
Managing IPS Updates
Configuring the IPS Update Server
Checking for IPS Updates and Downloading Them
Automating IPS Updates
Manually Applying IPS Updates
Page
Page
Managing IPS Certificates
Rebooting IPS Sensors
Page
Configuring IOS IPS Routers
Understanding Cisco IOS IPS
Understanding IPS Subsystems and Support of IOS IPS Revisions
Cisco IOS IPS Signature Scanning with Lightweight Signatures
Router Configuration Files and Signature Event Action Processor (SEAP)
Cisco IOS IPS Limitations and Restrictions
Overview of Cisco IOS IPS Configuration
Page
Initial Preparation of a Cisco IOS IPS Router
Selecting a Signature Category for Cisco IOS IPS
Configuring General Settings for Cisco IOS IPS
Configuring IOS IPS Interface Rules
IPS Rule Dialog Box
Pair Dialog Box
Page
Page
Page
Page
Managing Firewall Devices
Firewall Device Types
Default Firewall Configurations
Configuring Firewall Device Interfaces
Understanding Device Interfaces
Interfaces in Routed and Transparent Modes
Interfaces in Single and Multiple Contexts
About Asymmetric Routing Groups
Understanding ASA 5505 Ports and Interfaces
Configuring Subinterfaces (PIX/ASA)
Configuring Redundant Interfaces
Configuring EtherChannels
Page
Page
Editing LACP Parameters for an Interface Assigned to an EtherChannel
About EtherChannel Load Balancing
Page
Managing Device Interfaces, Hardware Ports, and Bridge Groups
Add/Edit Interface Dialog Box (PIX 6.3)
Page
Page
Device Interface: IP Type (PIX 6.3)
Add/Edit Interface Dialog Box (PIX 7.0+/ASA/FWSM)
Add/Edit Interface Dialog Box: General Tab (PIX 7.0+/ASA/FWSM)
Page
Page
Page
Page
Page
Page
Add/Edit Interface Dialog Box: Advanced Tab (ASA/PIX 7.0+)
Page
Configuring IPv6 Interfaces (ASA/FWSM)
Page
Page
Page
IPv6 Address for Interface Dialog Box
IPv6 Prefix Editor Dialog Box
Page
Device Interface: IP Type (PIX/ASA 7.0+)
Page
Device Interface: MAC Address
Configuring Hardware Ports on an ASA 5505
Page
Add/Edit Bridge Group Dialog Box
Advanced Interface Settings (PIX/ASA/FWSM)
Enabling Traffic between Interfaces with the Same Security Level
Managing the PPPoE Users List
Managing VPDN Groups
Page
Configuring Bridging Policies on Firewall
About Bridging on Firewall Devices
Page
Bridging Support for FWSM 3.1
ARP Table Page
Add/Edit ARP Configuration Dialog Box
ARP Inspection Page
Add/Edit ARP Inspection Dialog Box
Managing the IPv6 Neighbor Cache
MAC Address Table Page
Add/Edit MAC Table Entry Dialog Box
MAC Learning Page
Add/Edit MAC Learning Dialog Box
Management IP Page
Management IPv6 Page (ASA 5505)
Page
Page
Page
Page
Configuring Device Administration Policies on Firewall Devices
About AAA on Security Devices
Preparing for AAA
Local Database
AAA for Device Administration
AAA for Network Access
AAA for VPN Access
Configuring AAA - Authentication Tab
Authorization Tab
Accounting Tab
Configuring Banners
Configuring Boot Image/Configuration Settings
Images Dialog Box
Setting the Device Clock
Page
Configuring Device Credentials
Page
Configuring Device Access Settings on Firewall Devices
Configuring Console Timeout
HTTP Page
HTTP Configuration Dialog Box
Configuring ICMP
Add and Edit ICMP Dialog Boxes
Configuring Management Access
Configuring Secure Shell Access
Add and Edit SSH Host Dialog Boxes
Configuring SNMP
SNMP Terminology
SNMP Page
SNMP Trap Configuration Dialog Box
Page
Page
Add SNMP Host Access Entry Dialog Box
Telnet Page
Telnet Configuration Dialog Box
Configuring Failover
Understanding Failover
Page
Active/Active Failover
Stateful Failover
Basic Failover Configuration
Page
Adding a Security Context to Failover Group 2
Page
Additional Steps for an Active/Standby Failover Configuration
Exporting the Certificate to a File or PKCS12 data
Importing the Certificate onto the Standby Device
Failover Policies
Failover Page (PIX 6.3)
Edit Failover Interface Configuration Dialog Box (PIX 6.3)
Failover Page (FWSM)
Page
Page
Advanced Settings Dialog Box
Edit Failover Bridge Group Configuration Dialog Box
Failover Page (ASA/PIX 7.0+)
Page
Page
Settings Dialog Box
Page
Add/Edit Interface MAC Address Dialog Box
Edit Failover Interface Configuration Dialog Box
Edit Failover Group Dialog Box
Failover Page (Security Context)
Bootstrap Configuration for LAN Failover Dialog Box
Configuring Hostname, Resources, User Accounts, and SLAs
Hostname Page
Resource Management on Multi-context FWSMs
Resources Page
Add and Edit Resource Dialog Boxes
Page
Page
Configuring User Accounts
Add/Edit User Account Dialog Boxes
Monitoring Service Level Agreements (SLAs) To Maintain Connectivity
Creating Service Level Agreements
Configuring SLA Monitor Objects
Page
Page
Page
Configuring Server Access Settings on Firewall Devices
AUS Page
Page
Add and Edit Auto Update Server Dialog Boxes
Page
DHCP Relay Page
Add and Edit DHCP Relay Agent Configuration Dialog Boxes
Add and Edit DHCP Relay Server Configuration Dialog Boxes
DHCP Relay IPv6 Page
Add and Edit DHCP Relay IPv6 Agent Configuration Dialog Boxes
Add and Edit DHCP Relay IPv6 Server Configuration Dialog Boxes
Configuring DHCP Servers
DHCP Server Page
Add and Edit DHCP Server Interface Configuration Dialog Boxes
Add/Edit DHCP Server Advanced Configuration Dialog Box
Add/Edit DHCP Server Option Dialog Box
DNS Page
Page
Add DNS Server Group Dialog Box
Add DNS Server Dialog Box
Configuring DDNS
Add/Edit DDNS Interface Rule Dialog Box
DDNS Update Methods Dialog Box
Add/Edit DDNS Update Methods Dialog Box
NTP Page
NTP Server Configuration Dialog Box
SMTP Server Page
TFTP Server Page
Configuring Logging Policies on Firewall Devices
NetFlow Page
Add and Edit Collector Dialog Boxes (NetFlow)
E-Mail Setup Page
Add/Edit Email Recipient Dialog Box
Event Lists Page
Message Classes and Associated Message ID Numbers
Add/Edit Event List Dialog Box
Add/Edit Syslog Class Dialog Box
Add/Edit Syslog Message ID Filter Dialog Box
Logging Filters Page
Edit Logging Filters Dialog Box
Configuring Logging Setup
Logging Setup Page
Page
Configuring Rate Limit Levels
Rate Limit Page
Add/Edit Rate Limit for Syslog Logging Levels Dialog Box
Add/Edit Rate Limited Syslog Message Dialog Box
Configuring Syslog Server Setup
Server Setup Page
Page
Logging Levels
Add/Edit Syslog Message Dialog Box
Defining Syslog Servers
Syslog Servers Page
Add/Edit Syslog Server Dialog Box
Page
Page
Configuring Multicast Policies on Firewall Devices
Enabling PIM and IGMP
Configuring IGMP
IGMP Page - Protocol Tab
Configure IGMP Parameters Dialog Box
IGMP Page - Access Group Tab
Configure IGMP Access Group Parameters Dialog Box
IGMP Page - Static Group Tab
Configure IGMP Static Group Parameters Dialog Box
IGMP Page - Join Group Tab
Configure IGMP Join Group Parameters Dialog Box
Configuring Multicast Routes
Add/Edit MRoute Configuration Dialog Box
Configuring Multicast Boundary Filters
Add/Edit MBoundary Configuration Dialog Box
Add/Edit MBoundary Interface Configuration Dialog Box
Configuring PIM
PIM Page - Protocol Tab
Add/Edit PIM Protocol Dialog Box
PIM Page - Neighbor Filter Tab
Add/Edit PIM Neighbor Filter Dialog Box
PIM Page - Bidirectional Neighbor Filter Tab
Add/Edit PIM Bidirectional Neighbor Filter Dialog Box
PIM Page - Rendezvous Points Tab
Add/Edit Rendezvous Point Dialog Box
Add/Edit Multicast Group Rules Dialog Box
PIM Page - Route Tree Tab
PIM Page - Request Filter Tab
Add/Edit Multicast Group Rules Dialog Box
Page
Configuring Routing Policies on Firewall Devices
Configuring No Proxy ARP
Configuring OSPF
About OSPF
General Tab
OSPF Advanced Dialog Box
Page
Area Tab
Add/Edit Area/Area Networks Dialog Box
Range Tab
Add/Edit Area Range Network Dialog Box
Neighbors Tab
Add/Edit Static Neighbor Dialog Box
Redistribution Tab
Redistribution Dialog Box
Page
Virtual Link Tab
Add/Edit OSPF Virtual Link Configuration Dialog Box
Page
Add/Edit OSPF Virtual Link MD5 Configuration Dialog Box
Filtering Tab
Add/Edit Filtering Dialog Box
Summary Address Tab
Add/Edit Summary Address Dialog Box
Interface Tab
Page
Add/Edit Interface Dialog Box
Page
Configuring OSPFv3
About OSPFv3
Page
Process Tab
OSPFv3 Advanced Properties Dialog Box
Page
Page
Area Tab (OSPFv3)
Add/Edit Area Dialog Box (OSPFv3)
Add/Edit Range Dialog Box (OSPFv3)
Add/Edit Virtual Link Dialog Box (OSPFv3)
Add/Edit Redistribution Dialog Box (OSPFv3)
Page
Add/Edit Summary Prefix Dialog Box (OSPFv3)
OSPFv3 Interface Tab
Add/Edit Interface Dialog Box (OSPFv3)
Page
Page
Add/Edit Neighbor Dialog Box (OSPFv3)
Page
Configuring RIP
RIP Page for PIX/ASA 6.37.1 and FWSM
Add/Edit RIP Configuration (PIX/ASA 6.37.1 and FWSM) Dialog Boxes
RIP Page for PIX/ASA 7.2 and Later
RIP - Setup Tab
Page
RIP - Redistribution Tab
Add/Edit Redistribution Dialog Box
RIP - Filtering Tab
Add/Edit Filter Dialog Box
RIP - Interface Tab
Add/Edit Interface Dialog Box
Configuring Static Routes
Add/Edit Static Route Dialog Box
Add/Edit IPv6 Static Route Dialog Box
Page
Page
Configuring Security Policies on Firewall
General Page
Configuring Floodguard, Anti-Spoofing and Fragment Settings
Add/Edit General Security Configuration Dialog Box
Configuring Timeouts
Page
Page
Configuring Service Policy Rules on Firewall
About Service Policy Rules
Page
About TCP State Bypass
Priority Queues Page
Priority Queue Configuration Dialog Box
IPS, QoS, and Connection Rules Page
Insert/Edit Service Policy (MPC) Rule Wizard
Step 1. Configure a Service Policy
Step 2. Configure the traffic class
Step 3. Configure the MPC actions
Page
Page
Page
Page
Page
About IPS Modules on ASA Devices
About the ASA CX
ASA CX Auth Proxy Configuration
Configuring Traffic Flow Objects
Page
Default Inspection Traffic
Page
Configuring TCP Maps
Page
Add and Edit TCP Option Range Dialog Boxes
Page
Page
Configuring Security Contexts on Firewall Devices
Enabling and Disabling Multiple-Context Mode
Checklist for Configuring Multiple Security Contexts
Page
Managing Security Contexts
Add/Edit Security Context Dialog Box (FWSM)
Page
Add/Edit Security Context Dialog Box (PIX/ASA)
Allocate Interfaces Dialog Box (PIX/ASA only)
Page
Page
Page
Page
Managing Routers
Configuring Routers Running IOS Software Releases 12.1 and 12.2
Discovering Router Policies
Page
Configuring Router Interfaces
Basic Interface Settings on Cisco IOS Routers
Available Interface Types
Defining Basic Router Interface Settings
Page
Page
Deleting a Cisco IOS Router Interface
Router Interfaces Page
Create Router Interface Dialog Box
Page
Page
Page
Interface Auto Name Generator Dialog Box
Advanced Interface Settings on Cisco IOS Routers
Understanding Helper Addresses
Advanced Interface Settings Page
Advanced Interface Settings Dialog Box
Page
Page
Page
Page
Page
IPS Module Interface Settings on Cisco IOS Routers
IPS Module Interface Settings Page
IPS Monitoring Information Dialog Box
CEF Interface Settings on Cisco IOS Routers
CEF Interface Settings Page
CEF Interface Settings Dialog Box
Dialer Interfaces on Cisco IOS Routers
Defining Dialer Profiles
Page
Defining BRI Interface Properties
Dialer Policy Page
Dialer Profile Dialog Box
Dialer Physical Interface Dialog Box
ADSL on Cisco IOS Routers
Supported ADSL Operating Modes
Defining ADSL Settings
ADSL Policy Page
ADSL Settings Dialog Box
Page
Page
SHDSL on Cisco IOS Routers
Defining SHDSL Controllers
SHDSL Policy Page
SHDSL Controller Dialog Box
Page
Page
Controller Auto Name Generator Dialog Box
PVCs on Cisco IOS Routers
Understanding Virtual Paths and Virtual Channels
Understanding ATM Service Classes
Understanding ATM Management Protocols
Understanding ILMI
Understanding OAM
Defining ATM PVCs
Page
Page
Defining OAM Management on ATM PVCs
PVC Policy Page
PVC Dialog Box
Page
PVC Dialog BoxSettings Tab
Page
Page
PVC Dialog BoxQoS Tab
Page
Page
PVC Dialog BoxProtocol Tab
Define Mapping Dialog Box
PVC Advanced Settings Dialog Box
PVC Advanced Settings Dialog BoxOAM Tab
Page
PVC Advanced Settings Dialog BoxOAM-PVC Tab
Page
PPP on Cisco IOS Routers
Understanding Multilink PPP (MLP)
Defining PPP Connections
Page
Page
Defining Multilink PPP Bundles
PPP/MLP Policy Page
PPP Dialog Box
PPP Dialog BoxPPP Tab
Page
PPP Dialog BoxMLP Tab
Page
Page
Page
Router Device Administration
AAA on Cisco IOS Routers
Supported Authorization Types
Supported Accounting Types
Understanding Method Lists
Defining AAA Services
Page
AAA Policy Page
AAA PageAuthentication Tab
AAA PageAuthorization Tab
Page
Command Authorization Dialog Box
AAA PageAccounting Tab
Page
Command Accounting Dialog Box
User Accounts and Device Credentials on Cisco IOS Routers
Defining Accounts and Credential Policies
Accounts and Credential s Policy Page
Page
User Account Dialog Box
Bridging on Cisco IOS Routers
Bridge-Group Virtual Interfaces
Defining Bridge Groups
Bridging Policy Page
Bridge Group Dialog Box
Time Zone Settings on Cisco IOS Routers
Defining Time Zone and DST Settings
Clock Policy Page
Page
CPU Utilization Settings on Cisco IOS Routers
Defining CPU Utilization Settings
CPU Policy Page
Page
HTTP and HTTPS on Cisco IOS Routers
Defining HTTP Policies
Page
HTTP Policy Page
HTTP PageSetup Tab
HTTP PageAAA Tab
Page
Command Authorization Override Dialog Box
Line Access on Cisco IOS Routers
Defining Console Port Setup Parameters
Page
Defining Console Port AAA Settings
Defining VTY Line Setup Parameters
Page
Defining VTY Line AAA Settings
Page
Console Policy Page
Console PageSetup Tab
Page
Console PageAuthentication Tab
Console PageAuthorization Tab
Page
Console PageAccounting Tab
Page
Page
VTY Policy Page
VTY Line Dialog Box
VTY Line Dialog BoxSetup Tab
Page
Page
VTY Line Dialog BoxAuthentication Tab
VTY Line Dialog BoxAuthorization Tab
VTY Line Dialog BoxAccounting Tab
Page
Page
Command Authorization Dialog BoxLine Access
Command Accounting Dialog BoxLine Access
Page
Optional SSH Settings on Cisco IOS Routers
Defining Optional SSH Settings
Secure Shell Policy Page
Page
SNMP on Cisco IOS Routers
Defining SNMP Agent Properties
Enabling SNMP Traps
SNMP Policy Page
Permission Dialog Box
Trap Receiver Dialog Box
SNMP Traps Dialog Box
Page
DNS on Cisco IOS Routers
Defining DNS Policies
DNS Policy Page
IP Host Dialog Box
Hostnames and Domain Names on Cisco IOS Routers
Defining Hostname Policies
Hostname Policy Page
Memory Settings on Cisco IOS Routers
Defining Router Memory Settings
Memory Policy Page
Page
Secure Device Provisioning on Cisco IOS Routers
Contents of Bootstrap Configuration
Secure Device Provisioning Workflow
Defining Secure Device Provisioning Policies
Configuring a AAA Server Group for Administrative Introducers
Secure Device Provisioning Policy Page
Page
DHCP on Cisco IOS Routers
Understanding DHCP Database Agents
Understanding DHCP Relay Agents
Understanding DHCP Option 82
Understanding Secured ARP
Defining DHCP Policies
Defining DHCP Address Pools
DHCP Policy Page
Page
DHCP Database Dialog Box
IP Pool Dialog Box
Page
NTP on Cisco IOS Routers
Defining NTP Servers
NTP Policy Page
NTP Server Dialog Box
Page
Configuring Identity Policies
802.1x on Cisco IOS Routers
Understanding 802.1x Device Roles
802.1x Interface Authorization States
Topologies Supported by 802.1x
Defining 802.1x Policies
802.1x Policy Page
Page
Page
Network Admission Control on Cisco IOS Routers
Router Platforms Supporting NAC
Understanding NAC Components
Understanding NAC System Flow
Defining NAC Setup Parameters
Defining NAC Interface Parameters
Page
Defining NAC Identity Parameters
Network Admission Control Policy Page
Network Admission Control PageSetup Tab
Page
Network Admission Control PageInterfaces Tab
NAC Interface Configuration Dialog Box
Network Admission Control PageIdentities Tab
NAC Identity Profile Dialog Box
NAC Identity Action Dialog Box
Page
Configuring Logging Policies
Logging on Cisco IOS Routers
Defining Syslog Logging Setup Parameters
Page
Defining Syslog Servers
Understanding Log Message Severity Levels
NetFlow on Cisco IOS Routers
Defining NetFlow Parameters
Syslog Logging Setup Policy Page
Page
Page
Syslog Servers Policy Page
Syslog Server Dialog Box
NetFlow Policy Page
Page
Page
Adding and Editing NetFlow Interface Settings
Page
Configuring Quality of Service
Quality of Service on Cisco IOS Routers
Quality of Service and CEF
Understanding Matching Parameters
Understanding Marking Parameters
Understanding Queuing Parameters
Tail Drop vs. WRED
Low-Latency Queuing
Default Class Queuing
Understanding Policing and Shaping Parameters
Understanding the Token-Bucket Mechanism
Page
Understanding Control Plane Policing
Defining QoS Policies
Defining QoS on Interfaces
Page
Defining QoS on the Control Plane
Defining QoS Class Matching Parameters
Page
Defining QoS Class Marking Parameters
Defining QoS Class Queuing Parameters
Defining QoS Class Policing Parameters
Defining QoS Class Shaping Parameters
Quality of Service Policy Page
Page
QoS Policy Dialog Box
Page
QoS Class Dialog Box
QoS Class Dialog BoxMatching Tab
Edit ACLs Dialog BoxQoS Classes
QoS Class Dialog BoxMarking Tab
QoS Class Dialog BoxQueuing and Congestion Avoidance Tab
Page
QoS Class Dialog BoxPolicing Tab
Page
QoS Class Dialog BoxShaping Tab
Page
Configuring Routing Policies
BGP Routing on Cisco IOS Routers
Defining BGP Routes
Redistributing Routes into BGP
BGP Routing Policy Page
BGP PageSetup Tab
Page
Neighbors Dialog Box
BGP PageRedistribution Tab
BGP Redistribution Mapping Dialog Box
EIGRP Routing on Cisco IOS Routers
Defining EIGRP Routes
Defining EIGRP Interface Properties
Page
Redistributing Routes into EIGRP
EIGRP Routing Policy Page
EIGRP PageSetup Tab
EIGRP Setup Dialog Box
EIGRP PageInterfaces Tab
EIGRP Interface Dialog Box
EIGRP PageRedistribution Tab
EIGRP Redistribution Mapping Dialog Box
OSPF Routing on Cisco IOS Routers
Defining OSPF Process Settings
Defining OSPF Area Settings
Redistributing Routes into OSPF
Defining OSPF Redistribution Mappings
Defining OSPF Maximum Prefix Values
Page
Defining OSPF Interface Settings
Understanding Interface Cost
Understanding Interface Priority
Disabling MTU Mismatch Detection
Blocking LSA Flooding
Understanding OSPF Timer Settings
Understanding the OSPF Network Type
Understanding OSPF Interface Authentication
OSPF Interface Policy Page
OSPF Interface Dialog Box
Page
Page
OSPF Process Policy Page
OSPF Process PageSetup Tab
OSPF Setup Dialog Box
Edit Interfaces Dialog BoxOSPF Passive Interfaces
OSPF Process PageArea Tab
OSPF Area Dialog Box
OSPF Process PageRedistribution Tab
OSPF Redistribution Mapping Dialog Box
Page
OSPF Max Prefix Mapping Dialog Box
RIP Routing on Cisco IOS Routers
Defining RIP Setup Parameters
Defining RIP Interface Authentication Settings
Redistributing Routes into RIP
RIP Routing Policy Page
RIP PageSetup Tab
RIP PageAuthentication Tab
RIP Authentication Dialog Box
RIP PageRedistribution Tab
RIP Redistribution Mapping Dialog Box
Static Routing on Cisco IOS Routers
Defining Static Routes
Static Routing Policy Page
Static Routing Dialog Box
Page
Page
Managing Cisco Catalyst Switches and Cisco 7600 Series Routers
Discovering Policies on Cisco Catalyst Switches and Cisco 7600 Series Routers
Viewing Catalyst Summary Information
Viewing a Summary of Catalyst Interfaces, VLANs, and VLAN Groups
Page
Interfaces
Creating or Editing Ports on Cisco Catalyst Switches and Cisco 7600 Series Routers
Page
Deleting Ports on Cisco Catalyst Switches and Cisco 7600 Series Routers
Interfaces/VLANs PageInterfaces Tab
Page
Create and Edit Interface Dialog BoxesAccess Port Mode
Page
Page
Create and Edit Interface Dialog BoxesRouted Port Mode
Page
Create and Edit Interface Dialog BoxesTrunk Port Mode
Page
Page
Page
Create and Edit Interface Dialog BoxesDynamic Mode
Page
Page
Page
Create and Edit Interface Dialog BoxesSubinterfaces
Page
Create and Edit Interface Dialog BoxesUnsupported Mode
VLANs
Creating or Editing VLANs
Deleting VLANs
Interfaces/VLANs PageVLANs Tab
Create and Edit VLAN Dialog Boxes
Page
Access Port Selector Dialog Box
Trunk Port Selector Dialog Box
VLAN Groups
Creating or Editing VLAN Groups
Deleting VLAN Groups
Interfaces/VLANs PageVLAN Groups Tab
Create and Edit VLAN Group Dialog Boxes
Service Module Slot Selector Dialog Box
VLAN Selector Dialog Box
VLAN ACLs (VACLs)
Creating or Editing VACLs
Page
Deleting VACLs
VLAN Access Lists Page
Page
Create and Edit VLAN ACL Dialog Boxes
Create and Edit VLAN ACL Content Dialog Boxes
Interface Selector Dialog BoxVLAN ACL Content
IDSM Settings
Creating or Editing EtherChannel VLAN Definitions
Deleting EtherChannel VLAN Definitions
Creating or Editing Data Port VLAN Definitions
Page
Deleting Data Port VLAN Definitions
IDSM Settings Page
Create and Edit IDSM EtherChannel VLANs Dialog Boxes
Create and Edit IDSM Data Port VLANs Dialog Boxes
IDSM Slot-Port Selector Dialog Box
Page
Page
Page
Viewing Events
Introduction to Event Viewer Capabilities
Historical View
Real-Time View
Views and Filters
Policy Navigation
Understanding Event Viewer Access Control
Scope and Limits of Event Viewer
Page
Deeply Parsed Syslogs
Overview of Event Viewer
Event Viewer File Menu
Event Viewer View Menu
Page
View List
Event Monitoring Window
Page
Event Table Toolbar
Page
Columns in Event Table
Page
Page
Page
Page
Page
Page
Time Slider
Event Details Pane
Preparing for Event Management
Ensuring Time Synchronization
Configuring ASA and FWSM Devices for Event Management
Configuring IPS Devices for Event Management
Managing the Event Manager Service
Starting, Stopping, and Configuring the Event Manager Service
Monitoring the Event Manager Service
Page
Page
Selecting Devices to Monitor
Monitoring Event Data Store Disk Space Usage
Archiving or Backing Up and Restoring the Event Data Store
Using Event Viewer
Using Event Views
Opening Views
Floating and Arranging Views
Customizing the Event Table Appearance
Switching Between Source/Destination IP Addresses and Host Object Names
Configuring Color Rules for a View
Creating Custom Views
Editing a Custom View Name or Description
Switching Between Real-Time and Historical Views
Saving Views
Deleting Custom Views
Filtering and Querying Events
Selecting the Time Range for Events
Using the Time Slider with Filtering
Refreshing the Event Table
Creating Column-Based Filters
Page
Filtering Based on a Specific Events Values
Filtering on a Text String
Clearing Filters
Performing Operations on Specific Events
Event Context (Right-Click) Menu
Page
Examining Details of a Single Event
Copying Event Records
Saving Events to a File
Looking Up a Security Manager Policy from Event Viewer
Page
Examples of Event Analysis
Help Desk: User Access To a Server Is Blocked By the Firewall
Page
Monitoring and Mitigating Botnet Activity
Understanding the Syslog Messages That Indicate Actionable Events
Monitoring Botnet Using the Security Manager Event Viewer
Page
Monitoring Botnet Using the Security Manager Report Manager
Monitoring Botnet Activity Using the Adaptive Security Device Manager (ASDM)
Mitigating Botnet Traffic
Page
Removing False Positive IPS Events from the Event Table
Page
Page
Managing Reports
Understanding Report Management
Understanding the Types of Reports Available in Security Manager
Preparing Devices for Report Manager Reporting
Understanding Report Manager Data Aggregation
Understanding Report Manager Access Control
Overview of Report Manager
Page
Report Manager Menus
Understanding the Report List in Report Manager
Understanding the Report Settings Pane
Understanding the Generated Report Pane and Toolbar
Page
Understanding the Predefined System Reports in Report Manager
Understanding Firewall Traffic Reports
Understanding Firewall Summary Botnet Reports
Understanding VPN Top Reports
Understanding General VPN Reports
Understanding IPS Top Reports
Understanding General IPS Reports
Working with Reports in Report Manager
Opening and Generating Reports
Page
Creating Custom Reports
Editing Report Settings
Page
Printing Reports
Exporting Reports
Configuring Default Settings for Reports
Arranging Report Windows
Saving Reports
Renaming Reports
Closing Report Windows
Deleting Reports
Managing Custom Reports
Scheduling Reports
Viewing Report Schedules
Configuring Report Schedules
Page
Viewing Scheduled Report Results
Enabling and Disabling Report Schedules
Deleting Report Schedules
Troubleshooting Report Manager
Page
Page
Page
Health and Performance Monitoring
Health and Performance Monitor Overview
Trend Information
Monitoring Multiple Contexts
HPM Access Control
Preparing for Health and Performance Monitoring
Launching the Health and Performance Monitor
Managing Monitored Devices
HPM Window
Page
Working with Table Columns
Showing and Hiding Table Columns
Table Columns: Device-related Views
Page
Page
Page
Table Columns: VPN-related Views
Page
Alert Table Columns
Column-based Filtering
Custom Filtering
Using The List Filter Fields
Page
Monitoring Devices
Managing Device Views
Page
Views: Opening and Closing
Views: Tiling Horizontally or Vertically
Views: Floating and Docking
Views: Custom
HPM Window: Monitoring Display
Page
Monitoring Views: Devices or VPNs Summary
Monitoring Views: Device or VPN Status List
Monitoring Views: Device or VPN Details
Monitoring Views: VPN, RA and S2S
Exporting HPM Data
Alerts and Notifications
HPM Window: Alerts Display
Page
Alerts: Configuring
Alerts Configuration: IPS
Alerts Configuration: Firewall
Page
Alerts Configuration: VPN
Configuring SNMP for S2S Polling
Alerts: Viewing
Alerts: Acknowledging and Clearing
Alerts: History
Page
Using External Monitoring, Troubleshooting, and Diagnostic Tools
Viewing Inventory Status
Inventory Status Window
Page
Starting Device Managers
Troubleshooting Device Managers
Access Rule Look-up from Device Managers
Navigating to an Access Rule from ASDM
Navigating to an Access Rule from SDM
Launching Cisco Prime Security Manager
Detecting ASA CX Modules
Sharing Device Inventory and Policy Objects with PRSM
Analyzing an ASA or PIX Configuration Using Packet Tracer
Page
Analyzing Connectivity Issues Using the Ping, Trace Route, or NS Lookup Tools
Analyzing Configuration Using Ping
Page
Analyzing Configuration Using TraceRoute
Analyzing Configuration Using NS Lookup
Using the Packet Capture Wizard
Page
Page
Page
Integrating CS-MARS and Security Manager
Checklist for Integrating CS-MARS with Security Manager
Configuring the Security Manager Server to Respond to CS-MARS Policy Queries
Registering CS-MARS Servers in Security Manager
Discovering or Changing the CS-MARS Controllers for a Device
Troubleshooting Tips for CS-MARS Querying
Looking Up CS-MARS Events for a Security Manager Policy
Viewing CS-MARS Events for an Access Rule
Page
Viewing CS-MARS Events for an IPS Signature
Looking Up a Security Manager Policy from a CS-MARS Event
System Log Messages Supported for Policy Look-up
NetFlow Event Reporting in CS-MARS
Page
Page
Page
Page
Page
Using Image Manager
Getting Started with Image Manager
Image Manager Supported Platforms and Versions
Device Configurations supported by Image Manager
Image Manager Supported Image Types
Administrative Settings for Image Manager
Page
Bootstrapping Devices for Image Manager
Working with Images
View All Images
Download Images to the Repository
Page
Working with Bundles
Creating Bundles
View Images by Bundle
Renaming Bundles
Deleting Bundles
Deleting Images from Bundles
Working with Devices
Viewing Device Inventory
Manage Images on a Device
View Device Memory
Configuring the Image Install Location
About Image Updates on Devices Using Image Manager
Page
Page
Validating a Proposed Image Update on a Device
Page
Page
Using the Image Installation Wizard to Install Images on Devices
Page
Page
Page
Install Bundled Images on Devices
Install Compatible Images on Devices
Install Images on Selected Devices
Working with Jobs
Viewing Image Installation Job Summary
Viewing Install Jobs
Aborting an Image Installation Job
Retry a Failed Image Install Job
Roll Back a Deployed Job
Image Installation Job Approval Workflow
Troubleshooting Image Management
Page
Page
Page
INDEX
Numerics
A
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
B
C
Page
Page
Page
Page
Page
Page
D
Page
Page
Page
Page
Page
Page
Page
E
Page
Page
Page
Page
Page
Page
F
Page
Page
Page
Page
G
Page
H
Page
I
Page
Page
Page
Page
Page
Page
Page
Page
Page
J
K
L
M
Page
Page
Page
N
Page
O
Page
Page
Page
Page
P
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Q
R
Page
Page
Page
Page
Page
Page
Page
Page
S
Page
Page
Page
Page
Page
Page
Page
Page
Page
T
Page
Page
Page
U
V
Page
Page
Page
W
Page
X
Y
Z