34-14
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 34 Using Map View
Displaying Your Network on the Map
Displaying Your Network on the Map
You use the map view to represent your network topology by creating maps. A map is a visual
representation of your network, or a portion of it if it is too large to fit on a single map. Maps consist of
map elements that represent devices, links, and other objects in your network. For more information
about map, see Working With Maps, page 34-8.
The following topics describe how to create maps:
Understanding Map Elements, page 34-14
Displaying Managed Devices on the Map, page 34-16
Showing Containment of Catalyst Switches, Firewalls, and Adaptive Security Appliances,
page 34-16
Using Map Objects To Represent Network Topology, page34-17
Creating and Managing Layer 3 Links on the Map, page 34-19

Understanding Map Elements

All objects that can appear on a map are map elements. You display map elements on a map to create a
representation of a portion of your network. For more information about maps, see Working With Maps,
page 34-8. To open a map, see Opening Maps, page 34-10.
The following tables describe the elements that can appear on a map:
Table 34-9 on page 34-14 describes the device nodes that can appear on a map. These elements are
managed by Security Manager.
Table 34-10 on page 34-15 describes the map objects that can appear on a map. These elements are
not managed by Security Manager.
Table 34-11 on page 34-15 describes the map element indicators that can appear with a device node.
Table34-9 Device Node Types
Node Type Icon Description
Firewall When you select a device, its security contexts are
highlighted.
Firewall security context When you select a security context, the parent
device is highlighted. The dotted outline
distinguishes the icon as a security context.
Adaptive Security Appliance When you select a device, its security contexts are
highlighted.
Adaptive Security Appliance
security context
When you select a security context, the parent
device is highlighted. The dotted outline
distinguishes the icon as a security context.
Router Router or VPN concentrator.