34-22
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 34 Using Map View
Managing Device Policies in Map View

Editing VPN Policies or Peers From the Map

You can edit VPN policies, or the peers that participate in a VPN, from map view. To edit policies or
peers, right-click a VPN tunnel or device node and select one of these commands:
Edit VPN Policies—To open the Site-to-Site VPN Manager, where you can edit the policies that
define the VPN. For more information, see Site-to-Site VPN Manager Window, page 24-18.
Edit VPN Peers—To open a dialog box that allows you to configure the peers that participate in the
VPN. Click the Help button in the dialog box for more information.
Show VPN Peers—To see which devices participate in a VPN without editing the list (VPN Peers
dialog box).
If the device participates in more than one VPN, you are first prompted to select the desired VPN (with
the Select VPN to Configure dialog box) before the appropriate dialog box is opened.
Managing Device Policies in Map View
You can perform only basic policy management and configure firewall services policies in Map view.
You cannot configure other types of policies. The following topics describe how to manage policies from
the Map view:
Performing Basic Policy Management in Map View, page 34-22
Managing Firewall Policies in Map View, page34 -23
Managing Firewall Settings in Map View, page 34-23

Performing Basic Policy Management in Map View

You can perform some basic policy management tasks in Map view. Right click the device and select one
of the following commands:
Copy Policies Between Devices—To copy local device policies from one device to another. For
more information on copying policies, see Copying Policies Between Devices, page 5-31.
Share Device Policies—To create shared policies from local device policies. For more information
on sharing policies, see Sharing Multiple Policies of a Selected Device, page 5-39.
Clone Device—To create a copy of a device, including its policies. For more information on cloning
devices, see Cloning a Device, page 3-54.
Preview Configuration—To view the configuration file that will be generated for the device,
including the changes from the previous deployment. For more information on previewing
configurations, see Previewing Configurations, page8-45.
Discover Policies on Device—To discover the policies defined on the device and configure them in
Security Manager, wiping out whatever policies are defined in Security Manager for the device. For
more information device discovery, see Discovering Policies on Devices Already in Security
Manager, page 5-15.
Related Topics
Chapter 8, “Managing Deployment”
Chapter 3, “Managing the Device Inventory”