Index
IN-13
User Guide for Cisco Security Manager 4.4
OL-28826-01
configuring in Map view 34-23
configuring the dynamic database 19-4
configuring with IPS global correlation 41-1
databases 19-1
Device Blacklist dialog box 19-15
Device Whitelist dialog box 19-15
Drop Rules Editor 19-13
Dynamic Blacklist Configuration tab 19-10
enabling DNS snooping 19-6
field definitions 19-9
illustrations 19-1
mitigating botnet activity 66-56
monitoring
activity using ASDM 66-56
activity using Event Viewer 66-53, 66-55
overview 66-52
understanding botnet syslog events 66-53
overview 19-1
preserving ACL names 12-4
Report Manager reports
firewall summary botnet reports 67-14
task flow 19-2
traffic classification 19-6
Traffic Classification dialog box 19-12
Traffic Classification tab 19-11
understanding 19-1
understanding NAT effects 12-3
understanding processing order 12-2
Whitelist/Blacklist tab 19-14
bridge group
failover
editing 49-16
Bridge Groups
ASA/FWSM
add/edit 45-41
bridge groups
defining 60-19
FWSM 3.1 46-3
Bridging
ASA 5505
Management IPv6 46-10
PIX/ASA/FWSM
ARP configuration 46-4
ARP Inspection 46-5
ARP Inspection, enable/disable 46-6
ARP Table 46-3
MAC Address, add/edit 46-8
MAC Address Table 46-7
MAC Learning 46-8
MAC Learning, enable/disable 46-9
Management IP address 46-10
bridging
Cisco IOS routers
Bridge Group dialog box 60-21
Bridging Policy page 60-20
BVI interfaces 60-18
overview 60-18
configuring transparent firewall rules 22-1
PIX/ASA/FWSM
about 46-1
configuring on 46-1
broadcast attacks, preventing 17-4
broadcasts
enabling directed on routers 59-20
browser plug-ins
configuring 30-50
Bundles 70-11
bypass mode
configuring for IPS 36-12
C
CA server authentication methods
SCEP (Simple Certificate Enrollment Protocol) 25-47
Cat6k Device dialog box 42-14
Catalyst 6500/7600 devices
configuring FWSM in site-to-site VPNs 24-45
configuring SSH 2-6