Index
IN-55
User Guide for Cisco Security Manager 4.4
OL-28826-01
creating and editing deployment in non-Workflow
mode 8-29
creating and editing deployment in Workflow
mode 8-36
Deployment Manager 8-16
discarding 8-41
including devices in 8-8
rejecting 8-39
states
Workflow mode 8-6
submitting 8-39
joined hub-and-spoke topology 24-5
Join Group tab (IGMP) 53-7
JumpStart 1-22
Jumpstart command 1-36
K
Kazaa2 class map objects
creating 21-15
match criteria 21-20
Kerberos
configuring constrained delegation (KCD) 30-58
description 6-26
settings in AAA server objects 6-36
understanding constrained delegation (KCD) 30-56
key encryption key (KEK), GET VPN 28-4
key servers
adding 28-19
choosing the rekey transport mechanism 28-6
communication flow 28-2
cooperative, for redundancy 28-7
editing 28-19
generating, synchronizing RSA keys 28-13
registration failures 28-8
registration process 28-4
security policy ACLs 28-10
key servers (GET VPN)
configuring 28-18
Key Servers page (GET VPN) 28-18
Key Servers Selection dialog box 28-21
knowledge base structure (IPS) 40-8
L
LACP
interface assigned to an EtherChannel 45-11
large scale Dynamic Multipoint VPN (DMVPN)
mandatory and optional policies 24-6
Launch menu 1-35
Report Manager 67-8
LDAP
settings in AAA server objects 6-37
LDAP Attribute Map objects
attributes 6-43
learning accept mode (IPS), configuring 40-8
licenses
configuring for ASA devices 2-11
configuring for IOS devices 2-12
exporting IPS 11-42
IPS
automating 43-3
managing 43-1
redeploying 43-2
updating 43-1
Security Manager 10-16
License Update Status Details dialog box 11-43
licensing
Settings page 11-40
Lightweight Directory Access Protocol (LDAP)
description 6-26
lightweight signature engines 44-2
line access
Cisco IOS routers
Console Policy page 60-42
overview 60-35
VTY Policy page 60-50
Link Aggregation Control Protocol 45-11