Index
IN-64
User Guide for Cisco Security Manager 4.4
OL-28826-01
changing variable values 7-34
configuring 7-24
configuring AAA for administrative
introducers 60-84
creating 7-27
previewing CLI 7-34
removing from policies 7-34
system variables 7-7
understanding 7-2
variables 7-5, 7-6
FTP policy map
properties 17-37
generating usage reports 6-14
GTP policy map
properties 17-40
H.323 (ASA/PIX/FWSM) policy map
properties 17-45
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy
map
properties 17-50
HTTP (ASA7.2+/PIX7.2+) policy map
properties 17-58
identity user group
creating 13-19
selecting 13-21
user identity acquisition 13-2
IKE proposals
v1 properties 25-10
v2 properties 25-13
IM (ASA7.2+/PIX7.2+) policy map
properties 17-64
IM (IOS) policy map
properties 17-67
importing 6-21
Inspect parameter map
properties 21-29
interface roles
creating 6-68
IP Options policy map
properties 17-68
IPsec Pass Through policy map
properties 17-74
IPSec transform sets
attributes 25-25
understanding 25-19
IPv6 policy map
properties 17-70
LDAP attribute map objects
attributes 6-43
Local Web Filter parameter map
properties 21-37
locking
effects on activities 4-3
managing 6-1
maps
understanding 6-72
N2H2 parameter map
properties 21-38
NetBIOS policy map
properties 17-75
network/host
optimizing when deploying firewall rules 12-35
understanding 6-74
using in Event Viewer filters 66-59
network/host objects
naming when provisioned as object groups 6-92
networks/hosts
creating 6-76
unspecified value objects 6-80
object selectors 6-2
overrides
allowing 6-18
creating for multiple devices 6-19
creating for single device 6-18
deleting 6-21
managing 6-17
understanding 6-17
overview 1-18