Index Numerics
12.1 and 12.2
managing routers 60-2
3DES encryption algorithm
in IKE proposals 26-6
802.1x
802.1x Policy page 63-5
defining policies 63-4
interface authorization states 63-2
on Cisco IOS routers 63-1
supported topologies 63-3
understanding device roles 63-2
A
AAA
about 48-1
Cisco IOS routers
AAA Policy page 62-6
Accounting tab 62-10
Authentication tab 62-6
Authorization tab 62-7
Command Accounting dialog box 62-12
Command Authorization dialog box 62-9
defining services 62-4
overview 62-2
supported accounting types 62-3
supported authorization types 62-2
understanding method lists 62-3
configuring access control for IPS 36-21
configuring on firewall devices 48-1
credentials for device access 3-4
device administration 48-4
local fallback 48-3
network access 48-4
PIX/ASA/FWSM 48-5
Accounting tab 48-7
Authentication tab 48-5
Authorization tab 48-6
support 48-2
VPN access 48-4
AAA authentication groups
predefined 6-30
AAA firewall
MAC exempt lists 15-26
AAA Firewall page
Advanced Setting tab 15-20
AAA firewall policy
advanced settings 15-20
configuring 15-6
AAA page 15-28
AAA rules
ACL naming conventions 12-5
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring AAA firewall settings (PIX/ASA/FWSM) 15-6
configuring AuthProxy settings (IOS) 15-9
configuring cut-through proxy (ASA) 13-24
configuring for ASA/PIX/FWSM devices 15-4
configuring for IOS devices 15-7
configuring identity aware 13-21
configuring in Map view 35-23
configuring security group aware 14-17
configuring settings
for IOS devices in Map view 35-24
for PIX/ASA/FWSM in Map view 35-24
converting IPv4 12-28
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
managing 15-1
moving 12-19
preserving ACL names 12-4
properties 15-13
understanding 15-1
understanding how users authenticate 15-2
understanding NAT effects 12-3
understanding processing order 12-2
AAA Rules page 15-10
AAA server group objects
attributes 6-49
creating 6-47
default server groups on IOS devices 6-31
predefined authentication groups 6-30
understanding 6-27
AAA server objects
creating 6-32
HTTP-FORM settings 6-44
Kerberos settings 6-38
LDAP settings 6-39
NT settings 6-42
RADIUS settings 6-35
SDI settings 6-43
supported additional types for ASA/PIX/FWSM 6-28
supported types 6-28
TACACS+ settings 6-37
understanding 6-27
AAA servers
supported types on ASA, PIX, FWSM devices 6-28
Abort the Job dialog box 8-54
About Configuration Manager command 1-38
ABR
definition 55-67
access control list objects
creating 6-52
extended objects 6-53
standard objects 6-55
unified objects 6-57
web objects 6-56
access control lists
GET VPN security policies 29-10
policy discovery 5-14
access control lists (ACLs)
names preserved during discovery 12-4
naming conventions 12-5
resolving naming conflicts 12-6
access controls
configuring ACL names 16-22
configuring settings 16-22
configuring settings in Map view 35-24
Access Control Settings page 16-23
Access Group tab (IGMP) 54-5
Access Interface Configuration dialog box (ASA) 31-46
access permissions
Event Viewer 68-4
Health and Performance Monitor 70-3
maps 35-8
Report Manager 69-5
access policies
configuring 31-48
reference 31-43
understanding 31-42
access ports
Create and Edit Interface dialog boxes-Access Port mode 67-9
understanding 67-5
access rule
look up
from device managers 71-24
access rules
access control settings 16-23, 16-25
Access Rules page 16-10
ACL naming conventions 12-5
address requirements 16-5
Advanced dialog box 16-17
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring 16-7
configuring access control settings 16-22
configuring identity aware 13-21
configuring in Map view 35-23
configuring security group aware 14-17
controlling non-IP layer-2 traffic 23-1
deleting 12-9
detecting conflicts 16-27
disabling 12-20
editing 12-10
enabling 12-20
examples of event analysis
user access to server blocked 68-57
expiration dates 16-21
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
generating analysis reports 16-33
hit counts
details 16-35
how deployed 16-5
identity-aware rules
requirements 13-3
import examples 16-43
importing 16-39
IPS blocking, affect of 43-4
managing 16-1
moving 12-19
optimizing during deployment 16-45
packet tracer, analyzing with 71-30
preserving ACL names 12-4
Report Manager reports
firewall traffic reports 69-14
resolving conflicts 16-33
rule attributes 16-14
sharing ACLs among interfaces 11-18
syslog messages supported for look-up 71-53
understanding 16-1
understanding device-specific behavior 16-4
understanding global 16-3
understanding NAT effects 12-3
understanding processing order 12-2
understanding requirements when using inspection 17-4
understanding the automatic conflict detection user interface 16-29
viewing related CS-MARS events 71-49
viewing related events in Event Viewer 68-54
Accounting
Cisco IOS routers
settings 62-10
accounts and credentials
Cisco IOS routers
overview 62-13
PIX/ASA/FWSM
user accounts 51-7
user accounts, add/edit 51-7
accounts and credentials policies
Accounts and Credentials Policy page 62-15
User Accounts dialog box 62-17
ACLs
configuring names 16-22
ACS user authorization
configuring notifications when unavailable 1-26
Event Viewer 68-4
Health and Performance Monitor 70-3
how permissions affect what you can do 1-10
Report Manager 69-5
Active/Active failover
about 50-2
command replication 50-4
configuration synchronization 50-3
Active/Standby failover 50-2
Active Directory (AD)
collecting user statistics 13-25
configuring agent communication options 13-15
enabling for identity-aware firewall 13-8
identifying AD servers and agents 11-36, 13-8
requirements for identity-aware firewall 13-3
activities
accessing functions 4-8, 4-9
Activity Manager window 4-10
Approved state 4-5
approving 4-3, 4-21
benefits of 4-2
closing 4-16
creating 4-14
discarding 4-22
Edit state 4-4
locking 4-3
managing 4-1
multiple users 4-4
opening 4-15
overview 1-19
rejecting 4-21
responding to the Activity Required dialog box 4-14
states 4-4
Submitted state 4-5
submitting for approval 4-20
understanding 4-1
validating 4-18
viewing change reports 4-16
viewing status and history 4-23
working with 4-7
Activities command 1-33
Activities menu 1-35
Activity Manager window 4-10
Activity Required dialog box 4-14
Add/Edit Action Configuration dialog box 53-7
Add/Edit AnyConnect Client Image dialog box (ASA) 31-63
Add/Edit AnyConnect Custom Attributes dialog box (ASA) 31-68, 31-69
Add/Edit Applet dialog box 53-4
Add/Edit Collector dialog box 53-2
Add/Edit Content Rewrite dialog box (ASA) 31-52
Add/Edit DAP Entry Dialog Box > Device 32-29
Add/Edit File Encoding dialog box 31-53
Add/Edit Multicast Route dialog box 54-8, 54-10
description 54-9
Add/Edit PIM Neighbor Filter dialog box 54-13
Add/Edit Proxy Bypass dialog box 31-57
Add/Edit Syslog Configuration dialog box 53-6
Add AAA Rule dialog box 15-13
Add AAA Server dialog box 6-33
Add AAA Server Group dialog box 6-49
Add Access List dialog box (Allowed Hosts policy) 36-7
Add Access Rule dialog box 16-14
Add an Entry dialog box 39-30
Add AOL Class Map dialog box 17-27, 21-19
Add A Port Forwarding Entry dialog box 34-41
Add ASA Group Policies dialog box
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
overview 34-1
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
Technology settings 34-1
Add A Smart Tunnel Entry dialog box 34-66, 34-69
Add AS Path Entry dialog box 55-144
Add AS Path Object dialog box 55-143
Add Auto Signon Rules dialog box 34-26
Add Cat6k Block Vlan dialog box 43-16
Add Certificate dialog box 11-24
Add Certificate Filter dialog box 25-56
Add Cisco Secure Desktop Configuration dialog box 34-34
Add Client Access Rules dialog box 34-12
Add Client Update dialog box 34-80
Add Column dialog box 34-60
Add Community List Entry dialog box 55-146
Add Community List Object dialog box 55-145
Add Custom Pane dialog box 34-60
Add Custom Signature dialog box 39-15
Add DCE/RPC Map dialog box 17-28
Add Destinations dialog box 12-11
Add Device from Network wizard
Device Credentials page 3-44
Add Devices to Group command 1-30
Add Devices to Group dialog box 3-61
Add DNS Class Map dialog box 17-27
Add DNS Map dialog box
Filtering tab 17-33
overview 17-31
Protocol Conformance tab 17-32
Add eDonkey Class Map dialog box 17-27, 21-19
Add ESMTP Map dialog box 17-37
Add Extended Access Control Entry dialog box 6-60
Add Extended Access List dialog box 6-58
Add External Filter dialog box 21-41
Add FastTrack Class Map dialog box 17-27, 21-19
Add File Object dialog box 34-36
Add FlexConfig dialog box 7-30
Add FTP Class Map dialog box 17-27
Add FTP Map dialog box 17-40
Add Gnutella Class Map dialog box 17-27, 21-19
Add Group dialog box 3-61
Add Group Member dialog box 29-19
Add GTP Map dialog box 17-43
Add H.323 Class Map dialog box 17-27, 21-19
Add H.323 Map dialog box 17-48, 21-34
Add HSI Endpoint IP Address dialog box 17-51
Add HSI Group dialog box 17-50
Add HTTP Class Map dialog box 17-27, 21-19
Add HTTP Map dialog box 21-34
ASA 7.1.x, PIX 7.1.x, FWSM 3.x, IOS devices
Entity Length tab 17-55
Extension Request Method tab 17-58
General tab 17-54
overview 17-53
Port Misuse tab 17-59
RFC Request Method tab 17-57
Transfer Encoding tab 17-60
ASA 7.2+ and PIX 7.2+ devices 17-61
Add ICQ Class Map dialog box 17-27, 21-19
Add IKEv1 Proposal dialog box 26-10
Add IKEv2 Proposal dialog box 26-13
Add IMAP Class Map dialog box 17-27, 21-19
Add IMAP Map dialog box 21-34
Add IM Class Map dialog box 17-27
Add IM Map dialog box 21-34
ASA and PIX device 17-67
IOS device 17-70
Add Inspect/Application FW Rule wizard
Address and Port page 17-12
Inspected Protocol page 17-16
Match Traffic page 17-10
Add Inspect Parameter Map dialog box 21-31
Add Interfaces dialog box 12-13
Add IP Options Map dialog box 17-71
Add IPsec Pass Through Map dialog box 17-77
Add IPSec Transform Set dialog box 26-25
Add IPv4 Pool Object dialog box 6-87
Add IPv6 Map dialog box 17-74, 17-88
Add IPv6 Pool Object dialog box 6-88
Add Kazaa2 Class Map dialog box 17-27, 21-19
Add Key Server dialog box 29-19
Add Language dialog box 34-55
Add LDAP Attribute Map dialog box 6-45
Add LDAP Attribute Map Value dialog box 6-46
Add Link command 1-32
Add Link dialog box 35-20
Add Local Rules command 1-31
Add Local Web Filter Class Map dialog box 17-27, 21-19
Add Local Web Filter Parameter Map dialog box 21-38
Add MAC Address Pool Object dialog box 6-89
Add Map Object command 1-32
Add Map Object dialog box 35-17
Add Map Value dialog box 6-47
Add Match Condition and Action dialog box
DNS policy maps 17-34
ESMTP policy maps 17-38
FTP policy maps 17-41
GTP policy maps 17-46
H.323 (IOS) policy maps 21-35
H.323 policy maps 17-51
HTTP (Zone Based IOS) policy maps 21-35
HTTP policy maps 17-62
IM (Zone Based IOS) policy maps 21-35
IMAP policy maps 21-35
IM policy maps 17-68
IPv6 policy maps 17-75, 17-89
P2P policy maps 21-35
POP3 policy maps 21-35
SIP (IOS) policy maps 21-35
SIP policy maps 17-82, 17-92
Skinny policy maps 17-86
SMTP policy maps 21-35
Sun RPC policy maps 21-35
Web Filter policy maps 21-35
Add Match Criterion dialog box
AOL class maps 21-21
DNS class maps 17-34
eDonkey class maps 21-21
FastTrack class maps 21-21
FTP class maps 17-41
Gnutella class maps 21-21
H.323 (IOS) class maps 21-22
H.323 class maps 17-51
HTTP (IOS) class maps 21-22
HTTP class maps 17-62
ICQ class maps 21-21
IMAP class maps 21-24
IM class maps 17-68
Kazaa2 class maps 21-21
Local Web Filter class maps 21-29
MSN Messenger class maps 21-21
N2H2 class maps 21-30
POP3 class maps 21-24
SIP (IOS) class maps 21-25
SIP class maps 17-82, 17-92
SMTP class maps 21-26
Sun RPC class maps 21-29
Websense class maps 21-30
Windows Messenger class maps 21-21
Yahoo Messenger class maps 21-21
Add MSN Messenger Class Map dialog box 17-27, 21-19
Add N2H2 Parameter Map dialog box 21-39
Add N2H2 Web Filter Class Map dialog box 17-27, 21-19
Add NAT Rule dialog box
ASA 8.3+ 24-36
Add NetBIOS Map dialog box 17-78
Add Network/Host dialog box
General tab 6-81
NAT tab 24-42
Add New Device wizard
Device Credentials page 3-44
Add New Security Association dialog box 25-57
Add or Edit Plug-in Entry dialog box (ASA) 31-58
Add Other Devices dialog box 8-57
Add P2P Map dialog box 21-34
Add Permit Response dialog box 17-45
Add Per-Session NAT Rule dialog box 24-47
Add PIX/ASA/FWSM Web Filter Rule dialog box 18-5
Add PKI Enrollment dialog box
CA Information tab 26-57
Certificate Subject Name tab 26-63
Enrollment Parameters tab 26-61
overview 26-55
Trusted CA Hierarchy tab 26-64
Add Policy List Object dialog box 55-135
Add POP3 Class Map dialog box 17-27, 21-19
Add Port Forwarding List dialog box 34-39
Add Port List dialog box 6-94
Add Prefix List Entry dialog box 55-140, 55-142
Add Prefix List Object dialog box 55-138, 55-140
Add Protocol Info Parameter Map dialog box 21-33
Add Regular Expression dialog box 17-100
Add Regular Expression Group dialog box 17-100
Address Pools
PIX/ASA/FWSM 24-18
add/edit 24-18
address pools
overriding in connection profiles 30-8
Add Route Map Entry dialog box 55-129
Add Route Map Object dialog box 55-128
Add Row command 1-30
Add Rule Section dialog box 12-22
Add Server dialog box
Protocol Info Parameter maps 21-34
Add Service dialog box 6-95
Add Services dialog box 12-13
Add Single Sign On Server dialog boxes 34-41
Add SIP Class Map dialog box 17-27, 21-19
Add SIP Map dialog box 17-80, 17-90, 21-34
Add Skinny Map dialog box 17-84
Add SLA Monitor dialog box 51-10
Add Smart Tunnel Auto Signon Entry dialog box 34-71
Add Smart Tunnel Auto Signon Lists dialog box 34-70
Add Smart Tunnel Lists dialog box 34-65, 34-68
Add SMTP Class Map dialog box 17-27, 21-19
Add SMTP Map dialog box 21-34
Add SNMP Map dialog box 17-87
Add Sources dialog box 12-11
Add SSL VPN Customization dialog box 34-50
Applications 34-59
Copyright Panel 34-57
Custom Panes 34-59
Full Customization 34-58
Home Page 34-61
Informational Panel 34-56
Language 34-53
Logon Form 34-55
Logout Page 34-62
Title Panel 34-52
Toolbar 34-58
Add SSL VPN Gateway dialog box 34-63
Add Standard Access Control Entry dialog box 6-63
Add Standard Access List dialog box 6-58
Add Sun RPC Class Map dialog box 17-27, 21-19
Add Sun RPC Map dialog box 21-34
Add TCP Map dialog box 57-21
Add TCP Option Range Dialog Box 57-23
Add Text Object dialog box 7-32
Add Time Range dialog box 6-70
Add Traffic Flow dialog box 57-17
Add Transparent Firewall Rule dialog box 23-5
Add Trend Content Filter Class Map dialog box 17-27, 21-19
Add Trend Parameter Map dialog box 21-42
Add Unified Access Control Entry dialog box 6-66
Add URL Domain Name dialog box 21-45
Add URLF Glob Parameter Map dialog box 21-45
Add URL Filter Parameter Map dialog box 21-43
Add User dialog box 12-12, 36-19
Add User Group dialog box
Advanced PIX 6.3 settings 34-81
Browser Proxy settings 34-86
Client (IOS) settings 34-77
Clientless settings 34-82
Client VPN Software Update (IOS) settings 34-80
DNS/WINS settings 34-76
General settings 34-74
IOS Xauth Options settings 34-79
overview 34-72
Split Tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN Connection settings 34-87
SSL VPN Full Tunnel settings 34-83
SSL VPN Split Tunneling settings 34-85
Technology settings 34-72
Thin Client settings 34-83
Add User Profile dialog box 43-12
Add VDI Server dialog box 34-16
Add Virtual Sensor dialog box 38-7, 38-8
Add Web Access Control Entry dialog box 6-64
Add Web Filter Map dialog box 21-47
Add WebSense Parameter Map dialog box 21-39
Add Websense Web Filter Class Map dialog box 17-27, 21-19
Add Web Type Access List dialog box 6-58
Add Windows Messenger Class Map dialog box 17-27, 21-19
Add WINS Server dialog box 34-89
Add WINS Server List dialog box 34-88
Add Yahoo Messenger Class Map dialog box 17-27, 21-19
Add Zones dialog box 12-13
admin context 58-1
administration
selecting policies to manage 5-11
administrative settings, configuring 11-1
admin password, changing 10-24
ADSL
ADSL Policy page 61-36
ADSL Settings dialog box 61-37
defining settings 61-35
supported operating modes 61-34
ADSL policies
unable to deploy 9-15
Advanced dialog box
access rules 16-17
Advanced NAT Options
PIX/ASA/FWSM
add/edit 24-29
Advanced settings
interface configuration
PIX/ASA/FWSM 46-52
AES encryption algorithm
in IKE proposals 26-6
AIM-IPS interfaces
IPS Module Interface Settings page 61-22
AIP-SSM/SSC
ASA 57-14
Alarm Indication Signal (AIS) cells 61-50
allowed hosts, configuring for IPS 36-7
Allowed Hosts policy 36-7
Analysis Engine global variables
configuring 36-30
analysis reports
generating 16-33
anomaly detection
configuring 41-6
configuring histograms 41-11
configuring learning accept mode 41-8
configuring signatures 41-4
configuring thresholds 41-11
managing 41-1
modes 41-2
understanding 41-1
understanding histograms 41-9
understanding thresholds 41-9
understanding worms 41-2
when to turn off 41-4
zones
overview 41-3
anti-spoofing 56-2
AnyConnect
client images 31-60, 31-62
profiles 31-60, 31-62
editing 31-61
AnyConnect Client Image dialog box (ASA) 31-62
AnyConnect custom attributes 31-68, 31-69
AnyConnect Profile Editor 31-61
AOL class map objects
creating 21-16
match criteria 21-21
applet
embedded event manager 53-3
Apply IPS Update command 1-34
Apply IPS Update wizard 44-7
Approve Activity command 1-35
Approve Activity dialog box 4-21
Approved activity state 4-5
Approve Deployment Job dialog box 8-20, 8-39
Area Border Router
See ABR 55-67
ARP
PIX/ASA/FWSM
configuration 47-4
inspection 47-5
inspection, enable/disable 47-6
table 47-3
ARP table
static entry 47-3, 47-4
ASA
ASDM 71-22
CX 57-16
Auth Proxy Configuration 57-16
CX module
detecting 71-28
Failover
Add Failover Group 50-24
edit bridge group 50-16
FirePOWER module
detecting 71-28
IPS, QoS, and Connection Rules
ASA CX Auth Proxy Configuration 57-16
IPS modules 57-14
policy discovery 5-13
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-64
rollback restrictions for multiple context mode 8-64
security contexts
allocate interfaces 58-11
configuration 58-9
viewing allocated interfaces 58-11
setting up AUS or CNS 2-8
setting up SSL (HTTPS) 2-3
TCP State Bypass 57-3
ASA 5505
Management IPv6 47-10
ports and interfaces 46-6
ASA 8.3+
NAT policies
Add/Edit NAT rules dialog boxes 24-36
Translation Rules page 24-33
ASA Cluster Load Balance page 31-5
ASA CX
CX
about 57-16
ASA devices
5505
hardware port configuration 46-49
AAA support 6-28
about 46-1
adding or changing modules 3-39
adding SSL thumbprints manually 9-4
Bridge Groups
add/edit 46-51
Catalyst Service Module 46-1
changing those selected for reports 69-22
configuring for event management 68-27
configuring for report management 69-3
configuring IKE and IPsec policies 26-1
configuring IKEv2 authentication 26-65
configuring transparent firewall rules 23-1
Easy VPNs
connection profiles 28-13
Event Viewer support 68-4
FlexConfig object samples 7-20
global access rules 16-3
identity-aware services
configuring to provide 13-7, 14-8
interfaces 46-21
add/edit 46-26
Advanced tab 46-35
configuring 46-3
edit EtherChannel-assigned interface 46-11
EtherChannels 46-9, 46-13
General tab 46-27
IP Type 46-46
IPv6 46-39, 46-56
IPv6, add/edit 46-43
IPv6, add/edit prefixes 46-44
LACP 46-11
MAC address 46-48
PPPoE Users 46-54
VPDN groups 46-55
licenses 2-11
monitoring service level agreements 51-8
object group search 16-25
packet capture, using 71-36
packet tracer, using 71-30
remote access SSL VPNs
advanced settings 31-70
Anyconnect client settings 31-60, 31-62
browser plug-ins 31-58
configuring HTTP/HTTPS proxies and proxy bypass 31-55
content rewrite rules 31-51
encoding rules 31-53
Kerberos Constrained Delegation (KCD) 31-64, 31-66
other settings 31-49
performance settings 31-50
server certificate verification settings 31-29, 31-31, 31-71
shared license 31-72
shared license clients (ASA) 31-73
shared license servers (ASA) 31-74
remote access VPNs
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
AnyConnect client image settings (ASA) 31-63
AnyConnect custom attributes (ASA) 31-68, 31-69
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1 IPSec) 31-36
cluster load balancing 31-4, 31-5
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
connection profiles 31-6, 31-8
creating IPSec 30-24
creating SSL 30-14
customizing 31-75
device support 30-8
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
fragmentation settings 26-30, 26-42
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKE proposals 26-9
IKEv2 settings 26-35
IPsec proposals 31-40
ISAKMP/IPsec settings 26-31
managing 31-1
NAT settings 26-40
policy overview 31-2
post URL method and macro substitutions in bookmarks 31-82
proxy bypass rules (ASA) 31-57
Public Key Infrastructure (PKI) 26-54
secure desktop manager policies 32-9
smart tunnels 31-83
understanding IKE 26-5
understanding NAT settings 26-39
wizard 30-13
Report Manager reports
firewall summary botnet reports 69-15
firewall traffic reports 69-14
general VPN reports 69-16
VPN top reports 69-16
selecting for Event Viewer 68-32
selecting policy types to manage 5-11
SSL certificate configuration 11-22
ASA group policies objects
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
ASA Image Management 72-15, 72-32
ASAv
about 46-1
ASBR
definition 55-67
ASCII limitations for text 1-49
ASDM
access rule look-up 71-25
device manager 71-22
AS path objects
properties 55-143
ASR
zone-based firewall
global parameters 21-50
restrictions 21-3
assignment overview 1-19
Assignments tab, Policy view 5-54
Assign Shared Policy command 1-31
Assign Shared Policy dialog box 5-44
Asymmetric Digital Subscriber Line (ADSL)
on Cisco IOS routers 61-33
Asymmetric Routing Groups 46-5
Asynchronous Transfer Mode (ATM) 61-46
ATM 61-46
virtual channel connections (VCCs) 61-46
virtual channel identifier (VCI) 61-46
virtual path connections (VPCs) 61-46
virtual path identifier (VPI) 61-46
Attack Response Controller 43-1
attacks
broadcast 17-4
Denial of Service (DoS) 17-4
spoofing 17-4
SYN flooding 17-4
audit logs
configuring default settings 11-59
purging entries 10-23
understanding 10-19
working with 10-19
Audit Message Detail dialog box 10-21
Audit Report command 1-33
audit reports
generating and viewing 10-20
understanding 10-19
working with 10-19
Audit Report window 10-21
AUS
deploying configurations 8-41
deployment method 8-10
setting up 2-7
setting up on PIX Firewall and ASA devices 2-8
Authentication
Cisco IOS routers
settings 62-6
authentication
routing protocols 55-67
Authentication-Authorization-Accounting
see AAA 48-1
Authentication Header (AH) encryption algorithm 26-29
authentication methods
certificates (RSA signatures) 26-8
in IKE proposals 26-8
preshared keys 26-8
authentication testing
SSH 2-5
Authorization
Cisco IOS routers
settings 62-7
authorization proxy (AuthProxy)
configuring AAA rules 15-7
AuthProxy
configuring settings in Map view 35-24
Auth Proxy Configuration
ASA CX 57-16
AuthProxy dialog box 15-19
AuthProxy settings policy
configuring 15-9
autolink
omitting reserved networks from maps 11-3
automatic conflict detection
resolving conflicts 16-33
understanding 16-27
understanding the user interface 16-29
using 16-27
autonomous system paths
See AS paths
auto signon rules
ASA group policy objects 34-26
Auto Update Server (AUS)
adding 3-35
licensing 10-17
PIX/ASA/FWSM 52-1
add/edit server 52-3
troubleshooting deployment 9-18
Auto Update Server Properties dialog box 3-36
Available Bit Rate (ABR) 61-47
Available Servers dialog box 3-38
B
background image, map
deleting 35-13
importing 35-13
scale and position 35-13
setting 35-13
backup
event data store 68-34
backup.pl command 10-25
Backup command 1-34
backups, Security Manager database 10-25
bandwidth
VPN user reports 69-16
banners
configuring on firewall devices 48-9
benefits of product 1-2
BGP routing
BGP Routing Policy page 66-4
defining routes 66-2
Neighbors dialog box 66-6
on Cisco IOS routers 66-1
PIX/ASA/FWSM 55-2, 55-3
General tab 55-5
IPv4 Family - Aggregate Address configuration 55-9, 55-22
IPv4 Family - Filter configuration 55-10
IPv4 Family - General tab 55-7, 55-21
IPv4 Family - Neighbor configuration 55-11, 55-24
IPv4 Family - Network configuration 55-17, 55-29
IPv4 Family - Redistribution configuration 55-18, 55-30
IPv4 Family - Route Injection configuration 55-19, 55-31
IPv4 Family tab 55-6, 55-20
redistributing routes 66-3
Redistribution Mapping dialog box 66-7
Redistribution tab 66-6
Setup tab 66-4
Bidirectional Neighbor Filter 54-14
Bidirectional Neighbor Filter tab
PIM 54-13
blocking, IPS
configuring 43-7
configuring ARC 43-1
configuring blocking devices 43-14
configuring master blocking sensors 43-13
configuring never block hosts and networks 43-17
configuring router blocking interfaces 43-15
configuring user profiles 43-12
configuring VLAN blocking interfaces 43-16
general options 43-10
master blocking sensor 43-6
policy 43-8
rate limiting 43-4
router and switch blocking devices 43-4
strategies 43-3
understanding 43-1
Blocking page 43-8
Boot image/configuration
PIX/ASA 48-9
add/edit 48-11
bootstrap configuration
Failover 50-26
Botnet Traffic Filter Drop Rules Editor 19-13
botnet traffic filter rules
adding static entries 19-5
blocking blacklisted traffic 19-6
configuring DNS snooping 17-18
configuring in Map view 35-23
configuring the dynamic database 19-4
configuring with IPS global correlation 42-1
databases 19-1
Device Blacklist dialog box 19-15
Device Whitelist dialog box 19-15
Drop Rules Editor 19-13
Dynamic Blacklist Configuration tab 19-10
enabling DNS snooping 19-6
field definitions 19-9
illustrations 19-1
mitigating botnet activity 68-62
monitoring
activity using ASDM 68-62
activity using Event Viewer 68-60, 68-61
overview 68-59
understanding botnet syslog events 68-59
overview 19-1
preserving ACL names 12-4
Report Manager reports
firewall summary botnet reports 69-15
task flow 19-2
traffic classification 19-6
Traffic Classification dialog box 19-12
Traffic Classification tab 19-11
understanding 19-1
understanding NAT effects 12-3
understanding processing order 12-2
Whitelist/Blacklist tab 19-14
bridge group
failover
editing 50-16
Bridge Groups
ASA/FWSM
add/edit 46-51
bridge groups
defining 62-20
FWSM 3.1 47-3
Bridging
ASA 5505
Management IPv6 47-10
PIX/ASA/FWSM
ARP configuration 47-4
ARP Inspection 47-5
ARP Inspection, enable/disable 47-6
ARP Table 47-3
MAC Address, add/edit 47-8
MAC Address Table 47-7
MAC Learning 47-8
MAC Learning, enable/disable 47-9
Management IP address 47-10
bridging
Cisco IOS routers
Bridge Group dialog box 62-21
Bridging Policy page 62-20
BVI interfaces 62-19
overview 62-18
configuring transparent firewall rules 23-1
PIX/ASA/FWSM
about 47-1
configuring on 47-1
broadcast attacks, preventing 17-4
broadcasts
enabling directed on routers 61-20
browser plug-ins
configuring 31-58
Bundles 72-13
bypass mode
configuring for IPS 37-12
C
CA server authentication methods
SCEP (Simple Certificate Enrollment Protocol) 26-49
Cat6k Device dialog box 43-14
Catalyst 6500/7600 devices
configuring FWSM in site-to-site VPNs 25-46
configuring SSH 2-6
default transport protocol 11-22
deployment 8-28
FlexConfig object samples 7-22
IPS blocking devices 43-4
policy discovery for FWSM 5-13
rollback restrictions 8-65
Service Modules 46-1
Catalyst 6500/7600 switches
including in deployment jobs 8-27
Catalyst devices
policy discovery 5-13
remote access VPNs
Dynamic VTI/VRF Aware IPsec settings 33-7
high availability 33-11
IPsec proposals 33-4
user group policies 33-13
VPNSM/VPN SPA/VSPA settings 33-6
Catalyst platform policies
IDSM settings policy
Create and Edit IDSM Data Port VLANs dialog boxes 67-50
Create and Edit IDSM EtherChannel VLANs dialog boxes 67-49
IDSM Settings page 67-47
IDSM Slot-Port Selector dialog box 67-51
interfaces/VLANs policy
Access Port Selector dialog box 67-30
Create and Edit Interface dialog boxes-Access Port mode 67-9
Create and Edit Interface dialog boxes-Dynamic Port mode 67-18
Create and Edit Interface dialog boxes-Other mode 67-24
Create and Edit Interface dialog boxes-Routed Port mode 67-12
Create and Edit Interface dialog boxes-subinterfaces 67-22
Create and Edit Interface dialog boxes-Trunk Port mode 67-14
Create and Edit VLAN dialog boxes 67-28
Create and Edit VLAN Group dialog boxes 67-34
Interfaces tab 67-7
Service Module Slot Selector dialog box 67-35
Summary tab 67-3
Trunk Port Selector dialog box 67-31
VLAN Groups tab 67-33
VLAN Selector dialog box 67-35
VLANs tab 67-27
VLAN access lists policy
Create and Edit VLAN ACL Content dialog boxes 67-41
Create and Edit VLAN ACL dialog boxes 67-41
VLAN Access Lists page 67-39
Catalyst Summary Info command 1-34
Catalyst switches
configuring SSH 2-6
default transport protocol 11-22
showing modules, security contexts, and virtual sensors 3-54
Catalyst switches/7600 routers
troubleshooting deployment 9-15
Catalyst switches and 7600 devices
IDSM mode support 67-44
interface deployment failure 9-16
internal VLAN deployment failure 9-16
supported VTP modes 67-1
Catalyst switches and 7600 Series routers
access ports 67-5
Catalyst Summary Info page 67-2
defining IDSM Data Port VLANs 67-46
defining IDSM EtherChannel VLANs 67-44
defining ports 67-5
defining VACLs 67-37
defining VLAN groups 67-32
defining VLANs 67-26
deleting IDSM Data Port VLANs 67-47
deleting IDSM EtherChannel VLANs 67-45
deleting ports 67-7
deleting VACLs 67-38
deleting VLAN groups 67-33
deleting VLANs 67-27
discovering policies 67-1
generating interface names 67-6
IDSM settings 67-43
IDSM Settings page 67-47
interfaces 67-5
managing 67-1
routed ports 67-5
trunk ports 67-5
viewing interface and VLAN summary 67-3
VLAN Access Lists page 67-39
VLAN ACLs (VACLs) 67-36
VLAN groups 67-31
VLANs 67-25
Catalyst VPN Service Port Adapters (VSPAs)
configuring 25-41
Catalyst VPN Services Module (VPNSM)
configuring 25-41
configuring in remote access VPNs 33-6
Catalyst VPN Shared Port Adapter (VPN SPA)
configuring 25-41
configuring in remote access VPNs 33-6
categories
using 6-13
cautions
significance of iii-lxiii
CCO settings 11-4
CDP
configuring mode for IPS 37-12
CEF Interface Settings dialog box 61-26
CEF interface settings policies 61-24
certificates
accepting 11-4, 11-49
retrieving 11-4, 11-49
viewing 11-4, 11-49
certificates, SSL
adding thumbprints manually 9-4
configuring default settings for how handled 11-22
managing IPS 44-10
certificates for ASA image downloads 11-4
certificates for IPS package downloads 11-49
certificate to connection profile map policies
configuring policy 31-35
configuring rules 31-36
certificate trust management 11-4, 11-49
Change Report dialog box 4-18
change reports
selecting session in non-Workflow mode 4-18
viewing 4-16
Change Reports command 1-33
Checkpoint migration
configuring object group search on ASA 8.3+ devices 16-25
Choose a file dialog box 34-38
Cisco 7600 Series routers
managing 67-1
Cisco AnyConnect Profile Editor 31-61
Cisco Configuration Engine
troubleshooting device setup and deployment 9-18
Cisco Discovery Protocol (CDP)
enabling CDP on router interfaces 61-18
Cisco Express Forwarding (CEF)
CEF Interface Settings policy 61-25
CEF router interface settings policies 61-24
importance for QoS 65-2
Cisco IOS IPS
affect of load balancing 45-8
configuration files 45-3
configuration overview 45-4
configuring 45-1
configuring general settings 45-7
configuring interface rules 45-9
getting started 36-1
initial preparation of router 45-5
lightweight signature engines 45-2
limitations and restrictions 45-3
selecting signature category 45-6
understanding 45-1
understanding subsystems and revisions 45-2
Cisco IOS Routers
configuring IOS IPS 45-1
IPS blocking devices 43-4
Cisco IOS routers
802.1x 63-1
AAA 62-2
accounts and credentials 62-13
ADSL 61-33
advanced interface settings 61-13
available interface types 61-2
basic interface settings 61-1
BGP routing 66-1
CNS call-home mode 2-9
CNS event-bus mode 2-8
configuring SSH 2-6
CPU settings 62-25
default AAA server groups 6-31
deploying configurations using TMS 8-42
dialer interfaces 61-27
discovering policies 60-3
Domain Name System (DNS) 62-74
Dynamic Host Configuration Protocol (DHCP) 62-87
EIGRP routing 66-8
host and domain names 62-77
HTTP 62-28
interface deployment failure 9-14
IOS 12.1 and 12.2 60-2
licenses 2-12
line access 62-35
managing 60-1
memory settings 62-78
NAT 24-5
designating interfaces 24-6
dynamic rules 24-10
static rules 24-6
timeouts 24-13
NetFlow 64-1, 64-5, 64-12
Network Admission Control (NAC) 63-8
Network Time Protocol (NTP) 62-96
optional SSH settings 62-63
OSPF routing 66-19
permanent virtual connections (PVCs) 61-46
platform policies 60-1
Point-to-Point Protocol (PPP) 61-70
policy discovery 5-13
quality of service (QoS) 65-1
RIP routing 66-42
Secure Device Provisioning (SDP) 62-81
setting up SSL (HTTPS) 2-4
SHDSL 61-40
SNMP 62-66
static routing 66-50
syslog logging 64-1
time zone settings 62-22
transparent bridging 62-18
Cisco IOS Software
FlexConfig object samples 7-22
selecting policy types to manage 5-11
Cisco Prime Security Manager
see PRSM 71-27, 71-28
Cisco Secure Desktop configuration objects
creating 33-18
Cisco Security Management Suite server
logging into or exiting 1-11
Cisco Technical Assistance Center
creating diagnostic file 10-28
generating data 10-28
generating deployment or discovery status reports 10-30
generating partial database backup 10-30
Cisco Trust Agent (CTA) 63-9
CiscoWorks Common Services
backing up and restoring Security Manager 10-24
logging into or exiting 1-11
CiscoWorks user authorization, affect on what you can do 1-10
Class-Based Policing 65-6
class maps
understanding 6-76
Clear Connection Configuration dialog box 15-25
clear xlate
PIX/ASA/FWSM platform 59-1
CLI commands
FlexConfig objects 7-2
client applications 71-2
client connection characteristics
configuration modes 28-3
configuring policies for Easy VPN 28-7
extended authentication (xauth) 28-4
clientless access mode 30-4
client settings
configuring AnyConnect 31-62
understanding AnyConnect 31-60
client-side file browsing 1-49
enabling or disabling 11-10
CLI prompt
configuring on firewall devices 48-12
Clock
PIX/ASA/FWSM 48-13
clock
Cisco IOS routers
overview 62-22
clock settings
Cisco IOS routers
Clock Policy page 62-23
Clone Device command 1-29
Clone Policy Bundle dialog box 5-58
Clone Policy command 1-31
Clone Policy dialog box 5-47
Close Activity command 1-35
Close All Reports command (Report Manager) 69-8
Close Report command (Report Manager) 69-8
Close Ticket command 1-36
cluster, server
managing 10-2
overview 10-2
splitting server 10-3
synchronizing shared policies 10-5
Cluster Information page, device properties 3-49
clustering 3-9
cluster load balancing
configuring 31-5
understanding 31-4
understanding FQDN redirection 31-5
CNS
call-home mode 2-9
deploying configurations 8-41
deployment method 8-10
event-bus mode 2-8
setting up on PIX Firewall and ASA devices 2-8
color rules, configuring in Event Viewer 68-38
Combine Rules Selection Summary dialog box 12-24
commands
Activities menu 1-35
Edit menu (Configuration Manager) 1-30
Event Viewer File menu 68-9
Event Viewer View menu 68-9
File menu (Configuration Manager) 1-29
Help menu (Configuration Manager) 1-37
Launch menu 1-36
Manage menu 1-33
Map menu 1-32
Policy menu (Configuration Manager) 1-31
Report Manager menus 69-8
Tickets menu 1-35
Tools menu (Configuration Manager) 1-33
View menu (Configuration Manager) 1-30
Common Services
licensing 10-17
communication, device
troubleshooting 9-7
community list objects
properties 55-145
configurable dashboard for IPS and FW 71-1
configuration
initial Security Manager 1-24
understanding rollback 8-63
Configuration Archive
adding configurations from devices 8-58
overview 8-15
rolling back to archived configuration files 8-70
rolling back when deploying to file 8-71
settings 11-6
version viewer 8-60
viewing and comparing configuration versions 8-59
viewing transcripts 8-61
window 8-23
Configuration Archive command 1-33
Configuration Archive page 11-6
Configuration Engine
adding 3-35
CNS call-home mode 2-9
CNS event-bus mode 2-8
setting up 2-7
Configuration Engine Properties dialog box 3-36
configuration files
deploying in non-Workflow mode 8-28
deploying in Workflow mode 8-34, 8-39
deploying to 8-11
deploying to an AUS or CNS 8-41
deploying to a TMS 8-42
deployment process overview 8-1
factory-default configurations 46-2
previewing 8-44
redeploying to devices 8-52
rolling back after deploying to file 8-71
rolling back to archived configurations 8-70
rolling back to devices 8-68
selecting 1-49
web VPN policy discovery restrictions 3-8
configuration location, configuring for IOS IPS 45-7
Configuration Manager
overview 1-13
using 1-13
configurations
adding to the Configuration Archive 8-58
avoiding out-of-band changes 8-46
detecting out-of-band changes 8-45
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rolling back 8-62
rolling back Catalyst 6500/7600 8-65
rolling back failover devices 8-64
rolling back IPS and IOS IPS 8-65
rolling back multiple context mode 8-64
understanding out-of-band changes 8-12
viewing and comparing 8-59
configuration session
selecting session for change reports 4-18
viewing change reports 4-16
configuration sessions
discarding 4-22
configuration views 1-13
Configure dialog box 17-21
Configure DNS dialog box 17-18
Configure ESMTP dialog box 17-19
Configure Fragments dialog box 17-19
Configure Hardware Ports
ASA 5505 46-49
Configure IMAP dialog box 17-20
Configure POP3 dialog box 17-20
Configure RPC dialog box 17-20
Configure SMTP dialog box 17-19
Config Version Viewer (Preview Configuration) dialog box 8-44
conflict analysis reports
generating 16-33
conflict detection
resolving conflicts 16-33
understanding 16-27
understanding the user interface 16-29
using 16-27
connection
PIX/ASA/FWSM
identity-aware rules 13-21
rules 57-5
Connection Alias dialog box 31-24, 31-33
Connection Profile dialog box
AAA tab 31-12
General tab 31-10
IPSec tab 31-18
Secondary AAA tab 31-16
SSL tab 31-21
connection profiles
configuring 31-6
configuring for Easy VPN 28-13
properties
AAA 31-12
general 31-10
IPSec 31-18
policy overview 31-8
secondary AAA 31-16
SSL 31-21
sharing among multiple ASAs 30-8
Connection Profiles page 31-8
Connection Settings
MPC rule wizard
tab 57-8
connection timeout
device communication settings 11-22
Connection URL dialog box 31-24
connectivity, testing device 9-1
console
Cisco IOS routers
AAA tab 62-44
Accounting tab 62-47
Authentication tab 62-44
Authorization tab 62-45
Console Policy page 62-42
Setup tab 62-42
console port
Cisco IOS routers
defining AAA settings 62-37
defining setup parameters 62-35
Console timeout
PIX/ASA/FWSM 49-1
Constant Bit Rate (CBR) 61-47
contained modules
showing 3-54
content rewrite rules
defining for SSL VPN on ASA 31-51
Context-Based Access Control
choosing interfaces 17-2
configuring 17-5
configuring identity aware 13-21
preventing DoS attacks on IOS devices 17-4
selecting protocols 17-3
understanding 17-1
understanding access rule requirements 17-4
Context Editor dialog box (IOS) 33-15
contexts
see “security contexts” 58-1
continuity check (CC) cells 61-50
control plane (CP)
defining QoS on 65-12
policing on 65-9
Control Plane Policing 65-9
conventions iii-lxiii
cookie challenges 26-35
Copy command 1-30, 12-9
Copy Policies Between Devices command 1-31
Copy Policies wizard 5-33
CPU settings
defining utilization settings 62-25
overview 62-25
CPU Throttling Policy 11-32
CPU utilization
CPU Policy page 62-26
Create a Clone of Device dialog box 3-55
Create Activity dialog box 4-14
Create a Policy dialog box 5-54
Create Discovery Task dialog box 5-18
Create Extranet VPN Topology wizard
overview 25-65
Create Filter dialog box 1-45
Create Group Policy wizard
Clientless and Thin Client Access Modes page 30-22
Full Tunnel page 30-20
Group Policy page 30-19
using 30-19
Create Overrides for Device dialog box 6-20
Create Policy Bundle dialog box 5-57
Create Text Object dialog box 7-32
Create Ticket dialog box 4-14
Create VPN Topology wizard
Device Selection page 25-32
Edit Endpoints dialog box 25-33
Endpoints page 25-33
GET VPN Group Encryption page 25-53
GET VPN Peers page 25-59
High Availability page 25-50
Name and Technology page 25-30
overview 25-28
VPN Defaults page 25-60
credential objects
attributes 28-9
credentials
configuring on firewall devices 48-15
device manager validation 71-21
IPS module 3-19
service module 3-18
testing 9-1
understanding device 3-4
Credentials page
HTTPS port number
overriding with HTTP policy 3-46
Credentials page, device properties 3-44
crypto maps
understanding 26-18
CSC
MPC rule wizard
tab 57-8
CSDM Policy Editor dialog box 32-41
CS-MARS
access to Security Manager 71-44
configuring servers 11-7
discovering or changing controller used by device 71-46
events
historical and real-time lookup 71-48
looking up 71-48
integrating with Security Manager 71-42
integration with Security Manager 71-43
looking up Security Manager policies based on events 71-52
NetFlow 71-54
query
troubleshooting 71-47
registering in Security Manager 71-45
supported log messages 71-53
viewing access rule events 71-49
viewing IPS signature events 71-51
CS-MARS page 11-7
CSMDiagnostics.zip
setting debug options 11-11
CSMDiagnostics.zip file, creating 10-28
CSM Mobile 71-18
settings page 11-9
CSM Monitor widget 71-14
CSM tab, Licensing page 11-55
CSV (comma-separated values) files
supported formats for device inventory 10-9
CSV file
export HPM data as 70-29
Customize Desktop Settings page 11-10
Customized Toolbar command 1-31
Custom Protocol dialog box 17-21
Custom Report List command (Report Manager) 69-9
Cut command 1-30, 12-9
cut-through proxy, configuring 13-24
CX
ASA module
detecting 71-28
CXSC
MPC rule wizard
tab 57-8
D
Dashboard
CSM Mobile settings page 11-9
Dashboard tabs
default view 71-15
re-arranging 71-15
Dashboard widgets for device heath trends 71-2
database
backing up 10-25
backing up and restoring 10-24
generating partial backups for TAC 10-30
restoring 10-27
DCE/RPC policy map objects
creating 17-21
properties 17-28
DCS.properties file
DCS.doSerialAccessForFWSMVCs property 9-17
DCS.FWSM.checkThreshold property 9-16
SSH settings 9-7
warning message expression properties 9-10
DDNS
PIX/ASA/FWSM 52-18
add interface rules 52-19
update methods 52-19
update methods, add/edit 52-20
dead-peer detection (DPD) 26-32
debugging
configuring debug levels 11-11
Debug Options page 11-11
Default Report Settings command (Report Manager) 69-9
defaults, configuring 11-1
Delete Device command 1-29
Delete Map command 1-32
Delete Map dialog box 35-10
Delete Row command 1-30
Denial of Service (DoS)
preventing in SMTP using zone based firewall 21-26
denial of service (DoS)
preventing using unicast reverse path forwarding (RFP) 61-20
Denial of Service (DoS) attacks
configuring inspection settings to mitigate 17-103
preventing on IOS devices using inspection 17-4
denial of service (DoS) attacks
preventing using IKEv2 cookie challenge 26-35
deny
inspection
rules 17-5
Deploy command 1-29
Deploy Job dialog box 8-39
deployment
Add Other Devices dialog box 8-57
Auto Update Server 8-41
Catalyst 6500/7600 devices 8-28
changes not deployed when using schedules 8-55
changing device message severity level to ignore errors 9-10
changing FWSM multiple-context deployment to serial 9-17
Cisco Networking Services configuration engine 8-41
clearing XLATE on 59-1
configuration files, to 8-11
configurations 8-28
creating jobs in Workflow mode 8-35
creating or editing schedules 8-55
Deployment Manager window 8-16
device communication settings 9-4
devices, directly to 8-9
devices, through intermediate server 8-10
Edit Deploy Method dialog box 8-30
Edit Selected Deployment Method dialog box 8-30
error attempting to remove unreferenced object 9-12
errors
OS version mismatches 8-13
generating status report 10-30
handling OS version mismatches 8-13
managing 8-1
methods 8-8
minimum memory errors for ASA 8.3+ 9-11
non-Workflow mode 8-3
optimizing access rules 16-45
out-of-band changes
avoiding 8-46
detecting and analyzing 8-45
understanding 8-12
process overview 8-1
rolling back archived configurations 8-70
rolling back configurations 8-62
rolling back configurations, Catalyst 6500/7600 8-65
rolling back configurations, command conflicts 8-67
rolling back configurations, commands to recover from failover misconfiguration 8-68
rolling back configurations, failover devices 8-64
rolling back configurations, IPS and IOS IPS devices 8-65
rolling back configurations, multiple context mode 8-64
rolling back configuration when deploying to file 8-71
rolling back to last deployed configuration 8-68
setting debug options 11-11
suspending or resuming schedules 8-58
system settings 11-13
task flow
non-Workflow mode 8-3
Workflow mode 8-5
tips for successful jobs 8-27
TMS server 8-42
troubleshooting 9-1, 9-9
ADSL or PVC deployment failures 9-15
AUS problems 9-18
Catalyst interface settings 9-16
Catalyst internal VLANs 9-16
Catalyst switch and modules 9-15
Configuration Engine problems 9-18
Error Writing to Server messages 9-15
HTTP Response Code 500 messages 9-15
layer 2 interfaces 9-14
mixing deployment methods with routers and VPNs 9-13
router interface settings 9-14
routers 9-14
Security Manager cannot contact device 9-12
VPNs with routing processes 9-13
troubleshooting device communication 9-7
troubleshooting router connection failures 2-2
troubleshooting SSL certificate errors 9-4
troubleshooting VRF-aware IPsec on Catalyst 6500/7600 devices 25-17
understanding 8-1
understanding configuration rollback 8-63
using a Cisco Networking Services (CNS) server 8-41
viewing device details 8-26
viewing job summary 8-26
viewing status and history for jobs and schedules 8-26
viewing transcripts 8-61
Warning - Partial VPN Deployment dialog box 8-31
Workflow mode 8-5, 8-34, 8-39
working with 8-25
Deployment—Create or Edit a Job dialog box 8-35
deployment jobs
aborting 8-54
approval 8-7
approving 8-39
creating and editing in non-Workflow mode 8-28
creating and editing in Workflow mode 8-35
Deployment Manager 8-16
discarding 8-40
including devices in 8-8
multiple users 8-8
redeploying 8-52
rejecting 8-39
states
non-Workflow mode 8-4
Workflow mode 8-6
submitting 8-38
viewing history 8-26
Deployment Manager
overview 8-15, 8-16
Deployment Manager window 8-16
Deployment Schedules tab 8-21
Deployment page
PIX/ASA/FWSM Platform
clear xlate 59-1
Deployment Schedules tab 8-21
Deployments command 1-33
Deployment Settings page 11-13
Deployment Status Details dialog box 8-32
Deployment Workflow Commentary dialog boxes 8-20
Deploy Saved Changes dialog box 8-28
DES encryption algorithm
in IKE proposals 26-6
Designated Router
PIX/ASA/FWSM 54-12
Destination Contents dialog box 12-14
Dest Port Map dialog box 41-12
Detect Out of Band Changes command 1-34
device
AAA administration 48-4
firewall types 46-1
viewing inventory status 71-19
Device Access
FWSM
Resources, add/edit 51-3
PIX/ASA/FWSM 49-1
console timeout 49-1
host name 51-1
HTTP configuration 49-4
HTTP page 49-2
ICMP rules 49-4
ICMP rules, add/edit 49-5
Management Access interface 49-6
Secure Shell, add/edit host 49-8
Secure Shell (SSH) 49-7, 49-8
Server Access 52-1
SNMP host access 49-20
SNMP page 49-15
SNMP Trap configuration 49-17
Telnet configuration 49-25
Telnet page 49-24
user accounts 51-7
user accounts, add/edit 51-7
device access policies
defining 62-14
Device Admin
FWSM
Resources 51-3
device administration policies
configuring on firewall devices 48-1
device authentication
adding SSL thumbprints manually 9-4
SSL certificate default configuration 11-22
Device Blacklist dialog box 19-15
device clusters 3-9
device communication
changing device message severity level 9-10
managing settings 9-4
routers without K8/K9 crypto image 9-7
Security Manager cannot contact device after deployment 9-12
troubleshooting failures 9-7
Device Communication page 11-21
device communications
troubleshooting 9-1
device communication settings
connection timeout 11-22
retry count 11-22
socket read timeout 11-22
Device Connectivity Test dialog box 9-3
device credentials
understanding 3-4
Device Credentials page 3-44
Device Delete Validation dialog box 3-57
device groups 3-57, 3-61
adding or removing devices 3-61
creating group types 3-60
deleting groups or types 3-61
understanding 3-58
Device Groups page 3-48, 11-24
device health trends in Dashboard 71-2
Device Information page - Add Device from File 3-31
Device Information page - Configuration File 3-22
Device Information page - Network 3-14
Device Information page- New Device 3-26
device inventory
exporting
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
using command line utility 10-10
importing
device with policies 10-13
importing with policies 10-13
managing 3-1
sharing with PRSM 71-29
testing device connectivity 9-1
understanding 3-1
understanding contents 3-3
understanding device clusters 3-9
understanding generic devices 3-8
working with 3-34
device manager
access rule look up 71-24
ASDM 71-22
access rule look-up 71-25
credentials 71-21
IDM 71-22
PDM 71-22
prerequisites 71-23
SDM 71-23
access rule look-up 71-26
starting from HPM 70-3, 70-26
starting from Security Manager 71-21
troubleshooting 71-23
xdm-launcher.exe 71-23
Device Manager command 1-36
Device Properties
Cluster Information page 3-49
Credentials page 3-44
Device Groups page 3-48
General page 3-40
Policy Object Override pages
general reference 3-50
device properties
changes with policy effects 3-52
changing critical 3-51
image version changes with no policy effects 3-51
understanding 3-6
viewing or changing 3-39
Device Properties command 1-34
Device Properties page
creating object overrides 6-19
deleting overrides 6-21
overview 3-39
device response
to appear as an error message 9-10
devices
adding 3-6
adding configurations to the Configuration Archive 8-58
adding from configuration files 3-20
adding from inventory file 3-29
adding from network 3-12
adding local rules to shared policies 5-45
adding manually 3-25
adding or changing modules 3-39
assigning shared policies 5-44
avoiding out-of-band changes 8-46
changing critical properties 3-51
changing those selected for reports 69-22
cloning or duplicating 3-55
cloning shared policies 5-47
communication requirements 2-1
communication settings and certificates 9-4
configuring ASA licenses 2-11
configuring IOS licenses 2-12
configuring local policies 5-31
copying policies between 5-33
creating policy object overrides 6-19
deleting from inventory 3-56
deleting policy object overrides 6-21
deployment through intermediate server 8-10
deployment to 8-9
detecting out-of-band changes 8-45
discovering or changing CS-MARS controller 71-46
discovering policies 5-12
discovering policies on existing devices 5-15
dynamic IP addresses 3-35
image version changes with no policy effects 3-51
including in deployment jobs or schedules 8-8
including unmanaged or non-Cisco in a VPN 25-11
inheriting policy rules 5-46
maps
adding existing managed 35-16
adding new managed 35-16
displaying devices from Device View 35-16
displaying managed 35-16
removing managed 35-16
showing containment for Catalyst switches, ASA, PIX, IPS devices 35-16
modifying policy assignment 5-49
modifying shared policies 5-48
naming conventions 3-3
overview of monitoring 1-7
policy status icons 5-30
preparing for management 2-1
property changes with policy effects 3-52
redeploying configuration files to 8-52
redeploying configurations to replaced hardware 8-52
renaming policies 5-48
replacing policies 5-44
rolling back configurations 8-68, 8-70, 8-71
selecting in site-to-site VPNs 25-32
selecting multiple 1-44
sharing multiple policies 5-42
sharing with PRSM 71-29
showing contained modules 3-54
system variables 7-7
testing connectivity 9-1
troubleshooting communication 9-7
troubleshooting communication and deployment 9-1
troubleshooting device discovery failures 3-7
unassigning policies 5-36
understanding out-of-band changes 8-12
unsharing policies 5-43
using global search to find specific devices 1-41
what counts as a device 3-3
device selector
filtering 1-44
Device Selector dialog box 1-44
Device Server Assignment dialog box 9-8
device status view
working with 3-62
Device Status View command 1-31
Device view
adding local rules to shared policies 5-45
assigning shared policies 5-44
cloning shared policies 5-47
configuring local policies 5-31
configuring VPN topologies 25-19
copying policies between devices 5-33
inheriting policies 5-46
managing policies 5-30
modifying policy assignments 5-49
modifying shared policies 5-48
overview 1-14
policy banner 5-38
policy shortcut menu 5-40
policy status icons 5-30
renaming policies 5-48
sharing local policies 5-41
sharing multiple policies 5-42
unassigning policies 5-36
understanding basic policy management 5-31
understanding shared policies 5-37
unsharing policies 5-43
device view
understanding 3-1
Device View command 1-31
Device Whitelist dialog box 19-15
DHCP
Cisco IOS routers
defining address pools 62-91
defining policies 62-90
DHCP Database dialog box 62-94
DHCP Policy page 62-92
IP Pool dialog box 62-94
overview 62-87
understanding database agents 62-88
understanding option 82 62-89
understanding relay agents 62-88
understanding secured ARP 62-89
configuring passthrough for IOS devices 23-3
PIX/ASA/FWSM 52-10
add/edit servers 52-12
advanced configuration 52-13
configuring DHCP servers 52-10
server options 52-13
traffic blocked 9-15
DHCP relay
interface-specific 46-35
Option 82 46-35, 52-5
PIX/ASA/FWSM 52-5, 52-7
add/edit agent 52-6
add/edit server 52-7
Trusted Interface (Option 82) 46-35, 52-5
DHCPv6 relay
PIX/ASA/FWSM
add/edit agent 52-9
add/edit server 52-9
diagnostics
setting debug options 11-11
diagnostics file, creating 10-28
dial backup
configuring in Easy VPN 28-2
configuring in VPN 25-39
configuring VPN advanced settings 25-40
Dial Backup Settings dialog box 25-40
dialer interfaces
defining BRI properties 61-29
defining profiles 61-27
Dialer Physical Interface dialog box 61-32
Dialer Policy page 61-30
Dialer Profile dialog box 61-31
on Cisco IOS routers 61-27
Diffie-Hellman groups
in IKE proposals 26-7
Digital Subscriber Line (DSL) 61-33
digital subscriber line-access multiplexer (DSLAM) 61-34
directed broadcasts
enabling 61-20
Disable/enable NAT rules 24-33, 24-46
Discard Activity command 1-35
Discard Activity dialog box 4-22
Discard command 1-30
Discard Deployment Job dialog box 8-20
Discard Ticket command 1-36
Discard Ticket dialog box 4-22
discovering
remote access VPNs 30-12
site-to-site VPNs 25-24
Discover Policies on Device command 1-31
Discover VPN Policies command 1-31
Discover VPN Policies wizard 25-24
discovery
default behavior settings 11-25
generating status report 10-30
invalid certificate error 9-6
overview 1-19
security certificate error 9-4, 9-6
setting debug options 11-11
Discovery Settings page 11-25
Discovery Status dialog box 5-23
discovery task
frequently asked questions 5-27
starting 5-15
viewing status 5-22
disk space, monitoring event data store 68-33
Display Actual Size command 1-32
Distributed Traffic Shaping (DTS) 65-7
DMVPN (Dynamic Multipoint VPN)
advantages of using with GRE 27-11
configuring 27-12
configuring GRE modes 27-12
large scale DMVPNs
configuring 27-16
configuring server load balancing 27-17
overview 27-1, 27-9
spoke-to-spoke connections 27-10
supported platforms 25-9
understanding 27-10
DNS
configuring for inspection rules 17-18
PIX/ASA/FWSM
add/edit server group 52-16
add server 52-17
servers page 52-14
DNS class map objects
creating 17-21
match criteria 17-34
DNS policy map objects
creating 17-21
match conditions and actions 17-34
properties 17-31
DNS servers
configuring for IPS global correlation 36-24
DNS snooping 19-6
dock
report windows 69-29
view windows 68-36
Dock Map View command 1-32
documentation
conventions iii-lxiii
Domain AD Server dialog box 13-10
Domain Name System (DNS)
Cisco IOS routers
defining policies 62-75
DNS Policy page 62-76
IP Host dialog box 62-76
overview 62-74
do not ask warnings, resetting 11-10
drill-down reports 69-26
DSLAM 61-34
duration
VPN user reports 69-16
dynamic access policies
attributes 32-4, 32-7
configuring 32-2
managing 32-1
understanding 32-1
dynamic access policies (DAP) 32-29
Dynamic Access Policy page
Add/Edit Dynamic Access Policy dialog box
Add/Edit DAP Entry dialog box 32-20
Add/Edit DAP Entry dialog box > AAA Attributes Cisco 32-22
Add/Edit DAP Entry dialog box > AAA Attributes LDAP 32-23
Add/Edit DAP Entry dialog box > AAA Attributes RADIUS 32-25
Add/Edit DAP Entry dialog box > Anti-Spyware 32-25
Add/Edit DAP Entry dialog box > Anti-Virus 32-26
Add/Edit DAP Entry dialog box > AnyConnect Identity 32-28
Add/Edit DAP Entry dialog box > Application 32-29
Add/Edit DAP Entry dialog box > File 32-30
Add/Edit DAP Entry dialog box > NAC 32-32
Add/Edit DAP Entry dialog box > Operating System 32-32
Add/Edit DAP Entry dialog box > Personal Firewall 32-33
Add/Edit DAP Entry dialog box > Policy 32-34
Add/Edit DAP Entry dialog box > Process 32-35
Add/Edit DAP Entry dialog box > Registry 32-36
Advanced Expressions tab 32-40
Logical Operations tab 32-37
Main tab 32-13
Dynamic Access Policy page (ASA) 32-11
Cisco Secure Desktop Manager Policy Editor dialog box 32-41
Dynamic Access policy page (ASA) > Add/Edit Dynamic Access Policy dialog box 32-12
Dynamic Blacklist Configuration tab 19-10
dynamic crypto maps 26-18
dynamic filter snooping (DNS)
enabling 17-18
Dynamic Multipoint VPN (DMVPN)
mandatory and optional policies 25-6
dynamic NAT
Cisco IOS routers 24-10
Dynamic Translation Rule
PIX/ASA/FWSM 24-22
add/edit 24-23
dynamic VTI
configuring in Easy VPN 28-12
in remote access VPNs 33-7
understanding use in Easy VPN 28-2
E
Easy VPN
configuration modes 28-3
configuration overview 28-5
configuring client connection characteristics 28-7
configuring dial backup 28-2
configuring dynamic VTI 28-12
configuring high availability 28-2
connection profile policies 28-13
connection profiles (ASA, PIX 7+) 31-8
extended authentication (xauth) 28-4
important configuration notes 28-6
IPsec proposals 28-10
mandatory and optional policies 25-6
overview 28-1
supported platforms 25-9
understanding 28-1
understanding dynamic VTI 28-2
user group policies 28-14
ECMP 22-4
Edit AAA Option dialog box 15-19
Edit AAA Rule dialog box 15-13
Edit AAA Server dialog box 6-33
Edit AAA Server Group dialog box 6-49
Edit Access Rule dialog box 16-14
Edit Actions dialog box 39-12
Edit activity state 4-4
Edit AOL Class Map dialog box 17-27, 21-19
Edit A Port Forwarding Entry dialog box 34-41
Edit ASA Group Policies dialog box
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
overview 34-1
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
Edit A Smart Tunnel Entry dialog box 34-66, 34-69
Edit AS Path Entry dialog box 55-144
Edit AS Path Object dialog box 55-143
Edit Auto Signon Rules dialog box 34-26
Edit Auto Update Settings dialog box 11-52
Edit Category dialog box 12-14
Edit Cisco Secure Desktop Configuration dialog box 34-34
Edit Client Access Rules dialog box 34-12
Edit Client Update dialog box 34-80
Edit Column dialog box 34-60
Edit Community List Entry dialog box 55-146
Edit Community List Object dialog box 55-145
Edit Custom Pane dialog box 34-60
Edit DCE/RPC Map dialog box 17-28
Edit Deploy Method dialog box 8-30
Edit Description dialog box 12-14
Edit Destinations dialog box 12-11
Edit Device Groups command 1-30
Edit Device Groups dialog box 3-59
Edit DNS Class Map dialog box 17-27
Edit DNS Map dialog box
Filtering tab 17-33
overview 17-31
Protocol Conformance tab 17-32
Edit eDonkey Class Map dialog box 17-27, 21-19
Edit Endpoints dialog box
FWSM tab 25-46
overview 25-33
Protected Networks tab 25-45
VPN Interface tab 25-35, 25-49
VPNSM/VPN SPA/VSPA settings, VPN Interface tab 25-41
VRF Aware IPsec tab 25-47
Edit ESMTP Map dialog box 17-37
Edit Extended Access Control Entry dialog box 6-60
Edit Extended Access List dialog box 6-58
Edit External Filter dialog box 21-41
Edit Extranet VPN dialog box
overview 25-65
Edit FastTrack Class Map dialog box 17-27, 21-19
Edit Fidelity dialog box 39-13
Edit File Object dialog box 34-36
Edit FlexConfig dialog box 7-30
Edit FTP Class Map dialog box 17-27
Edit FTP Map dialog box 17-40
Edit Gnutella Class Map dialog box 17-27, 21-19
Edit Group Member dialog box 29-21
Edit GTP Map dialog box 17-43
Edit H.323 Class Map dialog box 17-27, 21-19
Edit H.323 Map dialog box 17-48, 21-34
Edit HSI Endpoint IP Address dialog box 17-51
Edit HSI Group dialog box 17-50
Edit HTTP Class Map dialog box 17-27, 21-19
Edit HTTP Map dialog box 21-34
ASA 7.1.x, PIX 7.1.x, FWSM 3.x, IOS devices
Entity Length tab 17-55
Extension Request Method tab 17-58
General tab 17-54
overview 17-53
Port Misuse tab 17-59
RFC Request Method tab 17-57
Transfer Encoding tab 17-60
ASA 7.2+ and PIX 7.2+ devices 17-61
Edit ICQ Class Map dialog box 17-27, 21-19
Edit IKEv1 Proposal dialog box 26-10
Edit IKEv2 Proposal dialog box 26-13
Edit IMAP Class Map dialog box 17-27, 21-19
Edit IMAP Map dialog box 21-34
Edit IM Class Map dialog box 17-27
Edit IM Map dialog box 21-34
ASA and PIX device 17-67
IOS device 17-70
Edit Inspect/Application FW Rule wizard
Address and Port page 17-12
Inspected Protocol page 17-16
Match Traffic page 17-10
Edit Inspect Parameter Map dialog box 21-31
Edit Interfaces dialog box 12-13
Edit IP Options Map dialog box 17-71
Edit IPsec Pass Through Map dialog box 17-77
Edit IPSec Transform Set dialog box 26-25
Edit IPv4 Pool Object dialog box 6-87
Edit IPv6 Map dialog box 17-74, 17-88
Edit IPv6 Pool Object dialog box 6-88
Edit Kazaa2 Class Map dialog box 17-27, 21-19
Edit Key Server dialog box 29-19
Edit Language dialog box 34-55
Edit LDAP Attribute Map dialog box 6-45
Edit LDAP Attribute Map Value dialog box 6-46
Edit Load Balancing Parameters dialog box 27-17
Edit Local Web Filter Class Map dialog box 17-27, 21-19
Edit Local Web Filter Parameter Map dialog box 21-38
Edit MAC Address Pool Object dialog box 6-89
Edit Map Value dialog box 6-47
Edit Match Condition and Action dialog box
DNS policy maps 17-34
ESMTP policy maps 17-38
FTP policy maps 17-41
GTP policy maps 17-46
H.323 (IOS) policy maps 21-35
H.323 policy maps 17-51
HTTP (Zone Based IOS) policy maps 21-35
HTTP policy maps 17-62
IM (Zone Based IOS) policy maps 21-35
IMAP policy maps 21-35
IM policy maps 17-68
IPv6 policy maps 17-75, 17-89
P2P policy maps 21-35
POP3 policy maps 21-35
SIP (IOS) policy maps 21-35
SIP policy maps 17-82, 17-92
Skinny policy maps 17-86
SMTP policy maps 21-35
Sun RPC policy maps 21-35
Web Filter policy maps 21-35
Edit Match Criterion dialog box
AOL class maps 21-21
DNS class maps 17-34
eDonkey class maps 21-21
FastTrack class maps 21-21
FTP class maps 17-41
Gnutella class maps 21-21
H.323 (IOS) class maps 21-22
H.323 class maps 17-51
HTTP (IOS) class maps 21-22
HTTP class maps 17-62
ICQ class maps 21-21
IMAP class maps 21-24
IM class maps 17-68
Kazaa2 class maps 21-21
Local Web Filter class maps 21-29
MSN Messenger class maps 21-21
N2H2 class maps 21-30
POP3 class maps 21-24
SIP (IOS) class maps 21-25
SIP class maps 17-82, 17-92
SMTP class maps 21-26
Sun RPC class maps 21-29
Websense class maps 21-30
Windows Messenger class maps 21-21
Yahoo Messenger class maps 21-21
Edit menu
Configuration Manager 1-30
Edit MSN Messenger Class Map dialog box 17-27, 21-19
Edit N2H2 Parameter Map dialog box 21-39
Edit N2H2 Web Filter Class Map dialog box 17-27, 21-19
Edit NAT Rule dialog box
ASA 8.3+ 24-36
Edit NetBIOS Map dialog box 17-78
Edit Network/Host dialog box
General tab 6-81
NAT tab 24-42
Edit Options dialog box 16-17
Edit P2P Map dialog box 21-34
Edit Permit Response dialog box 17-45
Edit Per-Session NAT Rule dialog box 24-47
Edit PIX/ASA/FWSM Web Filter Rule dialog box 18-5
Edit PKI Enrollment dialog box
CA Information tab 26-57
Certificate Subject Name tab 26-63
Enrollment Parameters tab 26-61
overview 26-55
Trusted CA Hierarchy tab 26-64
Edit Policy Assignments command 1-31
Edit Policy List Object dialog box 55-135
Edit POP3 Class Map dialog box 17-27, 21-19
Edit Port Forwarding List dialog box 34-39
Edit Port List dialog box 6-94
Edit Prefix List Entry dialog box 55-140, 55-142
Edit Prefix List Object dialog box 55-138, 55-140
Edit Protocol Info Parameter Map dialog box 21-33
Edit Regular Expression dialog box 17-100
Edit Regular Expression Group dialog box 17-100
Edit Route Map Entry dialog box 55-129
Edit Route Map Object dialog box 55-128
Edit Row command 1-30
Edit Rule Section dialog box 12-22
Edit Security Association Dialog Box 25-57
Edit Selected Deployment Method dialog box 8-30
Edit Server dialog box
Protocol Info Parameter maps 21-34
Edit Server Group dialog box 15-19
Edit Service dialog box 6-95
Edit Services dialog box 12-13
Edit Signature dialog box 39-15
Edit Signature Parameter—Component List dialog box 39-29
Edit Signature Parameters dialog box 39-24
Edit Single Sign On Server dialog boxes 34-41
Edit SIP Class Map dialog box 17-27, 21-19
Edit SIP Map dialog box 17-80, 17-90, 17-98, 21-34
Edit Skinny Map dialog boxes 17-84
Edit SLA Monitor dialog box 51-10
Edit Smart Tunnel Auto Signon Entry dialog box 34-71
Edit Smart Tunnel Auto Signon Lists dialog box 34-70
Edit Smart Tunnel Lists dialog box 34-65, 34-68
Edit SMTP Class Map dialog box 17-27, 21-19
Edit SMTP Map dialog box 21-34
Edit SNMP Map dialog box 17-87
Edit Sources dialog box 12-11
Edit SSL VPN Customization dialog box 34-50
Applications 34-59
Copyright Panel 34-57
Custom Panes 34-59
Full Customization 34-58
Home Page 34-61
Informational Panel 34-56
Language 34-53
Logon Form 34-55
Logout Page 34-62
Title Panel 34-52
Toolbar 34-58
Edit SSL VPN Gateway dialog box 34-63
Edit Standard Access Control Entry dialog box 6-63
Edit Standard Access List dialog box 6-58
Edit Sun RPC Class Map dialog box 17-27, 21-19
Edit Sun RPC Map dialog box 21-34
Edit TCP Map dialog box 57-21
Edit TCP Option Range Dialog Box 57-23
Edit Text Object dialog box 7-32
Edit Time Range dialog box 6-70
Edit Traffic Flow dialog box 57-17
Edit Translated Address dialog box 24-29
Edit Transparent EtherType dialog box 23-6
Edit Transparent Firewall Rule dialog box 23-5
Edit Transparent Mask dialog box 23-7
Edit Trend Content Filter Class Map dialog box 17-27, 21-19
Edit Trend Parameter Map dialog box 21-42
Edit Unified Access Control Entry dialog box 6-66
Edit Update Server Settings dialog box 11-49
Edit URL Domain Name dialog box 21-45
Edit URLF Glob Parameter Map dialog box 21-45
Edit URL Filter Parameter Map dialog box 21-43
Edit User Credentials dialog box 36-19
Edit User dialog box 12-12
Edit User Group dialog box
Advanced PIX 6.3 settings 34-81
Browser Proxy settings 34-86
Client (IOS) settings 34-77
Clientless settings 34-82
Client VPN Software Update (IOS) settings 34-80
DNS/WINS settings 34-76
General settings 34-74
IOS Xauth Options settings 34-79
overview 34-72
Split Tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN Connection settings 34-87
SSL VPN Full Tunnel settings 34-83
SSL VPN Split Tunneling settings 34-85
Technology settings 34-72
Thin Client settings 34-83
Edit VDI Server dialog box 34-16
Edit Virtual Sensor dialog box 38-7, 38-8
Edit VPN dialog box
Device Selection tab 25-32
Edit Endpoints dialog box 25-33
Endpoints tab 25-33
High Availability tab 25-50
Name and Technology tab 25-30
overview 25-28
Edit Web Access Control Entry dialog box 6-64
Edit Web Filter Map dialog box 21-47
Edit Web Filter Options dialog box 18-9
Edit Web Filter Type dialog box 18-8
Edit Websense Parameter Map dialog box 21-39
Edit Websense Web Filter Class Map dialog box 17-27, 21-19
Edit Web Type Access List dialog box 6-58
Edit Windows Messenger Class Map dialog box 17-27, 21-19
Edit WINS Server dialog box 34-89
Edit WINS Server List dialog box 34-88
Edit Yahoo Messenger Class Map dialog box 17-27, 21-19
Edit Zones dialog box 12-13
eDonkey class map objects
creating 21-16
match criteria 21-21
EIGRP routing
defining interface properties 66-10
defining routes 66-9
EIGRP Routing Policy page 66-13
Interface dialog box 66-16
Interfaces tab 66-15
on Cisco IOS routers 66-8
PIX/ASA/FWSM
advanced settings 55-34
Filter Rule configuration 55-40
Filter Rules tab 55-39
Interface configuration 55-48
Interfaces tab 55-47
neighbor configuration 55-42
Neighbors tab 55-41
policy 55-32
redistribution configuration 55-44
Redistribution tab 55-42
Setup tab 55-36
Summary Address configuration 55-46
Summary Address tab 55-45
redistributing routes 66-12
Redistribution Mapping dialog box 66-18
Redistribution tab 66-17
Setup dialog box 66-14
Setup tab 66-13
e-mail
blocking spam using zone-based firewall rules 21-26
preventing DoS attacks 21-26
e-mail notifications
configuring SMTP server 1-26
PIX/ASA/FWSM
recipient set-up 53-8
syslog messages 53-8
embedded event manager
add/edit action configuration 53-7
add/edit applet 53-4
add/edit syslog configuration 53-6
ASA 53-3
Enable/disable NAT rules 24-33, 24-46
Enable PIM and IGMP
PIX/ASA/FWSM 54-1
Encapsulating Security Protocol (ESP) encryption algorithm 26-28
encoding rules
defining for SSL VPN (ASA) 31-53
encryption algorithms
3DES (Triple DES) 26-6
AES (Advanced Encryption Standard) 26-6
DES (Data Encryption Standard) 26-6
in IKE proposals 26-6
endpoints and protected networks
configuring dial backup 25-39
defining in GET VPN topologies 25-59
defining in VPN topologies 25-33
VPN Interface tab 25-35, 25-49
equal-cost multi-path 22-4
Error Writing to Server deployment errors 9-15
ESMTP
configuring for inspection rules 17-19
ESMTP policy map objects
creating 17-21
match conditions and actions 17-38
properties 17-37
EtherChannel
Create and Edit IDSM EtherChannel VLANs dialog boxes 67-49
defining IDSM VLANs 67-44
deleting IDSM VLANs 67-45
EtherChannels
ASA 46-9
edit assigned interface 46-11
LACP 46-11
load balancing 46-13
evaluation license
upgrading to permanent license 10-16
event
lists 53-9
add/edit 53-10
syslog class
add/edit 53-11
syslog message ID
add/edit 53-11
Event Action Filters page 40-7
Event Action Overrides page 40-13
event actions, IPS
configuring filter rules 40-4
configuring network information 40-17
configuring OS maps 40-21
configuring overrides 40-13
configuring settings 40-23
configuring target value ratings 40-17
example filter rule 68-64
filter rule attributes 40-9
filter rules policy 40-7
filter rules tips 40-6
overview 40-1
possible actions 40-2
process overview 40-1
Event Management page 11-27, 11-33
CPU Throttling Policy dialog box 11-32
event manager applet 53-3
Event Manager service
configuring 68-29
managing 68-29
monitoring event store disk space 68-33
monitoring status 68-30
selecting devices to monitor 68-32
starting and stopping 68-29
status icon colors 68-30
events
archiving (backing up) the event data store 68-34
configuring firewall devices (ASA, FWSM) 68-27
configuring IPS devices 68-28
copying 68-51
CS-MARS 71-53
looking up 71-48
looking up policies based on related events 71-52
Netflow support for policy lookup 71-54
viewing access rule events 71-49
viewing IPS signature events 71-51
ensuring time synchronization 68-26
Event Viewer
clearing filters 68-46
context menu 68-47
cross-launching from HPM 68-56
filtering by column 68-43
filtering by events 68-45
filtering overview 68-41
looking up 68-53
looking up policies based on related events 68-52
refreshing event table 68-42
selecting time range 68-41
text searches (quick filter) 68-45
using time slider with filtering 68-42
viewing access rule events 68-54
viewing IPS signature events 68-55
examining details 68-51
examples of analysis
mitigating botnet activity 68-62
monitoring and mitigating botnet activity 68-59
monitoring botnet activity using ASDM 68-62
monitoring botnet activity using Event Viewer 68-60
monitoring botnet activity using Report Manager 68-61
monitoring identity-aware firewall policies 13-27
monitoring TrustSec policies 14-17
overview 68-56
removing false positive IPS events 68-64
understanding botnet syslog events 68-59
user access to server blocked 68-57
performing operations on 68-47
properties 68-17
recovering the event data store 68-34
saving to a file 68-51
understanding Event Viewer access control 68-4
viewing 68-1
Event Viewer
archiving (backing up) the event data store 68-34
arranging views 68-36
ASA devices, configuring to provide events 68-27
columns 68-17
configuring color rules 68-38
configuring Event Manager service 68-29
copying events 68-51
creating custom views 68-39
cross-launching from HPM 68-56
deleting custom views 68-41
editing view name and description 68-39
ensuring time synchronization 68-26
Event Monitoring window 68-13
events
context menu 68-47
historical and real-time lookup 68-53
looking up 68-53
event table
customizing appearance 68-37
event details pane 68-25
refreshing 68-42
time slider 68-24
toolbar 68-15
examining event details 68-51
examples of analysis
mitigating botnet activity 68-62
monitoring and mitigating botnet activity 68-59
monitoring botnet activity 68-60
monitoring identity-aware firewall policies 13-27
monitoring TrustSec policies 14-17
overview 68-56
removing false positive IPS events 68-64
understanding botnet syslog events 68-59
user access to server blocked 68-57
features
historical views 68-2
overview 68-1
policy navigation 68-3
real-time views 68-2
views and filters 68-3
File menu reference 68-9
filters
advantages of using network/host objects 68-65
clearing 68-46
column based 68-43
event based 68-45
overview 68-41
submission requirements for policy objects 68-65
text searches (quick filter) 68-45
time range 68-41
time slider 68-42
floating views 68-36
FWSM devices, configuring to provide events 68-27
IPS devices, configuring to provide events 68-28
limits of 68-4
looking up Security Manager policies based on events 68-52
managing service 68-29
monitoring event store disk space 68-33
monitoring status 68-30
opening views 68-36
overview 68-7
performing operations on 68-47
preparation for use 68-26
recovering the event data store 68-34
saving events 68-51
saving views 68-40
selecting devices to monitor 68-32
settings 11-27, 11-33
starting or stopping the Event Manager service 68-29
status icon colors 68-30
switching between IP addresses and host object names 68-37
switching between real-time and historical views 68-40
syslogs 68-6
troubleshooting
Event Viewer Unavailable message 11-27, 11-35, 68-29
policy objects not available for filtering 68-65
understanding access control 68-4
using 68-35
using views 68-35
viewing access rule events 68-54
viewing IPS signature events 68-55
view list 68-11
View menu reference 68-9
Event Viewer command 1-37
exclusive domains
configuring for IOS devices 18-10
Exit command 1-30
Exit command (Report Manager) 69-8
exiting
Cisco Security Management Suite server 1-11
CiscoWorks Common Services 1-11
Security Manager 1-10, 1-11
expiration dates
configuring for access rules 16-21
export
device inventory
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
HPM data 70-29
IPS event action overrides 40-13
IPS event filter rules 40-4, 40-7
policy objects 6-23
reports 69-28
shared policies 10-12
Export Devices or Policies commands 1-29
Export Inventory dialog box 10-6
Export Map command 1-32
External Product Interface dialog box 36-27
External Product Interface policy 36-26
F
factory-default configurations 46-2
failover
Active/Active
command replication 50-4
configuration synchronization 50-3
add new context to group 2 50-7
configuring in site-to-site VPN 25-50
edit bridge group 50-16
FWSM 50-12
advanced settings 50-15
PIX/ASA 50-17
Add Failover Group 50-24
settings 50-20
PIX/ASA/FWSM 50-10
active/active 50-2, 50-3
active/standby 50-2
bootstrap configuration 50-26
configuration basics 50-5
configuring 50-1
interface configuration 50-23
interface MAC address 50-22
security context 50-25
stateful 50-3, 50-4
stateless 50-3
types of 50-2
understanding 50-1
PIX 6.3 50-10
interface configuration 50-11
stateful in site-to-site VPN 25-52
false negatives
definition of 39-23
false positives
definition of 39-23
FastTrack class map objects
creating 21-16
match criteria 21-21
feature sets 1-4
File menu
Configuration Manager 1-29
Event Viewer 68-9
Report Manager 69-8
file objects
attributes 34-36
selecting 34-38
files
deploying to 8-11
selecting or specifying 1-49
Filter Item dialog box 40-9
filter rules, event action (IPS)
attributes 40-9
configuring 40-4
example rule 68-64
exporting 40-4
policy 40-7
tips 40-6
filters
Event Viewer
clearing 68-46
column based 68-43
context menu 68-47
event based 68-45
overview 68-41
refreshing event list 68-42
selecting time range 68-41
text searches (quick filter) 68-45
using time slider 68-42
filtering selectors 1-44
filtering tables 1-47
HPM
column based 70-17
custom 70-17
filters (Event Viewer)
advantages of using network/host objects 68-65
overview 68-3
submission requirements for policy objects 68-65
Find and Replace dialog box 12-17
find and replace in rules policies 12-16
Find Map Node command 1-32
Find Node dialog box 35-12
FirePOWER
ASA module
detecting 71-28
FireSIGHT Management Center
starting from Security Manager 71-27
FireSIGHT Management Center command 1-36
Firewall
AAA IOS Timeout Values 15-30
firewall
AAA firewall
advanced settings 15-20
configuring 15-6
MAC exempt lists 15-26
AAA firewall policy
advanced settings 15-20
configuring 15-6
AAA page 15-28
AAA rules
configuring AAA firewall settings 15-6
configuring AuthProxy settings 15-9
configuring cut-through proxy (ASA) 13-24
configuring for ASA/PIX/FWSM devices 15-4
configuring for IOS devices 15-7
configuring identity aware 13-21
configuring security group aware 14-17
managing 15-1
properties 15-13
understanding 15-1
understanding how users authenticate 15-2
Access Control page 16-23
access controls
per user downloadable ACLs 16-26
access control settings
configuring settings 16-22
access rule
event analysis example, user access blocked 68-57
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
viewing related CS-MARS events 71-49
viewing related events 68-54
access rules
address requirements 16-5
configuring 16-7
configuring expiration dates 16-21
configuring identity aware 13-21
configuring security group aware 14-17
how deployed 16-5
import examples 16-43
importing 16-39
IPS blocking, affect of 43-4
managing 16-1
optimizing during deployment 16-45
sharing ACLs among interfaces 11-18
understanding 16-1
understanding device-specific behavior 16-4
understanding global 16-3
understanding requirements when using inspection 17-4
ACL naming conventions 12-5
adding rules 12-9
analysis reports 16-33
AuthProxy
configuring 15-9
AuthProxy settings policy
configuring 15-9
botnet traffic filter rules 19-9
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring policies in Map view 35-23
configuring settings 18-15
configuring settings policies in Map view 35-23
conflict detection 16-27
converting IPv4 rules 12-28
deleting rules 12-9
device types 46-1
disabling rules 12-20
editing rules 12-10
enabling rules 12-20
finding and replacing items in rules policies 12-16
Firewall ACL Setting dialog box 16-25
identity-aware policies
collecting user statistics 13-25
configuring 13-7
configuring cut-through proxy 13-24
configuring identity options 13-15
configuring rules 13-21
configuring the ASA 13-7, 14-8
enabling 13-8
filtering VPN traffic 13-26
identifying AD servers and agents 11-36, 13-8
managing 13-1
monitoring 13-27
overview 13-1
requirements 13-3
user identity acquisition 13-2
Inspection page 17-103
inspection rules
add/edit rule wizard 17-10, 17-12, 17-16
choosing interfaces 17-2
configuring 17-5
configuring identity aware 13-21
configuring security group aware 14-17
managing 17-1
preventing DoS attacks on IOS devices 17-4
selecting protocols 17-3, 17-16
understanding 17-1
understanding access rule requirements 17-4
inspection settings
configuring for IOS devices 17-103
introduction 12-1
IPv6 access rules
configuring expiration dates 16-21
sharing ACLs among interfaces 11-18
understanding global 16-3
MAC exempt lists, AAA firewall 15-26
managing rules tables 12-7
moving rules 12-19
object groups
expanding during discovery 12-35
optimizing network object groups during deployment 12-35
overview 12-1
per user downloadable ACLs 16-26
policy discovery 5-13
policy query
example report 12-34
generating reports 12-28
interpreting results 12-32
preserving ACL names 12-4
reference information for AAA rules 15-20
resolving access rule conflicts 16-33
resolving ACL naming conflicts 12-6
rule table sections 12-20
security group aware policies
configuring ISE settings 11-54
configuring rules 14-17
security group-aware policies
configuring 14-7
managing 14-1
system variables 7-9
transparent rules
adding or editing a rule 23-5
configuring 23-1
configuring passthrough for IOS devices 23-3
editing the EtherType 23-6
editing the mask 23-7
managing 23-1
Transparent Rules page 23-3
TrustSec firewall policies
configuring 14-7
managing 14-1
overview 14-1
TrustSec policies
monitoring 14-17
understanding NAT effects 12-3
understanding rule order 12-19
understanding rule processing order 12-2
using rules tables 12-7
Web Filter page 18-16
web filter rules
configuring for ASA, PIX, FWSM devices 18-2
configuring for IOS devices 18-10
managing 18-1
understanding 18-1
zone-based firewall
add/edit zones 21-53
advanced options 21-67
configuring PAM 21-69
configuring rules 21-13, 21-62
configuring settings 21-49
Content Filter tab 21-52
designing network zones 21-1
development overview 21-12
Global Parameters tab 21-50
page 21-50
protocol selection 21-68
rules table 21-58
tabs 21-49
VPN tab 21-50
WAAS tab 21-50
Zones tab 21-50
zone-based firewalls
changing the default drop rule 21-48
general recommendations 21-12
IPSec VPN 21-6
logging 21-1
overview 21-1
restrictions 21-3
Self zone 21-5
troubleshooting 21-54
understanding 21-3
understanding permit/deny and action 21-8
understanding services and protocols 21-11
VRF 21-7
Firewall AAA IOS Timeout Value Setting dialog box 15-30
Firewall AAA MAC Exempt Setting dialog box 15-27
Firewall ACL Setting dialog box 16-25
Firewall Device dialog box 43-14
Firewall Services Module
see FWSM 47-1
Fit to Window command 1-32
FlexConfig objects
adding to policies 7-35
ASA samples 7-20
Catalyst 6500/7600 samples 7-22
changing order in policies 7-35
changing variable values 7-35
Cisco IOS Software samples 7-22
CLI commands 7-2
configuring 7-25
configuring AAA for administrative introducers 62-84
creating 7-28
creating text objects 7-32
deleting variables 7-28
PIX firewall samples 7-23
previewing CLI 7-35
properties 7-30
property selector 7-34
removing from policies 7-35
router samples 7-24
samples 7-19
scripting language
example of looping 7-3
example of looping with if/else statements 7-4
example of two-dimensional looping 7-3
understanding 7-3
system variables
device 7-7
firewalls 7-9
remote access VPN 7-19
router 7-13
understanding 7-7
VPN 7-14
undefined variables 7-33
understanding 7-2
variables 7-5
variables, example 7-6
FlexConfig policies
adding objects 7-35
changing object order 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
editing 7-35
previewing CLI 7-35
removing objects 7-35
understanding 7-2
FlexConfig Policy page 7-36
FlexConfig Preview dialog box 7-38
FlexConfigs
creating (scenario) 7-25
managing 7-1
troubleshooting 7-38
FlexConfig Undefined Variables dialog box 7-33
float
report windows 69-29
view windows 68-36
floodguard 56-2
FQDN objects
creating 6-80
understanding 6-78
fragmentation
configuring settings in VPNs 26-30, 26-42
fragments settings 56-2
frequently asked questions
policy discovery 5-27
FTP class map objects
creating 17-21
match criteria 17-41
FTP policy map objects
creating 17-21
match conditions and actions 17-41
properties 17-40
full mesh topologies
description 25-4
partial mesh 25-5
full tunnel client access mode 30-5
FWSM
AAA support 6-28
about 46-1
adding SSL thumbprints manually 9-4
adding when using multiple-context mode 3-7
adding when using non-default HTTPS (SSL) port 3-7
Asymmetric Routing Groups 46-5
Bridge Groups
add/edit 46-51
bridge groups 47-3
changing deployment method to serial for multiple-context mode 9-17
configuring for event management 68-27
configuring FWSM endpoints in site-to-site VPNs 25-46
configuring transparent firewall rules 23-1
credentials 3-18
deleting security contexts 58-7
deployment failures after changing interface policies 9-16
deployment failures in multiple-context mode 9-16
deployment failures with large ACLs 9-16
Device Access
managing Resources 51-2
Resources 51-3
Resources, add/edit 51-3
discovering failover modules 3-7
Event Viewer support 68-4
Failover 50-12
advanced settings 50-15
edit bridge group 50-16
including in deployment jobs 8-27
interfaces
add/edit 46-26
configuring 46-3
General tab 46-27
IPv6 46-39, 46-56
IPv6, add/edit 46-43
IPv6, add/edit prefixes 46-44
managing 46-21
packet capture, using 71-36
PDM 71-22
policy discovery 5-13
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-64
rollback restrictions for multiple context mode 8-64
security contexts
configuration 58-8
selecting policy types to manage 5-11
setting up SSL (HTTPS) 2-3
SSL certificate configuration 11-22
TCP State Bypass 57-3
troubleshooting deployment 9-15
G
General
PIX/ASA/FWSM
security policies 56-1
General Configuration tab, SNMP policy for IPS 36-10
General page, device properties 3-40
General tab, IPS blocking policy 43-10
General tab (Translation Rules)
PIX/ASA/FWSM 24-31
generic routers 3-8
GET VPN
anti-replay, time based 29-11
configuring 29-12
configuring global ISAKMP and IPsec settings 29-16
configuring group members 29-20
cooperative key servers 29-7
defining group encryption 25-53
generating, synchronizing RSA keys 29-13
group members
adding 29-19
editing 29-21
IKE proposal 29-15
key servers
adding 29-19
editing 29-19
mandatory and optional policies 25-6
migrating to 29-23
overview 29-1
receive-only SAs 29-23
registration
choosing the rekey transport mechanism 29-6
configuring fail-close mode 29-8
registration process 29-4
SAs
passive SA mode 29-23
receive-only mode 29-23
security policy 29-10
supported platforms 25-9
troubleshooting 29-25
understanding 29-2
GET VPNs
group encryption policies
certificate authorization 25-56
security associations 25-57
global correlation
configuring 42-1
configuring DNS servers 36-24
configuring HTTP proxy server 36-24
configuring inspection and reputation 42-5
configuring network participation 42-7
configuring with Botnet Traffic Filtering 42-1
data collected 42-3
requirements and limitations 42-4
understanding 42-1
understanding network participation 42-3
understanding reputation 42-2
Global Search
using 1-41
Global Search command 1-30
global settings
remote access VPN
configuring 26-29
Gnutella class map objects
creating 21-16
match criteria 21-21
GRE (generic routing encapsulation) VPN
advantages of IPsec tunneling with GRE 27-3
configuring 27-5
configuring GRE modes 27-6
dynamically addressed spokes 27-5
implementation 27-3
overview 27-1, 27-2
prerequisites for successful configuration 27-3
supported platforms 25-9
understanding 27-2
GRE Dynamic IP
mandatory and optional policies 25-6
GRE Modes Page
DMVPN properties 27-12
GRE or GRE Dynamic IP properties 27-6
overview 27-1
Group Domain of Interpretation (GDOI) protocol 29-3
group encryption
defining in GET VPN topologies 25-53
Group Encryption Policy page (GET VPN) 25-53
group members
adding 29-19
communication flow 29-2
configuring fail-close mode 29-8
editing 29-21
GET VPN
registration process 29-4
security policy ACLs 29-10
group members (GET VPN)
configuring 29-20
Group Members page (GET VPN) 29-20
group policies
configuring 31-25
creating 31-27
understanding 31-26
VPNs
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
Group Policies page 31-25
groups
adding or removing devices 3-61
creating 3-61
deleting 3-61
understanding 3-58
working with 3-57
group types
creating 3-60
deleting 3-61
GTP map objects
Add Country Network Codes dialog box 17-45
Edit Country Network Codes dialog box 17-45
GTP Map Timeouts dialog box 17-46
GTP policy map objects
creating 17-21
match conditions and actions 17-46
properties 17-43
H
H.323 class map objects
IOS
creating 21-16
match criteria 21-22
match criteria 17-51
H.323 policy map objects
ASA/PIX/FWSM
creating 17-21
properties 17-48
IOS
creating 21-16
match conditions and actions 21-35
match conditions and actions 17-51
hash algorithms
in IKE proposals 26-6
MD5 26-7
SHA 26-6
Health & Performance Monitor command 1-37
Health and Performance Monitor
see HPM 70-1
viewing related events in Event Viewer 68-56
Health and Performance Monitor in Dashboard 71-2
help
accessing 1-51
Help About This Page command 1-37
helper addresses 61-14
Help menu
Configuration Manager 1-37
Help Topics command 1-37
Hide Navigation Window command 1-32
high availability (HA groups)
configuring in Easy VPN 28-2
configuring in site-to-site VPN 25-50
stateful/stateless failover 25-52
high availability policies
configuring in remote access VPNs 33-11
Histogram dialog box 41-13
histograms
configuring anomaly detection 41-11
understanding anomaly detection 41-9
Hit Count Details
example 16-37
Hit Count Details page 16-35
Hit Count Selection Summary Dialog Box 16-20
Hostname
PIX/ASA/FWSM 51-1
hostnames
Cisco IOS routers
defining 62-77
Hostname Policy page 62-78
overview 62-77
HPM
access control 70-3
Alerts
firewall 70-35
IPS 70-33
VPN 70-36
VPN, SNMP configuration 70-37
alerts 70-30
acknowledging 70-39
clearing 70-39
configuring 70-32
history 70-40
viewing 70-38
application window 70-6
Alerts display 70-30
Monitoring display 70-24
columns
Alert table 70-16
Device-related 70-8
showing/hiding 70-8
sorting 70-8
VPN-related 70-12
configuring for 70-4
custom views 70-23
device
monitoring 70-20
monitoring multiple contexts 70-3
priority monitoring 70-30
views 70-21
Device Manager
launching 70-3, 70-26
device manager
cross-launch 70-30
devices
managing 70-5
email notifications
configuring 70-32
export data 70-29
filters
column based 70-17
introduction 70-1
launching 70-4
List Filter 70-19
monitoring
device details 70-27
device status list 70-26
RA and S2S views 70-28
Summary 70-26
VPN details 70-27
VPN Summary list 70-26
overview 70-1
read time-out 2-3, 70-4
Remote Access
log-off user 70-28
settings page 11-35
tables
showing/hiding columns 70-8
sorting columns 70-8
trending 70-2
viewing related events in Event Viewer 68-56
views
closing 70-22
custom 70-23
docking 70-23
floating 70-23
list 70-21
opening 70-22
tiling 70-22
HTML file
export HPM data as 70-29
HTTP
Cisco IOS routers
AAA tab 62-32
Command Authorization Override dialog box 62-34
defining policies 62-29
HTTP Policy page 62-31
overview 62-28
Setup tab 62-31
PIX/ASA/FWSM 49-2
configuration 49-4
HTTP (ASA, PIX) class map objects
creating 17-21
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy map objects
creating 17-21
properties 17-53
HTTP (ASA7.2+/PIX7.2+) policy map objects
creating 17-21
properties 17-61
HTTP (IOS) class map objects
creating 21-16
creating for zone-based firewall content filtering 21-36
match criteria 21-22
HTTP (Zone Based IOS) policy map objects
creating 21-16, 21-36
match conditions and actions 21-35
HTTP class map objects
match criteria 17-62
HTTP-FORM
settings in AAA server objects 6-44
HTTP policy
overriding HTTPS port number 3-46
sharing
HTTPS port number 3-46
HTTP policy map objects
match conditions and actions 17-62
HTTP proxy server
configuring for IPS global correlation 36-24
HTTP Response Code 500 deployment errors 9-15
HTTPS
setting up 2-3
troubleshooting certificate errors 9-4
hub-and-spoke topology
description 25-2
joined hub-and-spoke topology 25-5
tiered hub-and-spoke topologies 25-5
I
ICMP rules
PIX/ASA/FWSM 49-4
add/edit 49-5
ICMP settings
configuring on IOS routers 61-18
icons
Configuration Manager toolbar reference 1-38
event table toolbar reference 68-15
Event Viewer status color code 68-30
map elements 35-14
ICQ class map objects
creating 21-16
match criteria 21-21
identity-aware firewall policies
collecting user statistics 13-25
configuring 13-7
configuring cut-through proxy 13-24
configuring identity options 13-15
configuring layer 2 SGT imposition 46-38
configuring rules 13-21
configuring security group tagging 46-38
configuring the ASA 13-7, 14-8
enabling 13-8
filtering VPN traffic 13-26
identifying AD servers and agents 11-36, 13-8
managing 13-1
monitoring 13-27
overview 13-1
requirements 13-3
user identity acquisition 13-2
Identity Configuration wizard
Active Directory Agent Settings 13-13
Active Directory Settings 13-11
Preview 13-15
Identity Settings page 11-36
identity user group objects
creating 13-19
selecting 13-21
user identity acquisition 13-2
idle timeout, Security Manager client 11-10
IDM
device manager 71-22
IDSM
adding when using non-default HTTPS (SSL) port 3-7
Create and Edit IDSM Data Port VLANs dialog boxes 67-50
Create and Edit IDSM EtherChannel VLANs dialog boxes 67-49
credentials 3-18
defining Data Port VLANs 67-46
defining EtherChannel VLANs 67-44
deleting Data Port VLANs 67-47
deleting EtherChannel VLANs 67-45
deployment failures when changing data port VLAN running mode 9-16
IDSM Settings page 67-47
IDSM Slot-Port Selector dialog box 67-51
mode support limitations 67-44
troubleshooting deployment 9-15
understanding settings on Catalyst devices 67-43
IE 10 security settings 10-2
IGMP
PIX/ASA/FWSM
Access Group parameters 54-5
Access Group tab 54-5
enable 54-1
Join Group parameters 54-7
Join Group tab 54-7
page 54-2
parameters 54-4
Protocol tab 54-3
Static Group parameters 54-6
Static Group tab 54-6
ignore error message, configure Security Manager to 9-10
IKE (Internet Key Exchange)
comparing version 1 and 2 26-4
configuring IKE and IPsec policies 26-1
configuring IKEv2 authentication 26-65
configuring proposal 26-9
Diffie-Hellman modulus groups 26-7
encryption algorithms 26-6
hash algorithms 26-6
IKEv2 Authentication policy 26-66, 26-69
overview 26-2
selecting the IKE version for devices in site to site VPNs 26-25
understanding 26-5
IKE keepalive
understanding 26-32
IKE proposal objects
v1 properties 26-10
v2 properties 26-13
IKE proposals (policies)
in GET VPNs 29-15
IKEv2 Authentication dialog box 26-69
IKEv2 Authentication page 26-66
IKEv2 settings
configuring 26-35
configuring cookie challenges 26-35
IM (ASA7.2+/PIX7.2+) policy map objects
creating 17-21
properties 17-67
IM (IOS) policy map objects
creating 17-21
properties 17-70
IM (Zone Based IOS) policy map objects
creating 21-16
match conditions and actions 21-35
IM (Zone based IOS) policy map objects
creating 21-16
Image Management 72-1
supported versions 72-2
Image Manager 72-9, 72-15
abort installation job 72-34
Add Image 72-11
Bootstrapping Devices 72-8
bundled images 72-30
bundles 72-13
create 72-13
delete 72-15
rename 72-14
view images 72-14
compatible images 72-17
configuring install location 72-19
device memory 72-18
devices 72-15
Getting Started 72-1
Installation Job Summary 72-32
installation wizard 72-25
installing compatible images on devices 72-30
installing images on selected devices 72-31
job approval workflow 72-35
jobs 72-32
RAM 72-17
Repository 72-9
retry on installation failure 72-34
roll back 72-35
settings 11-38
supported image types 72-5
supported platforms 72-2
Troubleshooting 72-37
update validation 72-22
updating images on devices 72-20
Using 72-1
Admin Settings 72-6
View All Images 72-9
view device information 72-16
view installation job details 72-33
Image Manager command 1-37
images
view 72-9
image updates 72-20
IMAP
configuring for inspection rules 17-20
IMAP class map objects
creating 21-16
match criteria 21-24
IM applications
match conditions for zone-based firewalls 21-21
protocol information for IM application inspection 21-33
IMAP policy map objects
creating 21-16
match conditions and actions 21-35
IM class map objects
creating 17-21
match criteria 17-68
IM policy map objects
match conditions and actions 17-68
import
device inventory 3-29
device with policies 10-13
policy objects 6-23
Import Background Image dialog box 35-13
Import Rules wizard
Enter Parameters page 16-40
Preview page 16-42
Status page 16-42
inheritance
inheriting rules 5-46
understanding 5-4
understanding signature policies 39-3
versus assignment 5-6
Inherit Rules command 1-31
Inherit Rules dialog box 5-46
Inspect/Application FW Rule wizard
Address and Port page 17-12
Inspected Protocol page 17-16
Match Traffic page 17-10
inspection
deny rules 17-5
global correlation (IPS)
configuring 42-5
inspection map objects
understanding 6-76
inspection rules
ACL naming conventions 12-5
add/edit rule wizard 17-10, 17-12, 17-16
choosing interfaces 17-2
configuring 17-5
configuring custom protocol name 17-21
configuring DNS settings 17-18
configuring ESMTP settings 17-19
configuring fragment inspection 17-19
configuring identity aware 13-21
configuring in Map view 35-23
configuring RPC settings 17-20
configuring security group aware 14-17
configuring settings for IOS devices 17-103
configuring settings in Map view 35-24
configuring SMTP settings 17-19
deep inspection options
IMAP 17-20
POP3 17-20
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
Inspection Rules page 17-7
managing 17-1
moving 12-19
preserving ACL names 12-4
preventing DoS attacks on IOS devices 17-4
selecting protocols 17-3, 17-16
understanding 17-1
understanding access rule requirements 17-4
understanding NAT effects 12-3
understanding processing order 12-2
Inspection Rules page 17-7
Inspection settings page 17-103
inspect maps
policy maps
Add Country Network Codes dialog box 17-45
Edit Country Network Codes dialog box 17-45
Inspect parameter map objects
properties 21-31
Inspect Parameters map objects
creating 21-16, 21-36
installing
Security Manager client 1-11
Integrated Local Management Interface (ILMI) 61-49
Interactive Authentication Configuration dialog box 15-24
Interface Name Conflict dialog box 6-76
Interface Properties dialog box 35-18
Interface Role Contents dialog box 12-14
interface role objects
creating 6-72
defining subinterfaces 6-75
distinguishing from interfaces 6-74
handling conflicts between role and interface names 6-76
Interface Role dialog box 6-73
specifying during policy definition 6-74
understanding 6-71
use when a single interface name is allowed 6-75
interfaces
adding or changing modules 3-39
ASA
edit EtherChannel-assigned interface 46-11
EtherChannels 46-9, 46-13
LACP 46-11
ASA/FWSM
IPv6 46-39, 46-56
IPv6, add/edit 46-43
IPv6, add/edit prefixes 46-44
ASA 5505 46-6
ASA devices
Advanced tab 46-35
IP Type 46-46
Catalyst switches and 7600 Series routers
Access Port Selector dialog box 67-30
Create and Edit Interface dialog boxes-Access Port mode 67-9
Create and Edit Interface dialog boxes-Dynamic Port mode 67-18
Create and Edit Interface dialog boxes-Other mode 67-24
Create and Edit Interface dialog boxes-Routed Port mode 67-12
Create and Edit Interface dialog boxes-subinterfaces 67-22
Create and Edit Interface dialog boxes-Trunk Port mode 67-14
Create and Edit VLAN dialog boxes 67-28
Create and Edit VLAN Group dialog boxes 67-34
defining ports 67-5
deleting ports 67-7
generating names 67-6
Interfaces/VLANs page-Interfaces tab 67-7
Interfaces/VLANs page-Summary tab 67-3
Interfaces/VLANs page-VLAN Groups tab 67-33
Interfaces/VLANs page-VLANs tab 67-27
Service Module Slot Selector dialog box 67-35
Trunk Port Selector dialog box 67-31
understanding 67-5
VLAN Selector dialog box 67-35
Cisco IOS routers
Advanced Interface Settings dialog box 61-16
Advanced Interface Settings page 61-15
available types 61-2
Create Router Interface dialog box 61-8
defining advanced settings 61-13
defining basic settings 61-3
defining CEF interface settings 61-24
defining IPS module settings 61-22
deleting from 61-6
generating names 61-4
Interface Auto Name Generator dialog box 61-12
overview 61-1
Router Interfaces page 61-7
understanding helper addresses 61-14
configuring IOS IPS rules 45-9
configuring multiple contexts 58-2
distinguishing from interface roles 6-74
failover
MAC address 50-22
PIX/ASA/FWSM 50-23
PIX 6.3 50-11
IPS
configuring 37-6
configuring bypass mode 37-12
configuring CDP mode 37-12
configuring inline interface pairs 37-13
configuring inline VLAN pairs 37-14
configuring physical 37-9
configuring VLAN groups 37-15
deploying VLAN groups 37-5
inline interface mode 37-3
inline VLAN pair mode 37-3
interfaces policy 37-6
managing interface configurations 37-1
physical interface properties 37-10
promiscuous mode 37-2
roles 37-1
sensing modes overview 37-2
understanding 37-1
viewing summary 37-8
VLAN group mode 37-4
IP Type
PIX 6.3 46-25
PIX/ASA
allocation in security contexts 58-11
IP Type 46-46
PPPoE Users 46-54
redundant 46-8
subinterfaces 46-7, 46-14
VPDN groups 46-55
PIX/ASA/FWSM
add/edit 46-26
Advanced settings 46-52
configuring 46-3
contexts 46-5
DDNS update rules 52-19
enabling traffic between same security levels 46-54
General tab 46-27
manage 46-21
management access 49-6
understanding 46-3
PIX/ASA 7+ devices
MAC address 46-48
PIX 6.3
add/edit 46-23
routed and transparent 46-4
specifying during policy definition 6-74
specifying subinterfaces 6-75
throughput delay 61-18
Interface Selector dialog box (VLAN ACL Content) 67-42
Interfaces page (IPS) 37-6
Interface Specific Authentication Server Groups dialog box 31-15
Interface Specific Client Address Pools dialog box 31-11
inventory
deleting devices from 3-56
export devices
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
using command line utility 10-10
import devices
device with policies 10-13
inventory, device
adding devices 3-6
adding devices from configuration files 3-20
adding devices from inventory file 3-29
adding devices from network 3-12
adding devices manually 3-25
device status view
working with 3-62
managing 3-1
testing device connectivity 9-1
troubleshooting device discovery failures 3-7
understanding 3-1
understanding contents 3-3
understanding device clusters 3-9
understanding generic devices 3-8
viewing inventory status 71-19
working with 3-34
Inventory Status command 1-34
Inventory Status window 71-20
Inverse ARP 61-60
inverse multiplexing over ATM (IMA) 61-39
IOS devices
configuring transparent firewall rules 23-1
remote access IPSec VPNs
user group policies 33-13
remote access IPsec VPNs
creating using wizard 30-35
remote access SSL VPNs
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
creating using wizard 30-31
remote access VPNs
configuring SSL VPN policies 33-14
Context Editor dialog box (IOS) 33-15, 33-16
Dynamic VTI/VRF Aware IPsec settings 33-7
high availability 33-11
IPsec proposals 33-4
SDM 71-23
IOS IPS
affect of load balancing 45-8
comparing to IPS appliances and service modules 36-1
configuration files 45-3
configuration overview 45-4
configuring 45-1
configuring general settings 45-7
configuring interface rules 45-9
configuring target value ratings 40-17
event actions
filter rule attributes 40-9
filter rules 40-4, 40-7
filter rules tips 40-6
network information 40-17
overrides 40-13
overview 40-1
possible actions 40-2
process overview 40-1
settings 40-23
getting started 36-1
initial preparation of router 45-5
lightweight signature engines 45-2
limitations and restrictions 45-3
selecting signature category 45-6
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
inheritance 39-3
parameters list 39-24
policy 39-4
shortcut menu 39-10
understanding 39-1
viewing update level 39-9, 39-13
understanding 45-1
understanding subsystems and revisions 45-2
IOS Software Release 12.1 and 12.2
managing routers 60-2
IOS Web Filter Exclusive Domain Name dialog box 18-14
IOS Web Filter Rule and Applet Scanner dialog box 18-13
IP address
supporting dynamic 3-35
IP addresses
network masks 6-79
specifying in policies 6-85
IP Intelligence
settings 11-39
IP Intelligence dialog box 71-41
IP Intelligence in Report Manager 71-42
IP Intelligence Settings in Dashboard 71-2
IP Intelligence using Quick Launch 71-41
IP Intelligence widget 71-42
IP Options policy map objects
creating 17-21
properties 17-71
IPS
IPS Module router interface settings policies 61-22
MPC rule wizard
tab 57-8
PIX/ASA/FWSM
identity-aware rules 13-21
rules 57-5
IPS alerts
properties 68-17
IPS Certificates dialog box 44-10
IPS command 1-33
IPS Devices
selecting for Event Viewer 68-32
IPS devices
adding SSL thumbprints manually 9-4
allowed hosts 36-7
anomaly detection
configuring 41-6
configuring histograms 41-11
configuring learning accept mode 41-8
configuring signatures 41-4
configuring thresholds 41-11
detection zones 41-3
managing 41-1
modes 41-2
understanding 41-1
understanding histograms 41-9
understanding thresholds 41-9
understanding worms 41-2
when to turn off 41-4
blocking
configuring 43-7
configuring ARC 43-1
configuring blocking devices 43-14
configuring master blocking sensors 43-13
configuring never block hosts and networks 43-17
configuring router blocking interfaces 43-15
configuring user profiles 43-12
configuring VLAN blocking interfaces 43-16
general options 43-10
master blocking sensor 43-6
policy 43-8
rate limiting 43-4
router and switch blocking devices 43-4
strategies 43-3
understanding 43-1
capturing network traffic 36-2
certificates 44-10
changing those selected for reports 69-22
configuration overview 36-5
configuration overview for IOS IPS 45-4
configuring AAA 36-21
configuring Analysis Engine global variables 36-30
configuring DNS servers 36-24
configuring for event management 68-28
configuring for report management 69-3
configuring HTTP proxy server 36-24
configuring NTP 36-23
configuring OS maps 40-21
configuring SNMP 36-8
configuring target value ratings 40-17
configuring the external product interface 36-26
configuring user accounts 36-18
credentials, IPS router modules 3-19
deployment of passwords 36-17
deployment topology 36-4
discovery of passwords 36-17
event actions
example filter rule 68-64
filter rule attributes 40-9
filter rules 40-4, 40-7
filter rules tips 40-6
network information 40-17
overrides 40-13
overview 40-1
possible actions 40-2
process overview 40-1
settings 40-23
Event Viewer support 68-4
getting started 36-1
global correlation
configuring 42-1
configuring inspection and reputation 42-5
configuring network participation 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-1
understanding network participation 42-3
understanding reputation 42-2
initializing 2-12
interfaces
configuring 37-6
configuring bypass mode 37-12
configuring CDP mode 37-12
configuring inline interface pairs 37-13
configuring inline VLAN pairs 37-14
configuring physical 37-9
configuring VLAN groups 37-15
deploying VLAN groups 37-5
inline interface mode 37-3
inline VLAN pair mode 37-3
interfaces policy 37-6
managing interface configurations 37-1
physical interface properties 37-10
promiscuous mode 37-2
roles 37-1
sensing modes overview 37-2
understanding 37-1
viewing summary 37-8
VLAN group mode 37-4
IPS modules for ASA 57-14
license, exporting 11-57
licenses
automating 44-3
managing 44-1
redeploying 44-2
updating 44-1
looking up signature policies for CS-MARS events 71-52
looking up signature policies for Event Viewer events 68-52
managing 44-1
managing user accounts and passwords 36-15
monitoring
removing false positive IPS events 68-64
passive OS fingerprinting 40-19
password requirements 36-20
policy discovery 5-14
rebooting 44-12
Report Manager reports
general VPN reports 69-18
IPS top reports 69-17
rollback restrictions 8-65
showing containment 3-54
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
configuring settings 39-30
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
inheritance 39-3
parameters list 39-24
policy 39-4
shortcut menu 39-10
understanding 39-1
viewing update level 39-9, 39-13
SSL certificate configuration 11-22
traffic flow notifications 36-30
tuning recommendations 36-4
understanding managed and unmanaged passwords 36-16
understanding network sensing 36-1
understanding user roles 36-15
updates
automatically applying 44-6
checking for and downloading 44-5
configuring server 44-4
managing 44-4
manually applying 44-7
user account attributes 36-19
viewing signature events in CS-MARS 71-51
viewing signature events in Event Viewer 68-55
virtual sensors
advantages 38-3
assigning interfaces 38-4
attributes 38-7
configuring 38-1, 38-5
deleting 38-10
editing policies 38-9
identifying 38-5
inline TCP session tracking mode 38-3
Normalizer mode 38-4
renaming 38-8
restrictions 38-3
understanding 38-1
IPsec
remote access VPNs
access policies for IKEv2 (ASA), configuring 31-48
access policies for IKEv2 (ASA), reference 31-43
access policies for IKEv2 (ASA), understanding 31-42
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1) 31-36
cluster load balancing 31-4, 31-5
configuring IKE and IPsec policies 26-1
connection profiles 31-6
connection profiles (ASA, PIX 7+) 31-8
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
Dynamic VTI/VRF Aware IPsec settings 33-7
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
high availability policies 33-11
IKE proposals 26-9
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
NAT settings 26-40
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
understanding 30-2
understanding IKE 26-5
understanding NAT settings 26-39
user group policies 33-13
VPNSM, VPN SPA, VSPA settings 33-6
wizard 30-13
IPsec/GRE VPN
advantages of IPsec tunneling with GRE 27-3
configuring 27-5
configuring GRE modes 27-6
dynamically addressed spokes 27-5
implementation 27-3
overview 27-1, 27-2
prerequisites for successful configuration 27-3
supported platforms 25-9
understanding 27-2
IPSec Client Software Update dialog box 31-20
IPsec Pass Through policy map objects
creating 17-21
properties 17-77
IPsec Proposal Editor dialog box
ASA and PIX 7.0+ devices 31-40
IOS and PIX 6.3 devices 33-4
IPsec proposals
configuring for Easy VPN 28-10
configuring for remote access VPNs
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring in site-to-site VPNs 26-21
overview 26-2
remote access VPNs
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring for ASA and PIX 7.0+ devices 31-39
configuring for IOS and PIX 6.3 devices 33-3
selecting the IKE version for devices 26-25
understanding 26-17
understanding crypto maps 26-18
understanding site-to-site 26-18
understanding transform sets 26-19
using reverse route injection 26-20
IPsec technologies
defining 25-30
mandatory and optional policies 25-6
policies 25-5
supported platforms 25-9
supported platforms for remote access VPNs 30-8
understanding 25-5
IPSec transform set objects
attributes 26-25
understanding 26-19
IPSec VPN
zone-based firewalls 21-6
IPS event
definition of 40-1
IPS Health Monitor page in Dashboard 71-2
IPS interfaces
IPS Monitoring Information dialog box 61-23
IPS module
credentials 3-19
IPS Module Discovery dialog box 3-19
IPS Module interface settings policies 61-22
IPS Rules dialog box 45-10
IPS sensor
IDM 71-22
IPS sensors
default transport protocol 11-22
IPS signatures
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
tuning 68-64
viewing related CS-MARS events 71-51
viewing related events in Event Viewer 68-55
IPS tab, Licensing page 11-55
IPS Updates page 11-45
IP Type
interface configuration
ASA and PIX 7+ 46-46
PIX 6.3 46-25
IPv4 pool objects
attributes 6-87
IPv6
interfaces
add/edit 46-43
add/edit prefixes 46-44
ASA/FWSM 46-39, 46-56
management IPv4 address requirements 1-8
Neighbor cache 47-6
specifying addresses in policies 6-85
support in Security Manager 1-8
IPv6 access rules
ACL naming conventions 12-5
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
expiration dates 16-21
identity-aware rules
requirements 13-3
moving 12-19
preserving ACL names 12-4
sharing ACLs among interfaces 11-18
understanding global 16-3
understanding processing order 12-2
IPv6 policy map objects
match conditions and actions 17-75, 17-89
properties 17-74, 17-88
IPv6 pool objects
attributes 6-88
IPv6 static routes
PIX/ASA/FWSM
configuration 55-123
ISAKMP/IPsec settings
configuring 26-31
ISE Settings page 11-54
ISR
zone-based firewall
restrictions 21-3
J
job deployment methods
understanding 8-8
jobs
aborting 8-54
approving 8-39
creating and editing deployment in non-Workflow mode 8-28
creating and editing deployment in Workflow mode 8-35
Deployment Manager 8-16
discarding 8-40
including devices in 8-8
rejecting 8-39
states
Workflow mode 8-6
submitting 8-38
joined hub-and-spoke topology 25-5
Join Group tab (IGMP) 54-7
JumpStart 1-23
Jumpstart command 1-37
K
Kazaa2 class map objects
creating 21-16
match criteria 21-21
Kerberos
configuring constrained delegation (KCD) 31-66
description 6-28
settings in AAA server objects 6-38
understanding constrained delegation (KCD) 31-64
key encryption key (KEK), GET VPN 29-4
key servers
adding 29-19
choosing the rekey transport mechanism 29-6
communication flow 29-2
cooperative, for redundancy 29-7
editing 29-19
generating, synchronizing RSA keys 29-13
registration failures 29-8
registration process 29-4
security policy ACLs 29-10
key servers (GET VPN)
configuring 29-18
Key Servers page (GET VPN) 29-18
Key Servers Selection dialog box 29-21
knowledge base structure (IPS) 41-8
L
LACP
interface assigned to an EtherChannel 46-11
large scale Dynamic Multipoint VPN (DMVPN)
mandatory and optional policies 25-6
Launch menu 1-36
Report Manager 69-8
layer 2 SGT imposition 46-38
LDAP
settings in AAA server objects 6-39
LDAP Attribute Map objects
attributes 6-45
learning accept mode (IPS), configuring 41-8
licenses
configuring for ASA devices 2-11
configuring for IOS devices 2-12
exporting IPS 11-57
IPS
automating 44-3
managing 44-1
redeploying 44-2
updating 44-1
Security Manager 10-16
License Update Status Details dialog box 11-59
licensing
Settings page 11-54
Lightweight Directory Access Protocol (LDAP)
description 6-29
lightweight signature engines 45-2
line access
Cisco IOS routers
Console Policy page 62-42
overview 62-35
VTY Policy page 62-50
Link Aggregation Control Protocol 46-11
Link Properties dialog box 35-20
load balancing
configuring in large scale DMVPN 27-16, 27-17
configuring IOS IPS deny actions 45-8
server attributes in large scale DMVPN 27-17
Local Policy Will Be Replaced dialog box 5-44
Local Web Filter class map objects
match criteria 21-29
Local web filter class map objects
creating 21-36
Local Web Filter parameter map objects
properties 21-38
Local web filter parameter map objects
creating 21-36
locking
activities 4-3
devices and policies 5-9
objects 5-10
understanding 5-8
VPN topologies 5-10
Log Buffer window 71-25
logging
Cisco IOS routers
defining NetFlow interfaces 64-15
defining NetFlow parameters 64-6
defining syslog servers 64-3
Logging Setup Policy page 64-7
NetFlow policy page 64-12
overview 64-1
Syslog Server dialog box 64-11
Syslog Servers Policy page 64-10
syslog setup parameters 64-1
syslog severity levels 64-4
PIX/ASA/FWSM 53-1
email notifications 53-8
email recipients 53-8
embedded event manager 53-3
event lists 53-9
event lists, add/edit 53-10
filters 53-12
filters, editing 53-13
levels 53-24
logging setup 53-14
message classes and IDs 53-9
message editing 53-25
message limits 53-18
message limits, add/edit 53-18
NetFlow 53-1
NetFlow, add/edit collector 53-2
rate limit levels 53-17
rate limits, add/edit 53-19
server 53-21
server setup 53-20
set-up 53-15
syslog class 53-11
syslog message ID 53-11
syslog servers 53-26, 53-27
syslog servers, add/edit 53-28
syslog messages supported for CS-MARS queries 71-53
logging in to
Cisco Security Management Suite server 1-11
CiscoWorks Common Services 1-11
logging into
Security Manager 1-10, 1-11
Logging page, IPS platform 36-30
logs
configuring audit log default settings 11-59
configuring debug levels 11-11
Logs page 11-59
loopback cells 61-50
low-latency queuing (LLQ) 65-5
M
MAC address
interface configuration
ASA and PIX 7+ 46-48
PIX/ASA/FWSM
add/edit 47-8
interface 50-22
learning 47-8
learning, enable/disable 47-9
table 47-7
MAC address pool objects
attributes 6-89
MAC exempt lists
configuring 15-7, 15-26
rule attributes 15-27
Maintenance Operation Protocol (MOP), enabling 61-19
Management Access
PIX/ASA/FWSM
interface 49-6
management address
requirements for IPv6 devices 1-8
Management Center for Cisco Security Agents
configuring connection to IPS devices 36-26
connection attributes 36-27
posture ACLs 36-29
Management IP address
PIX/ASA/FWSM 47-10
Management IPv6
ASA 5505 47-10
Manage menu 1-33
Map menu 1-32
map objects
class maps
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
parameter maps
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
Inspect properties 21-31
Local Web Filter properties 21-38
N2H2 properties 21-39
Protocol Info properties 21-33
Trend properties 21-42
URLF Glob properties 21-45
URL Filter properties 21-43
Websense properties 21-39
policy maps
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
DCE/RPC properties 17-28
DNS properties 17-31
ESMTP properties 17-37
FTP properties 17-40
GTP properties 17-43
H.323 (ASA/PIX/FWSM) properties 17-48
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) properties 17-53
HTTP (ASA7.2+/PIX7.2+) properties 17-61
IM (ASA7.2+/PIX7.2+) properties 17-67
IM (IOS) properties 17-70
IP Options properties 17-71
IPsec Pass Through properties 17-77
IPv6 properties 17-74, 17-88
NetBIOS properties 17-78
regular expression group properties 17-100
regular expression properties 17-100
SIP (ASA/PIX/FWSM) properties 17-80, 17-90, 17-98
Skinny properties 17-84
SNMP properties 17-87
TCP Map properties 57-21
Web Filter properties 21-47
regular expression objects
metacharacters 17-101
understanding 6-76
Map Properties command 1-32
Map Rule dialog box
connection profile map matching rules 31-38
connection profile maps 31-38
maps
access permissions 35-8
adding existing managed devices 35-16
adding new managed devices 35-16
arranging elements 35-11
background color 35-13
background images
deleting 35-13
importing 35-13
scale and position 35-13
setting 35-13
centering elements 35-11
changing the zoom level 35-11
class maps
Class Map dialog box 17-27, 21-19
creating 35-9
default map 35-9
deleting 35-10
displaying devices from Device View 35-16
displaying managed devices 35-16
displaying your network 35-14
elements, understanding 35-14
excluding private and reserved networks 11-3
exporting 35-11
icons 35-14
layer 3 links
autolink settings 11-3
creating 35-19
deleting 35-19
layouts, using 35-11
linking maps 35-13
navigation window 35-4
objects
adding 35-17
deleting 35-17
opening 35-10
overview 35-1
panning 35-11
refreshing 35-1
removing managed devices 35-16
renaming 35-10
saving 35-10
searching for nodes 35-12
selecting elements 35-12
setting background 35-13
showing containment for Catalyst, ASA, PIX, IPS devices 35-16
understanding 35-1
undocking window 35-2
working with 35-8
Map Settings dialog box 35-13
Map View
cloning devices 35-22
configuring firewall policies 35-23
configuring firewall settings policies 35-23
context menu
Layer 3 link 35-7
managed device node 35-5
map background 35-7
map objects 35-7
selected nodes 35-6
VPN connection 35-6
device policies, managing 35-22
discovering device configurations 35-22
icons for elements 35-14
main page 35-2
menus, context 35-5
navigation window 35-4
performing basic policy management 35-22
previewing device configurations 35-22
sharing device policies 35-22
toolbar reference 35-4
VPNs
creating 35-21
displaying existing 35-21
editing or showing peers 35-22
editing policies 35-22
managing 35-20
Map view
Autolink Settings page 11-3
copying between devices 35-22
overview 1-17, 35-1
Map View command 1-31
master blocking sensor 43-6
Master Blocking Sensor dialog box 43-13
maximum receive reconstructed unit (MRRU) 61-81
maximum segment size (MSS) 61-17
MBoundary
PIX/ASA/FWSM
configuration 54-9
interface configuration 54-10
MD5 hash algorithm 26-7
memory-allocation lite 62-80
memory settings
Cisco IOS routers
defining 62-78
overview 62-78
Memory Policy page 62-79
menu reference
Activities 1-35
Configuration Manager overview 1-28
Edit (Configuration Manager) 1-30
File (Configuration Manager) 1-29
File (Event Viewer) 68-9
File (Report Manager) 69-8
Help (Configuration Manager) 1-37
Launch 1-36
Launch (Report Manager) 69-8
Manage 1-33
Map 1-32
Policy (Configuration Manager) 1-31
Tickets 1-35
Tools (Configuration Manager) 1-33
Tools (Report Manager) 69-8
View (Configuration Manager) 1-30
View (Event Viewer) 68-9
message
editing
PIX/ASA/FWSM 53-25
PIX/ASA/FWSM
limits 53-18
limits, add/edit 53-18
rate limits, add/edit 53-19
message classes and IDs
PIX/ASA/FWSM 53-9
metacharacters
URLF Glob parameter maps 21-46
Mobile application for CSM 71-18
Modify Access List dialog box (Allowed Hosts policy) 36-7
Modify Physical Interface Map dialog box 37-10
monitoring
CS-MARS
integrating with Security Manager 71-42
device managers, using 71-21
device status 71-1
network activities 71-1
PRSM, launching 71-27
monitoring widget for server 71-14
mount point
PIX/ASA
add/edit 48-17
mount point configuration
ASA 48-17
Move Row Down command 1-30
Move Row Up command 1-30
MPC
a.k.a. Modular Policy Framework 57-6
MRoute
PIX/ASA/FWSM
configuration 54-8
MRoute page
description 54-8
MSN Messenger class map objects
creating 21-16
match criteria 21-21
multicast
PIX/ASA/FWSM
Enable PIM and IGMP 54-1
IGMP Access Group parameters 54-5
IGMP Access Group tab 54-5
IGMP Join Group parameters 54-7
IGMP Join Group tab 54-7
IGMP parameters 54-4
IGMP Protocol tab 54-3
IGMP Static Group parameters 54-6
IGMP Static Group tab 54-6
MBoundary configuration 54-9
MBoundary interface configuration 54-10
MRoute configuration 54-8
Multicast Boundary Filter page 54-9
Multicast Group, add/edit 54-19, 54-21
Multicast Group rule 54-17
PIM Bidirectional Neighbor Filter 54-14
PIM Bidirectional Neighbor Filter tab 54-13
PIM Neighbor Filter 54-13
PIM Neighbor Filter tab 54-12
PIM page 54-11
PIM Protocol dialog box 54-12
PIM Protocol tab 54-11
PIM Rendezvous Point, add/edit 54-16
PIM Rendezvous Points tab 54-15
PIM Request Filter tab 54-18, 54-20
PIM Route Tree tab 54-17
Multicast Boundary Filter page
description 54-9
multicast rekey in GET VPN 29-6
multicast routing
PIX/ASA/FWSM
configuring on 54-1
IGMP 54-2
multicast boundary filters 54-9
multicast routes 54-8
PIM 54-11
Multiclass Multilink PPP (MCMP) 61-74
multilink PPP (MLP) 61-70
defining bundles 61-74
multiple users
activities 4-4
tickets 4-4
N
N2H2 (Smartfilter)
configuring for web filter rules policies 18-15, 18-19
configuring for zone based firewall rules policies 21-36, 21-39, 21-41
N2H2 class map objects
creating 21-36
match criteria 21-30
N2H2 parameter map objects
creating 21-36
properties 21-39
NAC
posture validation not occurring 9-15
NAT
VPN traffic sent unencrypted 9-14
NAT policies
Add/Edit Per-Session NAT rules dialog boxes 24-47
NBAR
enabling protocol discovery 61-19
Neighbor cache 47-6
Neighbor Filter
PIM
PIX/ASA/FWSM 54-13
Neighbor Filter tab
PIM 54-12
NetBIOS logout probe
configuring 13-15
requirements 13-5
NetBIOS policy map objects
creating 17-21
properties 17-78
NetFlow
Cisco IOS routers 64-1, 64-5
interface settings 64-15
configuring
on Cisco IOS routers 64-6
CS-MARS query 71-54
IOS routers 64-12
PIX/ASA/FWSM 53-1
add/edit collector 53-2
network/host objects
attributes 6-81
attributes, NAT 24-42
creating 6-80
naming when provisioned as object groups 6-99
network masks 6-79
optimizing when deploying firewall rules 12-35
understanding 6-78
unspecified value objects 6-84
using in Event Viewer filters 68-65
network access device (NAD) 63-9
Network Address Translation (NAT)
Add/Edit Per-Session NAT rules dialog boxes 24-47
ASA 8.3+
Add/Edit NAT rules dialog boxes 24-36
Translation Rules page 24-33
understanding 24-3
ASA 8.3 devices 24-33
Cisco IOS routers 24-5
Dynamic Rule dialog box 24-11
dynamic rules 24-10
Interface Specification 24-6
Static Rule dialog box 24-7
static rules 24-6
Static Rules tab 24-6
timeouts 24-13
configuring global options for VPNs 26-40
non-ASA 8.3 devices 24-18
No Proxy ARP 24-39, 24-45
PAT pool 24-41
Per-session NAT rules 24-46
PIX/ASA/FWSM
Address Pool dialog box 24-18
Address Pools page 24-18
Advanced NAT Options dialog box 24-29
clearing XLATE on deployment 59-1
configuring on 24-15
configuring translation rules 24-19
Dynamic Rules dialog box 24-23
Dynamic Rules tab 24-22
General tab 24-31
non ASA 8.3 24-18
Policy Dynamic Rules dialog box 24-25
Policy Dynamic Rules tab 24-24
Select Address Pool 24-23
Static Rules dialog box 24-27
Static Rules tab 24-26
Translation Exemptions (NAT 0 ACL) dialog box 24-21
Translation Exemptions (NAT 0 ACL) tab 24-20
Translation Options page 24-16, 24-17
Translation Rules page 24-19
translation types 24-3
transparent mode 24-16
understanding 24-2
round robin allocation 24-41
understanding NAT effects on firewall rules 12-3
understanding NAT settings for VPNs 26-39
understanding NAT traversal 26-39
Network Admission Control (NAC)
Cisco Trust Agent 63-9
components 63-9
defining identity parameters 63-13
defining interface parameters 63-11
defining setup parameters 63-10
Identities tab 63-18
Identity Action dialog box 63-19
Identity Profile dialog box 63-19
Interface Configuration dialog box 63-17
Interfaces tab 63-16
NAC Policy page 63-14
network access device (NAD) 63-9
on Cisco IOS routers 63-8
Setup tab 63-14
supported platforms 63-8
understanding system flow 63-9
Network Information page (IPS) 40-17
network masks
discontiguous 6-80
discovering 6-80
displaying 6-80
understanding 6-79
network participation, IPS
configuring 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-3
understanding global correlation 42-1
understanding reputation 42-2
network sensing
capturing network traffic 36-2
deployment topology 36-4
overview 36-1
tuning recommendations 36-4
Network Time Protocol (NTP)
Cisco IOS routers
creating NTP servers 62-97
NTP Policy page 62-98
NTP Server dialog box 62-99
overview 62-96
Never Block Host dialog box 43-17
Never Block Network dialog box 43-17
New Activity command 1-35
New Device command 1-29
New Device Groups command 1-30
New Device wizard
Choose Method page 3-6
Device Grouping page 3-48
Device Information page - Add Device from File 3-31
Device Information page - Configuration File 3-22
Device Information page - Network 3-14
Device Information page - New Device 3-26
New Map command 1-32
New or Edit CS-MARS Device dialog box 11-8
New Ticket command 1-36
NHRP
DMVPN spoke-to-spoke connections 27-11
Node Properties dialog box 35-17
Non-Workflow mode
viewing
device details 8-26
non-Workflow mode
changing modes 1-27
comparing with Workflow mode 1-21
configuration files
deploying 8-28
previewing 8-44
configurations
rolling back 8-68
creating tickets 4-14
deployment 8-3
deployment jobs
aborting 8-54
Deployment Status Details dialog box 8-32
opening tickets 4-15
taking over another user session 10-23
understanding 1-21
No Proxy ARP
NAT rule 24-39, 24-45
PIX/ASA/FWSM Platform 55-1
notifications, e-mail
configuring SMTP server 1-26
NS Lookup 71-32, 71-36
NT
settings in AAA server objects 6-42
NTP
PIX/ASA/FWSM 52-21
server configuration 52-21
NTP policy, IPS platform 36-23
NTP server
configuring for IPS devices 36-23
null0 55-120
O
object groups
policy discovery 5-14
object group search
ASA 8.3+ devices 16-25
PIX 6.3 devices 16-26
objects
AAA server
HTTP-FORM settings 6-44
Kerberos settings 6-38
LDAP settings 6-39
NT settings 6-42
RADIUS settings 6-35
SDI settings 6-43
TACACS+ settings 6-37
AAA server groups
attributes 6-49
creating 6-47
default server groups on IOS devices 6-31
predefined authentication groups 6-30
understanding 6-27
AAA servers
creating 6-32
supported additional types for ASA/PIX/FWSM 6-28
supported types 6-28
understanding 6-27
access control lists
creating 6-52
extended objects 6-53
standard objects 6-55
unified objects 6-57
web objects 6-56
ASA group policies
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
AS paths
properties 55-143
basic procedures 6-9
categories, using 6-13
changes in Security Manager 4.4 1-9
Cisco Secure Desktop configuration
creating 33-18
class map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
cloning (duplicating) 6-13
community lists
properties 55-145
configuring for ASA routing policies 55-124
configuring for remote access VPN 34-1
creating 6-9
credentials
attributes 28-9
DCE/RPC policy map
properties 17-28
deleting 6-16
DNS policy map
properties 17-31
editing 6-12
ESMTP policy map
properties 17-37
exporting 6-23
file objects
attributes 34-36
selecting 34-38
FlexConfig
creating text objects 7-32
properties 7-30
property selector 7-34
undefined variables 7-33
FlexConfigs
adding to policies 7-35
changing order in policies 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
creating 7-28
previewing CLI 7-35
removing from policies 7-35
system variables 7-7
understanding 7-2
variables 7-5, 7-6
FTP policy map
properties 17-40
generating usage reports 6-14
GTP policy map
properties 17-43
H.323 (ASA/PIX/FWSM) policy map
properties 17-48
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy map
properties 17-53
HTTP (ASA7.2+/PIX7.2+) policy map
properties 17-61
identity user group
creating 13-19
selecting 13-21
user identity acquisition 13-2
IKE proposals
v1 properties 26-10
v2 properties 26-13
IM (ASA7.2+/PIX7.2+) policy map
properties 17-67
IM (IOS) policy map
properties 17-70
importing 6-23
Inspect parameter map
properties 21-31
interface roles
creating 6-72
IP Options policy map
properties 17-71
IPsec Pass Through policy map
properties 17-77
IPSec transform sets
attributes 26-25
understanding 26-19
IPv6 policy map
properties 17-74, 17-88
LDAP attribute map objects
attributes 6-45
Local Web Filter parameter map
properties 21-38
locking
effects on activities 4-3
managing 6-1
maps
understanding 6-76
N2H2 parameter map
properties 21-39
NetBIOS policy map
properties 17-78
network/host
optimizing when deploying firewall rules 12-35
understanding 6-78
using in Event Viewer filters 68-65
network/host objects
naming when provisioned as object groups 6-99
networks/hosts
creating 6-80
unspecified value objects 6-84
object selectors 6-2
overrides
allowing 6-18
creating for multiple devices 6-19
creating for single device 6-19
deleting 6-21
managing 6-17
understanding 6-17
overview 1-19
parameter map
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
PKI enrollments
defining CA server properties 26-57
defining certificate attributes 26-63
defining enrollment parameters 26-61
defining trusted CA hierarchy 26-64
properties 26-55
policy lists
properties 55-135
policy map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
port forwarding lists
properties 34-39
port list objects
naming when provisioned as object groups 6-99
port lists
creating 6-92
properties 6-94
prefix lists
properties 55-138, 55-140
Protocol Info parameter map
properties 21-33
provisioning as object groups 6-98
regular expression group policy map
properties 17-100
regular expression objects
metacharacters 17-101
regular expression policy map
properties 17-100
route maps 55-128
creating 55-124
understanding 55-124
security group
creating 14-14
selecting for policies 6-2
service objects
naming when provisioned as object groups 6-99
provisioning as object groups 6-100
services
creating 6-92
single sign-on server
properties 34-41
SIP (ASA/PIX/FWSM) policy map
properties 17-80, 17-90, 17-98
Skinny policy map
properties 17-84
SLA monitors
attributes 51-10
configuring 51-9
understanding 51-8
SNMP policy map
properties 17-87
SSL VPN Bookmark
configuring 31-80
post URL method and macro substitutions 31-82
SSL VPN Customization
configuring 31-75
creating custom Logon page 31-79
localizing 31-78
SSL VPN gateway
properties 34-63
SSL VPN smart tunnel auto sign-on list
attributes 34-70
SSL VPN smart tunnel list
attributes 34-65, 34-68
configuring 31-83
TCP Map policy map
properties 57-21
text
creating 7-32
time ranges
attributes for recurring ranges 6-71
configuring 6-70
traffic flow
default inspection traffic 57-19
properties 57-17
Trend parameter map
properties 21-42
TrustSec security group
selecting 14-16
URLF Glob parameter map
properties 21-45
URLF Glob parameter maps
metacharacters 21-46
URL Filter parameter map
properties 21-43
user groups
advanced PIX 6.3 settings 34-81
browser proxy settings 34-86
clientless settings 34-82
client VPN software update (IOS) settings 34-80
DNS/WINS settings 34-76
general settings 34-74
IOS client settings 34-77
IOS Xauth settings 34-79
split tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN connection settings 34-87
SSL VPN full tunnel settings 34-83
SSL VPN split tunneling settings 34-85
technology settings 34-72
thin client settings 34-83
using global search to find specific objects 1-41
viewing details 6-14
Web Filter policy map
properties 21-47
Websense parameter map
properties 21-39
WINS server lists
attributes 34-89
creating 31-85
object selectors 6-2
Object Usage dialog box 6-14
Obsoletes dialog box 39-30
OOB (Out of Band) Changes dialog box 8-48
OOB (out of band changes)
avoiding 8-46
detecting and analyzing 8-45
understanding 8-12
Openable Activities dialog box 4-15
Openable Tickets dialog box 4-15
Open Activity command 1-35
Open command (Report Manager) 69-8
Open Map command 1-32
Open Map dialog box 35-10
Open Ticket command 1-36
OS Identifications tab, IPS Network Information policy 40-21
OS Map dialog box 40-22
OSPF
interaction with NAT 55-67
LSAs 55-67
OSPF interfaces
blocking LSA flooding 66-27
defining on Cisco IOS routers 66-25
disabling MTU mismatch detection 66-27
Interface dialog box 66-31
OSPF Interface Policy page 66-30
understanding
authentication 66-29
cost 66-26
network types 66-29
priority 66-26
timer settings 66-28
OSPF parameters
dead interval 55-92, 55-108
hello interval 55-91
hello multiplier 55-92
retransmit interval 55-92, 55-108
transmit delay 55-92, 55-108
OSPF redistribution
defining mappings 66-22
defining maximum prefix values 66-23
understanding 66-22
OSPF routing
Cisco IOS routers
Area dialog box 66-37
Area tab 66-36
defining area settings 66-21
defining interface settings 66-25
defining setup parameters 66-20
Edit Interfaces dialog box 66-36
Max Prefix Mapping dialog box 66-41
OSPF Process Policy page 66-34
overview 66-19
redistributing routes 66-22
Redistribution Mapping dialog box 66-39
Redistribution tab 66-38
Setup dialog box 66-35
Setup tab 66-35
PIX/ASA/FWSM
advanced settings 55-69
Area/Area networks 55-74
Area Range 55-76
Area tab 55-73
Filtering configuration 55-85
Filtering tab 55-84
Filter Rule configuration 55-86
Filter Rule tab 55-86
General tab 55-68
Interface configuration 55-90
Interface tab 55-88
Neighbors tab 55-77
policy 55-67
Range tab 55-76
Redistribution rule 55-79
Redistribution tab 55-78
static neighbor 55-77
Summary Address configuration 55-88
Summary Address tab 55-87
Virtual Link configuration 55-82
Virtual Link MD5 configuration 55-83
Virtual Link tab 55-81
OSPFv3
LSAs 55-93
OSPFv3 routing
PIX/ASA/FWSM
advanced settings 55-96
Area/Area networks 55-100
Area Range 55-102
Area tab 55-100
Interface configuration 55-106
Interface tab 55-106
policy 55-92
Process tab 55-95
Redistribution rule 55-104
static neighbor 55-110
Summary Prefix configuration 55-105
Virtual Link configuration 55-103
OS version mismatches
handling 8-13
other settings
configuring for SSL VPN (ASA) 31-49
out-of-band changes
avoiding 8-46
detecting and analyzing 8-45
understanding 8-12
overrides
allowing overrides 6-18
creating for multiple devices 6-19
creating for single device 6-19
deleting 6-21
managing 6-17
understanding 6-17
overview
activities 1-19
device monitoring 1-7
IPv6 support 1-8
policies 1-19
ticketing 1-19
user permissions 1-10
workflow 1-19
P
P2P applications
match conditions for zone-based firewalls 21-21
P2P policy map objects
creating 21-16
match conditions and actions 21-35
packageMonitorInterval 44-6
packet capture 71-36
Packet Capture Wizard command 1-34
packet tracer 71-30
Pair dialog box 45-10
PAM
zone-based firewall
configuring 21-69
parameter maps
understanding 6-76
partial_backup.pl command 10-30
partial mesh topologies 25-5
participation, network
configuring 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-3
understanding global correlation 42-1
understanding reputation 42-2
passive OS fingerprinting on IPS sensors
configuring 40-21
understanding 40-19
Password Requirements policy, IPS platform 36-20
passwords
admin, changing 10-24
configuring IPS requirements 36-20
configuring IPS user account 36-18
discovery and deployment of IPS 36-17
managing IPS requirements 36-15
understanding managed and unmanaged IPS passwords 36-16
Paste command 1-30, 12-9
PAT
pools 24-41
PDF file
export HPM data as 70-29
PDM
device manager 71-22
Peers page 25-33
performance settings
configuring for SSL VPN (ASA) 31-50
performance tuning 44-6
permanent virtual connections (PVC)
Define Mapping dialog box 61-64
PVC Advanced Settings dialog box 61-65
PVC dialog box 61-55
PVC Policy page 61-54
permanent virtual connections (PVCs)
defining ATM PVCs 61-50
defining OAM management 61-53
on Cisco IOS routers 61-46
understanding
ATM management protocols 61-48
ATM service classes 61-47
ILMI 61-49
Operation, Administration, and Maintenance (OAM) 61-50
virtual paths and channels 61-46
per-session NAT rules 24-46
Add/Edit Per-Session NAT rules dialog boxes 24-47
PIM
configuring on firewall devices 54-11
PIX/ASA/FWSM
Bidirectional Neighbor Filter 54-14
Bidirectional Neighbor Filter tab 54-13
enable 54-1
Multicast Group, add/edit 54-19, 54-21
Multicast Group rule 54-17
Neighbor Filter 54-13
Neighbor Filter tab 54-12
page 54-11
PIM Protocol dialog box 54-12
Protocol tab 54-11
Rendezvous Point, add/edit 54-16
Rendezvous Points tab 54-15
Request Filter tab 54-18, 54-20
Route Tree tab 54-17
ping 71-32, 71-33
Ping, TraceRoute and NSLookup command 1-34
PIX
PDM 71-22
PIX/ASA
boot image/configuration 48-9
add/edit 48-11
failover 50-17
settings 50-20
interfaces
Advanced tab 46-35
IP Type 46-46
MAC address 46-48
PPPoE Users 46-54
redundant 46-8
subinterfaces 46-7, 46-14
VPDN groups 46-55
mount point
add/edit 48-17
mount point configuration 48-17
security contexts
allocate interfaces 58-11
configuration 58-9
viewing allocated interfaces 58-11
PIX/ASA/FWSM
AAA 48-5
Authentication tab 48-5
about AAA 48-1
bridging 47-1
clock settings 48-13
configuring banners 48-9
configuring CLI prompt 48-12
credentials 48-15
Device Access
Server Access 52-1
device administration policies 48-1
Failover
bootstrap configuration 50-26
interface MAC address 50-22
failover
active/active 50-3
interface configuration 50-23
security context 50-25
understanding 50-1
interfaces
add/edit 46-26
Advanced settings 46-52
configuring 46-3
contexts 46-5
General tab 46-27
managing 46-21
operating modes 46-4
understanding 46-3
security contexts
about 58-1
Server Access
AUS, add/edit server 52-3
AUS page 52-1
DDNS interface rule 52-19
DDNS page 52-18
DDNS update methods 52-19
DDNS update methods, add/edit 52-20
DHCP Relay, add/edit agent 52-6
DHCP Relay, add/edit server 52-7
DHCP Relay page 52-5
DHCP Server, add/edit 52-12
DHCP Server, advanced configuration 52-13
DHCP Server, options 52-13
DHCP Server page 52-10
DHCPv6 Relay, add/edit agent 52-9
DHCPv6 Relay, add/edit server 52-9
DHCPv6 Relay page 52-7
DNS page 52-14
DNS server, add 52-17
DNS server group 52-16
NTP page 52-21
NTP server configuration 52-21
SMTP page 52-22
TFTP server page 52-23
stateful
stateful 50-4
PIX/ASA/FWSM Platform
AAA
Accounting tab 48-7
Authorization tab 48-6
anti-spoofing 56-2
ARP configuration 47-4
ARP Inspection 47-5
enable/disable 47-6
ARP Table 47-3
configuring DHCP servers 52-10
configuring multicast routing 54-1
configuring routing 55-1
Device Access 49-1
console timeout 49-1
host name 51-1
HTTP configuration 49-4
HTTP page 49-2
ICMP rules 49-4
ICMP rules, add/edit 49-5
Management Access interface 49-6
Secure Shell, add/edit host 49-8
Secure Shell (SSH) 49-7, 49-8
SNMP host access 49-20
SNMP page 49-15
SNMP Trap configuration 49-17
Telnet configuration 49-25
Telnet page 49-24
user accounts 51-7
user accounts, add/edit 51-7
failover 50-10
failover configuration 50-1
failover configuration basics 50-5
floodguard 56-2
identity-aware IPS, QoS, and Connection Rules 13-21
IPS, QoS, and Connection Rules
wizard 57-6, 57-8
logging 53-1
email notifications 53-8
email recipients 53-8
embedded event manager 53-3
embedded event manager, add/edit action configuration 53-7
embedded event manager, add/edit applet 53-4
embedded event manager, add/edit syslog configuration 53-6
event lists 53-9
event lists, add/edit 53-10
filters 53-12
filters, editing 53-13
levels 53-24
message classes and IDs 53-9
message editing 53-25
message limits 53-18
message limits, add/edit 53-18
NetFlow 53-1
NetFlow, add/edit collector 53-2
rate limits, add/edit 53-19
server 53-21
set-up 53-15
syslog class 53-11
syslog message ID 53-11
syslog servers 53-27
syslog servers, add/edit 53-28
MAC Address
add/edit 47-8
MAC Address Table 47-7
MAC learning 47-8
enable/disable 47-9
Management IP address 47-10
multicast
Enable PIM and IGMP 54-1
group, add/edit 54-19, 54-21
IGMP Access Group parameters 54-5
IGMP Access Group tab 54-5
IGMP Join Group parameters 54-7
IGMP Join Group tab 54-7
IGMP page 54-2
IGMP parameters 54-4
IGMP Protocol tab 54-3
IGMP Static Group parameters 54-6
IGMP Static Group tab 54-6
MBoundary configuration 54-9
MBoundary interface configuration 54-10
MRoute configuration 54-8
Multicast Boundary Filter page 54-9
Multicast Group rule 54-17
Multicast Routes page 54-8
PIM Bidirectional Neighbor Filter 54-14
PIM Bidirectional Neighbor Filter tab 54-13
PIM Neighbor Filter 54-13
PIM Neighbor Filter tab 54-12
PIM page 54-11
PIM Protocol dialog box 54-12
PIM Protocol tab 54-11
PIM Rendezvous Point, add/edit 54-16
PIM Rendezvous Points tab 54-15
PIM Request Filter tab 54-18, 54-20
PIM Route Tree tab 54-17
NAT policies 24-18
Address Pools dialog box 24-18
Address Pools page 24-18
Advanced NAT Options dialog box 24-29
Dynamic Rules dialog box 24-23
Dynamic Rules tab 24-22
General tab 24-31
Policy Dynamic Rules dialog box 24-25
Policy Dynamic Rules tab 24-24
Select Address Pool 24-23
Static Rules dialog box 24-27
Static Rules tab 24-26
Translation Exemptions (NAT 0 ACL) dialog box 24-21
Translation Exemptions (NAT 0 ACL) tab 24-20
Translation Options page 24-16, 24-17
Translation Rules page 24-19
policy configuration 46-1
priority queues 57-4
priority queues configuration 57-4
routing
BGP 55-2, 55-3
BGP - General tab 55-5
BGP - IPv4 Family - Aggregate Address configuration 55-9, 55-22
BGP - IPv4 Family - Filter configuration 55-10
BGP - IPv4 Family - General tab 55-7, 55-21
BGP - IPv4 Family - Neighbor configuration 55-11, 55-24
BGP - IPv4 Family - Network configuration 55-17, 55-29
BGP - IPv4 Family - Redistribution configuration 55-18, 55-30
BGP - IPv4 Family - Route Injection configuration 55-19, 55-31
BGP - IPv4 Family tab 55-6, 55-20
EIGRP 55-32
EIGRP - advanced settings 55-34
EIGRP - Filter Rule configuration 55-40
EIGRP - Filter Rules tab 55-39
EIGRP - Interface configuration 55-48
EIGRP - Interfaces tab 55-47
EIGRP - neighbor configuration 55-42
EIGRP - Neighbors tab 55-41
EIGRP - redistribution configuration 55-44
EIGRP - Redistribution tab 55-42
EIGRP - Setup tab 55-36
EIGRP - Summary Address configuration 55-46
EIGRP - Summary Address tab 55-45
IPv6 Static Route configuration 55-123
IPv6 Static Route page 55-123
No Proxy ARP 55-1
OSPF 55-67
OSPF - advanced settings 55-69
OSPF - Area/Area networks 55-74
OSPF - Area Range 55-76
OSPF - Area tab 55-73
OSPF - Filtering configuration 55-85
OSPF - Filtering tab 55-84
OSPF - Filter Rule configuration 55-86
OSPF - Filter Rule tab 55-86
OSPF - General tab 55-68
OSPF - Interface configuration 55-90
OSPF - Interface tab 55-88
OSPF - Neighbors tab 55-77
OSPF - Range tab 55-76
OSPF - Redistribution rule 55-79
OSPF - Redistribution tab 55-78
OSPF - static neighbor 55-77
OSPF - Summary Address configuration 55-88
OSPF - Summary Address tab 55-87
OSPFv3 55-92
OSPFv3 - advanced settings 55-96
OSPFv3 - Area/Area networks 55-100
OSPFv3 - Area Range 55-102
OSPFv3 - Area tab 55-100
OSPFv3 - Interface configuration 55-106
OSPFv3 - Interface tab 55-106
OSPFv3 - Process tab 55-95
OSPFv3 - Redistribution rule 55-104
OSPFv3 - static neighbor 55-110
OSPFv3 - Summary Prefix configuration 55-105
OSPFv3 - Virtual Link configuration 55-103
OSPF - Virtual Link configuration 55-82
OSPF - Virtual Link MD5 configuration 55-83
OSPF - Virtual Link tab 55-81
RIP (PIX/ASA 6.3–7.1, FWSM) 55-112
RIP (PIX/ASA 6.3–7.1, FWSM) configuration 55-113
RIP (PIX/ASA 7.2+) 55-114
RIP (PIX/ASA 7.2+) Filtering 55-118
RIP (PIX/ASA 7.2+) Filtering configuration 55-119
RIP (PIX/ASA 7.2+) Interface 55-119
RIP (PIX/ASA 7.2+) Interface configuration 55-120
RIP (PIX/ASA 7.2+) Redistribution 55-117
RIP (PIX/ASA 7.2+) Redistribution configuration 55-117
RIP (PIX/ASA 7.2+) Setup 55-115
RIP page 55-111
static null 0 routing 55-120
Static Route configuration 55-122
Static Route page 55-120, 55-122
security contexts
managing 58-7
security group aware IPS, QoS, and Connection Rules 14-17
security policies 56-1
General configuration 56-3
General page 56-1
timeouts 56-4
service policy
wizard 57-6
Service Policy Rules 57-5
service policy rules 57-1
SNMP configuration 49-12
SNMP Version 3 49-14
traffic class 57-7
Unicast Reverse Path Forwarding 56-2
user preferences 59-1
Deployment page 59-1
Transactional Commit page 59-2
PIX/ASA/FWSM Platform policies
bridging 47-1
configuring fragment settings 56-2
configuring NAT 24-15
transparent mode 24-16
PIX 6.3
Failover
interface configuration 50-11
failover 50-10
interface configuration
IP Type 46-25
interfaces
add/edit 46-23
PIX 7.x
Failover
Add Failover Group 50-24
PIX devices
AAA support 6-28
about 46-1
monitoring service level agreements 51-8
remote access VPNs
IPsec proposals 31-40
user group policies for PIX 6.3 33-13
selecting policy types to manage 5-11
PIX Firewall
setting up AUS or CNS 2-8
setting up SSL (HTTPS) 2-3
PIX Firewalls
configuring transparent firewall rules 23-1
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-64
rollback restrictions for multiple context mode 8-64
PIX firewalls
access controls
access list compilation 16-27
object group search 16-26
adding SSL thumbprints manually 9-4
FlexConfig object samples 7-23
packet capture, using 71-36
packet tracer, using 71-30
SSL certificate configuration 11-22
PKI (Public Key Infrastructure) policies
CA server authentication methods 26-49
defining multiple CA servers 26-52
enrollment requirements 26-49
understanding 26-48
using TFTP 26-50
PKI enrollment
prerequisites using TFTP 26-50
requirements 26-49
PKI enrollment objects
defining CA server properties 26-57
defining certificate attributes 26-63
defining enrollment parameters 26-61
defining trusted CA hierarchy 26-64
properties 26-55
plug ins
configuring browser 31-58
Point-to-Point Protocol (PPP)
defining connections 61-71
defining multilink PPP bundles 61-74
on Cisco IOS routers 61-70
understanding multilink PPP (MLP) 61-70
Point-to-Point protocol (PPP)
PPP/MLP Policy page 61-75
PPP dialog box 61-76
point-to-point topologies
description 25-3
policies
adding local rules to shared policies 5-45
assigning shared policies 5-44
basic concepts
inheritance vs. assignment 5-6
local vs. shared 5-3
managing 5-31
overview 5-1
rule inheritance 5-4
service vs. platform-specific 5-2
settings-based vs. rule-based 5-2
shared policies in Device view or Site-to-Site VPN Manager 5-37
signature inheritance 39-3
status icons 5-30
cloning shared policies 5-47
configuring IKE and IPsec for VPNs 26-1
copying between devices 5-33
creating shared 5-54
deleting shared 5-56
Device view
configuring local policies 5-31
managing 5-30
modifying assignments 5-49
modifying shared policies 5-48
discovering 5-12
discovering on existing devices 5-15
exporting 10-12
exporting with device inventory 10-6
FlexConfigs
adding objects 7-35
changing object order 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
editing 7-35
FlexConfig Policy page 7-36
previewing CLI 7-35
removing objects 7-35
understanding 7-2
importing 10-13
inheriting rules 5-46
locking 5-8
managing 5-1
object selectors 6-2
overview 1-19
performing basic policy management in Map view 35-22
PKI (Public Key Infrastructure) 26-48
policy banner 5-38
policy discovery FAQ 5-27
policy management and objects 5-7
Policy view
managing 5-50
modifying assignments 5-54
preshared keys 26-45
renaming 5-48
router platform policies 60-1
selecting policies to manage 5-11
sharing local 5-41
sharing multiple local policies 5-42
sharing with PRSM 71-29
Site-to-Site VPN Manager
managing 5-30
modifying assignments 5-49
site-to-site VPNs 25-8
specifying interfaces 6-74
specifying IP addresses 6-85
synchronizing among Security Manager servers 10-5
unassigning 5-36
unsharing 5-43
using global search to find specific policies 1-41
viewing discovery task status 5-22
VPN defaults 11-70
policy assignments
modifying in Device view 5-49
modifying in Policy view 5-54
modifying in Site-to-Site VPN Manager 5-49
overview 1-19
policy bundles
cloning 5-58
creating 5-57
managing 5-57
renaming 5-58, 5-59
Policy Bundle view
cloning policy bundles 5-58
creating policy bundles 5-57
renaming policy bundles 5-58, 5-59
Policy Bundle View command 1-31
policy discovery
AAA commands not displayed in AAA policy 5-29
ACL naming conventions 12-5
ACLs 5-14
Catalyst devices 5-13
Catalyst switches and 7600 Series routers 67-1
Cisco IOS routers 5-13, 60-3
frequently asked questions 5-27
IPS devices 5-14
network masks 6-80
object groups 5-14
on existing devices 5-15
overview 1-19
policy objects 5-14
preserving ACL names 12-4
resolving ACL naming conflicts 12-6
security contexts 5-13
understanding 5-12
viewing task status 5-22
VPNs 5-12
web VPN restrictions 3-8
Policy Discovery Status command 1-33
Policy Discovery Status page 5-25
Policy Dynamic Translation Rule
PIX/ASA/FWSM 24-24
add/edit 24-25
policy list objects
properties 55-135
policy management
Settings page 11-60
Policy Management page 11-60
policy maps
understanding 6-76
Policy menu
command reference 1-31
Policy Object Manager
field reference 6-4
shortcut menu 6-8
undocking and docking the window 6-8
Policy Object Manager window
creating overrides 6-19
deleting overrides 6-21
Policy Object Overrides window 6-20
policy objects
AAA server
HTTP-FORM settings 6-44
Kerberos settings 6-38
LDAP settings 6-39
NT settings 6-42
RADIUS settings 6-35
SDI settings 6-43
TACACS+ settings 6-37
AAA server groups
attributes 6-49
creating 6-47
default server groups on IOS devices 6-31
predefined authentication groups 6-30
understanding 6-27
AAA servers
creating 6-32
supported additional types for ASA/PIX/FWSM 6-28
supported types 6-28
understanding 6-27
access control lists
creating 6-52
extended objects 6-53
standard objects 6-55, 6-57
web objects 6-56
ASA group policies
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
AS paths
properties 55-143
basic procedures 6-9
categories, using 6-13
changes in Security Manager 4.4 1-9
Cisco Secure Desktop configuration
creating 33-18
class map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
cloning (duplicating) 6-13
community lists
properties 55-145
configuring for ASA routing policies 55-124
configuring for remote access VPN 34-1
connection with policy management 5-7
creating 6-9
credentials
attributes 28-9
DCE/RPC policy map
properties 17-28
deleting 6-16
DNS policy map
properties 17-31
editing 6-12
ESMTP policy map
properties 17-37
exporting 6-23
file objects
attributes 34-36
selecting 34-38
FlexConfig
creating text objects 7-32
properties 7-30
property selector 7-34
undefined variables 7-33
FlexConfigs
adding to policies 7-35
changing order in policies 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
creating 7-28
previewing CLI 7-35
removing from policies 7-35
system variables 7-7
understanding 7-2
variables 7-5, 7-6
FTP policy map
properties 17-40
generating usage reports 6-14
GTP policy map
properties 17-43
H.323 (ASA/PIX/FWSM) policy map
properties 17-48
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy map
properties 17-53
HTTP (ASA7.2+/PIX7.2+) policy map
properties 17-61
identity user group
creating 13-19
selecting 13-21
user identity acquisition 13-2
IKE proposals
v1 properties 26-10
v2 properties 26-13
IM (ASA7.2+/PIX7.2+) policy map
properties 17-67
IM (IOS) policy map
properties 17-70
importing 6-23
Inspect parameter map
properties 21-31
interface roles
creating 6-72
understanding 6-71
IP Options policy map
properties 17-71
IPsec Pass Through policy map
properties 17-77
IPSec transform sets
attributes 26-25
understanding 26-19
IPv6 policy map
properties 17-74, 17-88
LDAP attribute map objects
attributes 6-45
Local Web Filter parameter map
properties 21-38
managing 6-1
maps
understanding 6-76
N2H2 parameter map
properties 21-39
NetBIOS policy map
properties 17-78
network/host
optimizing when deploying firewall rules 12-35
understanding 6-78
using in Event Viewer filters 68-65
network/host objects
naming when provisioned as object groups 6-99
networks/hosts
creating 6-80
unspecified value objects 6-84
object selectors 6-2
overrides 3-50
allowing 6-18
creating for multiple devices 6-19
creating for single device 6-19
deleting 6-21
managing 6-17
understanding 6-17
overview 1-19
parameter map
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
PKI enrollments
defining CA server properties 26-57
defining certificate attributes 26-63
defining enrollment parameters 26-61
defining trusted CA hierarchy 26-64
properties 26-55
policy discovery 5-14
policy lists
properties 55-135
policy map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
pools
understanding 6-87
port forwarding lists
properties 34-39
port list objects
naming when provisioned as object groups 6-99
port lists
creating 6-92
properties 6-94
prefix lists
properties 55-138, 55-140
Protocol Info parameter map
properties 21-33
provisioning as object groups 6-98
regular expression group policy map
properties 17-100
regular expression objects
metacharacters 17-101
regular expression policy map
properties 17-100
route maps 55-128
creating 55-124
understanding 55-124
security group
creating 14-14
selecting for policies 6-2
service objects
naming when provisioned as object groups 6-99
provisioning as object groups 6-100
services
creating 6-92
Settings page 11-62
sharing with PRSM 71-29
single sign-on server
properties 34-41
SIP (ASA/PIX/FWSM) policy map
properties 17-80, 17-90, 17-98
Skinny policy map
properties 17-84
SLA monitors
attributes 51-10
configuring 51-9
understanding 51-8
SNMP policy map
properties 17-87
SSL VPN bookmark
configuring 31-80
post URL method and macro substitutions 31-82
SSL VPN Customization
configuring 31-75
creating custom Logon page 31-79
localizing 31-78
SSL VPN gateway
properties 34-63
SSL VPN smart tunnel auto sign-on lists
attributes 34-70
SSL VPN smart tunnel lists
attributes 34-65, 34-68
configuring 31-83
TCP Map policy map
properties 57-21
text
creating 7-32
time ranges
attributes for recurring ranges 6-71
configuring 6-70
traffic flow
default inspection traffic 57-19
properties 57-17
Trend parameter map
properties 21-42
TrustSec security group
selecting 14-16
URLF Glob parameter map
properties 21-45
URLF Glob parameter maps
metacharacters 21-46
URL Filter parameter map
properties 21-43
user groups
advanced PIX 6.3 settings 34-81
browser proxy settings 34-86
clientless settings 34-82
client VPN software update (IOS) settings 34-80
DNS/WINS settings 34-76
general settings 34-74
IOS client settings 34-77
IOS Xauth settings 34-79
split tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN connection settings 34-87
SSL VPN full tunnel settings 34-83
SSL VPN split tunneling settings 34-85
technology settings 34-72
thin client settings 34-83
viewing details 6-14
Web Filter policy map
properties 21-47
Websense parameter map
properties 21-39
WINS server lists
attributes 34-89
creating 31-85
Policy Objects command 1-33
policy objects interface
Interface Role dialog box 6-73
SSL VPN Bookmark Entry dialog box 34-44
SSL VPN bookmarks
Add or Edit Bookmarks dialog boxes 34-43
Post Parameters dialog box 34-47
Policy Objects page 11-62
policy query
example report 12-34
generating reports 12-28
interpreting report results 12-32
Querying Device or Policy dialog box 12-29
Policy Query Results dialog box 12-32
Policy view
Assignments tab 5-54
creating shared policies 5-54
deleting shared policies 5-56
filtering shared policy selector 1-44
modifying assignments 5-54
overview 1-15
selectors 5-52
Shared Policy selector options 5-53
understanding 5-50
Policy View command 1-31
pool objects
understanding 6-87
POP3
configuring for inspection rules 17-20
POP3 class map objects
creating 21-16
match criteria 21-24
POP3 policy map objects
creating 21-16
match conditions and actions 21-35
port application mapping
see PAM 21-69
port forwarding list objects
properties 34-39
port list objects
creating 6-92
naming when provisioned as object groups 6-99
properties 6-94
ports
ASA 5505
configure 46-49
Posture ACL dialog box 36-29
PPP dialog box
MLP tab 61-79
PPP tab 61-77
PPPoE Users 46-54
preferences, user
PIX/ASA/FWSM 59-1
Deployment page 59-1
Transactional Commit page 59-2
prefix list objects
properties 55-138, 55-140
pre-provisioning devices 3-25
preshared keys
aggressive mode negotiation 26-46
compared to certificates 26-8
configuring policies for IKEv1 site-to-site VPNs 26-46
FQDN (fully qualified domain name) negotiation 26-45
main mode address negotiation 26-45
understanding 26-45
Preview Configuration command 1-34
Prime Security Manager
see PRSM 71-27
Prime Security Manager command 1-36
print
Report Manager reports 69-27
Print command 1-30
priority queues
PIX/ASA/FWSM
configuration 57-4
page 57-4
Product Authorization Key (PAK) 10-16
productivity categories for Trend class maps 21-20
prompt
configuring on firewall devices 48-12
properties
changes with policy effects 3-52
changing critical device 3-51
image version changes with no policy effects 3-51
understanding device 3-6
viewing or changing device 3-39
Property Selector dialog box 7-34
protected networks
defining in GET VPN topologies 25-59
defining in VPN topologies 25-33
Protected Networks tab 25-45
Protocol Independent Multicast 54-11
Protocol Info parameter map objects
properties 21-33
Protocol Info Parameters map object
creating 21-16
Protocol Map dialog box 41-12
protocols
selecting for inspection 17-3
Protocol tab
IGMP 54-3
proxies
defining HTTP/HTTPS for SSL VPN (ASA) 31-55
proxy ARP
enabling on IOS routers 61-19
proxy bypass rules
defining HTTP/HTTPS for SSL VPN (ASA) 31-55
proxy server
configuring HTTP for IPS global correlation 36-24
PRSM
sharing
devices 71-29
policy objects 71-29
starting from Security Manager 71-27
public key infrastructure (PKI) policies
compared to certificates 26-8
configuring for remote access VPNs 26-54
configuring for site-to-site VPNs 26-51
PVC Advanced Settings dialog box
OAM-PVC tab 61-68
OAM tab 61-66
PVC dialog box
Protocol tab 61-63
QoS tab 61-60
Settings tab 61-57
PVC policies
unable to deploy 9-15
Q
QoS
MPC rule wizard
tab 57-8
PIX/ASA/FWSM
identity-aware rules 13-21
rules 57-5
QoS Class dialog box 65-23
Edit ACLs dialog box 65-25
Marking tab 65-26
Matching tab 65-24
Policing tab 65-29
Queuing and Congestion Avoidance tab 65-27
Shaping tab 65-31
QoS queuing
default class 65-6
defining for classes 65-16
tail drop vs. WRED 65-4
understanding 65-4
understanding LLQ 65-5
quality of service (QoS)
CEF requirements 65-2
defining on control plane 65-12
defining on interfaces 65-10
defining policies 65-10
on Cisco IOS routers 65-1
QoS Class dialog box 65-23
QoS Policy dialog box 65-21
Quality of Service Policy page 65-19
understanding
Control Plane Policing 65-9
default class queuing 65-6
low-latency queuing 65-5
marking parameters 65-3
matching parameters 65-2
policing parameters 65-6
queuing parameters 65-4
shaping parameters 65-6
tail drop and WRED 65-4
token-bucket mechanism 65-8
quality of service (QoS) classes
defining marking parameters 65-15
defining matching parameters 65-13
defining policing parameters 65-17
defining queuing parameters 65-16
defining shaping parameters 65-18
query
CS-MARS
access rule events 71-49
IPS signature events 71-51
looking up policies based on related events 71-52
overview 71-48
troubleshooting 71-47
Event Viewer
access rule events 68-54
IPS signature events 68-55
looking up policies based on related events 68-52
overview 68-53
Querying Device or Policy dialog box 12-29
quick filter
searching for events 68-45
Quick Launch for IP Intelligence 71-41
R
RADIUS
description 6-28
settings in AAA server objects 6-35
RAM
Image Manager 72-17
rate limiting, IPS 43-4
Real-time Log Viewer 71-25
recovery
event data store 68-34
Recurring Ranges dialog box 6-71
Redeploy a Job dialog box 8-52
Redeploying Licenses dialog box 11-58
rediscovering
remote access VPNs 30-12
rediscovering site-to-site VPNs 25-26
Rediscover VPN Policies wizard 25-26
redundant interfaces 46-8
red X in device selector, troubleshooting 9-8
Refresh Map command 1-32
regular expression group objects
properties 17-100
regular expression objects
metacharacters 17-101
properties 17-100
regular IPsec
mandatory and optional policies 25-6
supported platforms 25-9
supported platforms for remote access VPNs 30-8
Reject Activity command 1-35
Reject Activity dialog box 4-21
Reject Deployment Job dialog box 8-20, 8-39
remote access
user
logging off 70-28
remote access VPN
system variables 7-19
Remote Access VPN Configuration wizard
IPsec VPN
Defaults page 30-29
IPsec Settings page (ASA) 30-28
IPsec VPN Connection Profile page (ASA) 30-27
User Groups page 30-35
IPsec VPNs
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
SSL VPN
Access page (ASA) 30-15
Connection Profile page (ASA) 30-16
Gateway and Context Page (IOS) 30-32
Portal Page Customization Page (IOS) 30-34
SSL VPNs
creating on ASA devices 30-14
creating on IOS devices 30-31
using 30-13
remote access VPNs
ASA devices
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
configuring using wizard 30-13
device support 30-8
discovering 30-12
IOS devices
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
IPsec 31-35
access policies for IKEv2 (ASA), configuring 31-48
access policies for IKEv2 (ASA), reference 31-43
access policies for IKEv2 (ASA), understanding 31-42
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1) 31-36
cluster load balancing 31-4, 31-5
configuring IKE and IPsec policies 26-1
connection profiles 31-6
connection profiles (ASA, PIX 7+) 31-8
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
Dynamic VTI/VRF Aware IPsec settings 33-7
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
high availability policies 33-11
IKE proposals 26-9
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
NAT settings 26-40
policy overview 30-9
policy overview (ASA, PIX 7.0+) 31-2
policy overview (IOS, PIX 6.3) 33-2
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
understanding 30-2
understanding IKE 26-5
understanding NAT settings 26-39
user group policies for IOS, PIX 6.3 33-13
VPNSM, VPN SPA, VSPA settings 33-6
IPsec proposals
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring for ASA and PIX 7.0+ devices 31-39
configuring for IOS and PIX 6.3 devices 33-3
managing 30-1
managing (ASA, PIX 7.0+) 31-1
managing (IOS, PIX 6.3) 33-1
rediscovering 30-12
SSL 31-42
access modes 30-4
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
advanced settings (ASA) 31-70
AnyConnect client image settings (ASA) 31-63
AnyConnect client settings (ASA) 31-60, 31-62
AnyConnect custom attributes(ASA) 31-68, 31-69
browser plug-ins (ASA) 31-58
cluster load balancing 31-4, 31-5
configuring HTTP/HTTPS proxies and proxy bypass(ASA) 31-55
connection profiles 31-6
connection profiles (ASA) 31-8
content rewrite rules (ASA) 31-51
Context Editor dialog box (IOS) 33-15, 33-16
creating on ASA 30-14
creating on IOS devices 30-31
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
encoding rules (ASA) 31-53
example 30-3
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
Kerberos Constrained Delegation (KCD on ASA) 31-64, 31-66
limitations 30-7
managing support files 30-5
NAT settings 26-40
other settings (ASA) 31-49
performance settings (ASA) 31-50
policies (IOS) 33-14
policy overview 30-9
policy overview (ASA, PIX 7.0+) 31-2
policy overview (IOS, PIX 6.3) 33-2
prerequisites 30-7
proxy bypass rules (ASA) 31-57
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
server certificate verification (ASA) 31-29, 31-31, 31-71
shared license (ASA) 31-72
shared license clients (ASA) 31-73
shared license servers (ASA) 31-74
understanding 30-2
understanding NAT settings 26-39
wizard 30-13
understanding 30-1
Remote Detection Indication (RDI) cells 61-50
Rename Policy Bundle dialog box 5-58, 5-59
Rename Policy command 1-31
Rename Policy dialog box 5-48
Rendezvous Point
PIX/ASA/FWSM
add/edit 54-16
Rendezvous Points
PIM 54-15
Report Manager
arranging window 69-29
closing 69-31
configuring default settings 69-28
configuring devices to provide reports 69-3
configuring Event Manager service 68-29
configuring schedules 69-33
creating custom reports 69-21
deleting another user’s custom reports 69-31
deleting reports 69-31
deleting schedules 69-35
disabling schedules 69-35
drill-down reports 69-26
editing report settings 69-22
enabling schedules 69-35
examples of analysis
monitoring botnet activity 68-61
exporting reports 69-28
generated report pane and toolbar 69-12
generating reports 69-20
managing custom reports 69-31
opening reports 69-20
overview 69-1, 69-6
printing reports 69-27
renaming reports 69-30
report list 69-9
report settings 69-10
saving reports 69-30
scheduling reports 69-32
settings page 11-36
troubleshooting 69-35
understanding 69-1
understanding access control 69-5
understanding data aggregation 69-4
understanding predefined reports
firewall summary botnet reports 69-15
firewall traffic reports 69-14
general IPS reports 69-18
general VPN reports 69-16
IPS top reports 69-17
overview 69-13
VPN top reports 69-16
using 69-19
viewing schedule results 69-34
viewing schedules 69-32
Report Manager command 1-37
Report Manager in Dashboard 71-2
reports
arranging windows 69-29
closing 69-31
configuring default settings for reports 69-28
configuring devices for Report Manager reporting 69-3
configuring schedules 69-33
creating custom 69-21
deleting 69-31
deleting another user’s in Report Manager 69-31
deleting schedules 69-35
deployment status 10-30
disabling schedules 69-35
discovery status 10-30
drilling down 69-26
editing settings 69-22
enabling schedules 69-35
example policy query 12-34
exporting 69-28
generating 69-20
generating access rule analysis 16-33
generating policy query 12-28
interpreting policy query 12-32
managing 69-1
managing custom 69-31
opening 69-20
overview of available types 69-2
predefined Report Manager
firewall summary botnet reports 69-15
firewall traffic reports 69-14
general IPS reports 69-18
general VPN reports 69-16
IPS top reports 69-17
overview 69-13
VPN top reports 69-16
printing 69-27
renaming 69-30
Report Manager
generated report pane and toolbar 69-12
overview 69-6
report list 69-9
report settings 69-10
saving 69-30
scheduling in Report Manager 69-32
understanding Report Manager 69-1
understanding Report Manager access control 69-5
understanding Report Manager data aggregation 69-4
using Report Manager 69-19
viewing schedule results 69-34
viewing schedules 69-32
reputation
configuring global correlation 42-5
understanding IPS global correlation 42-2
Request Filter
PIM 54-18, 54-20
Resources
FWSM 51-3
add/edit 51-3
managing 51-2
restorebackup.pl command 10-27
restore database 10-27
Resume Deployment Schedule dialog box 8-20, 8-58
retry count
device communication 11-22
reverse route injection 26-20
RIP
PIX/ASA/FWSM 55-111
(PIX/ASA 6.3–7.1, FWSM) 55-112
(PIX/ASA 6.3–7.1, FWSM) configuration 55-113
(PIX/ASA 7.2+) 55-114
(PIX/ASA 7.2+) Filtering 55-118
(PIX/ASA 7.2+) Filtering configuration 55-119
(PIX/ASA 7.2+) Interface 55-119
(PIX/ASA 7.2+) Interface configuration 55-120
(PIX/ASA 7.2+) Redistribution 55-117
(PIX/ASA 7.2+) Redistribution configuration 55-117
(PIX/ASA 7.2+) Setup 55-115
RIP routing
Cisco IOS routers
Authentication dialog box 66-47
Authentication tab 66-46
defining interface authentication 66-43
defining setup parameters 66-42
overview 66-42
redistributing routes 66-44
Redistribution Mapping dialog box 66-49
Redistribution tab 66-48
RIP Routing Policy page 66-45
Setup tab 66-45
roles, IPS user 36-15
rollback
archived configuration files 8-70
last deployed configuration 8-68
when deploying to file 8-71
Rollback a Job dialog box 8-68
round robin allocation
PAT 24-41
routed ports
Create and Edit Interface dialog boxes-Routed Port mode 67-12
understanding 67-5
route map objects
creating 55-124
properties 55-128
understanding 55-124
Router Block Interface dialog box 43-15
Router Device dialog box 43-14
router platform interface
802.1x Policy page 63-5
AAA policy
AAA Policy page 62-6
Accounting tab 62-10
Authentication tab 62-6
Authorization tab 62-7
Command Accounting dialog box 62-12
Command Authorization dialog box 62-9
accounts and credentials policy
Accounts and Credentials Policy page 62-15
User Accounts dialog box 62-17
ADSL policy
ADSL Policy page 61-36
ADSL Settings dialog box 61-37
advanced interface settings policy
Advanced Interface Settings dialog box 61-16
Advanced Interface Settings page 61-15
BGP policy
BGP Neighbors dialog box 66-6
BGP Redistribution tab 66-6
BGP Routing Policy page 66-4
BGP Setup tab 66-4
Redistribution Mapping dialog box 66-7
bridging policy
Bridge Group dialog box 62-21
Bridging Policy page 62-20
CEF interface policy 61-25
CEF Interface Settings dialog box 61-26
Clock Policy page 62-23
console policy
AAA tab 62-44
Accounting tab 62-47
Authentication tab 62-44
Authorization tab 62-45
Command Accounting dialog box 62-61
Command Authorization dialog box 62-60
Console Policy page 62-42
Setup tab 62-42
CPU Policy page 62-26
DHCP policy
DHCP Database dialog box 62-94
DHCP Policy page 62-92
IP Pool dialog box 62-94
dialer interface policy
Dialer Physical Interface dialog box 61-32
Dialer Policy page 61-30
Dialer Profile dialog box 61-31
DNS policy
IP Host dialog box 62-76
DNS Policy page 62-76
EIGRP policy
EIGRP Routing Policy page 66-13
Interface dialog box 66-16
Interfaces tab 66-15
Redistribution Mapping dialog box 66-18
Redistribution tab 66-17
Setup dialog box 66-14
Setup tab 66-13
Hostname Policy page 62-78
HTTP policy
AAA tab 62-32
Command Authorization Override dialog box 62-34
HTTP Policy page 62-31
Setup tab 62-31
interfaces policy
Create Router Interface dialog box 61-8
Interface Auto Name Generator dialog box 61-12
Router Interfaces page 61-7
IPS interface policy
IPS Monitoring Information dialog box 61-23
IPS Module interface policy
IPS Module Interface Policy Page 61-22
logging policy
Syslog Server dialog box 64-11
logging setup policy
Logging Setup Policy page 64-7
Memory Policy page 62-79
NAC policy
Identities tab 63-18
Identity Action dialog box 63-19
Identity Profile dialog box 63-19
Interface Configuration dialog box 63-17
Interfaces tab 63-16
NAC Policy page 63-14
Setup tab 63-14
NAT policy
Dynamic Rule dialog box 24-11
Interface Specification tab 24-6
Static Rule dialog box 24-7
Static Rules tab 24-6
NetFlow policy 64-5, 64-12
NTP policy
NTP Policy page 62-98
NTP Server dialog box 62-99
OSPF policy
Area dialog box 66-37
Area tab 66-36
Interface dialog box 66-31
Max Prefix Mapping dialog box 66-41
OSPF Interface Policy page 66-30
OSPF Process Policy page 66-34
Redistribution Mapping dialog box 66-39
Redistribution tab 66-38
Setup dialog box 66-35
Setup tab 66-35
PPP/MLP policy
PPP/MLP Policy page 61-75
PPP dialog box 61-76
PVC policy
Define Mapping dialog box 61-64
PVC Advanced Settings dialog box 61-65
PVC dialog box 61-55
PVC Policy page 61-54
QoS policy
QoS Class dialog box 65-23
QoS Policy dialog box 65-21
Quality of Service Policy page 65-19
RIP policy
Authentication dialog box 66-47
Authentication tab 66-46
Redistribution Mapping dialog box 66-49
Redistribution tab 66-48
RIP Routing Policy page 66-45
Setup tab 66-45
Secure Device Provisioning Policy page 62-85
Secure Shell Policy page 62-64
SHDSL policy
Controller Auto Name Generator dialog box 61-45
SHDSL Controller dialog box 61-42
SHDSL Policy page 61-41
SNMP policy
Permission dialog box 62-70
SNMP Policy page 62-69
SNMP Traps dialog box 62-72
Trap Receiver dialog box 62-71
static routing policy
Static Routing dialog box 66-52
Static Routing Policy page 66-51
syslog servers policy
Syslog Servers Policy page 64-10
VTY policy
Command Accounting dialog box 62-61
Command Authorization dialog box 62-60
VTY Line dialog box 62-51
VTY Policy page 62-50
router platform policies
Device Admin policies
AAA 62-2
accounts and credentials 62-13
CPU settings 62-25
DHCP 62-87
DNS 62-74
host and domain names 62-77
HTTP 62-28
line access 62-35
memory settings 62-78
optional SSH settings 62-63
Secure Device Provisioning (SDP) 62-81
SNMP 62-66
time zone settings 62-22
transparent bridging 62-18
Identity policies
802.1x 63-1
Network Admission Control (NAC) 63-8
Interface policies
ADSL 61-33
advanced settings 61-13
basic settings 61-1
dialer interfaces 61-27
PPP 61-70
PVC 61-46
SHDSL 61-40
Logging policies 64-1
NAT 24-5
dynamic rules 24-10
static rules 24-6
timeouts 24-13
NetFlow policies 64-1
Network Time Protocol (NTP) 62-96
quality of service (QoS) 65-1
Routing policies
BGP routing 66-1
EIGRP routing 66-8
OSPF routing 66-19
RIP routing 66-42
static routing 66-50
routers
adding SSL thumbprints manually 9-4
CEF interface settings policies 61-24
Cisco Discovery Protocol (CDP) settings 61-18
CNS call-home mode 2-9
CNS event-bus mode 2-8
communication requirements 2-1
configuring SSH 2-6
default transport protocol for 12.1 and 12.2 11-22
default transport protocol for 12.3 and above 11-22
deploying configurations using TMS 8-42
enabling directed broadcasts 61-20
enabling Maintenance Operation Protocol (MOP) 61-19
enabling NBAR protocol discovery 61-19
enabling proxy ARP 61-19
enabling unicast reverse path forwarding (RFP) 61-20
enabling virtual fragment reassembly (VFR) 61-19
FlexConfig object samples 7-24
generating interface names 61-4
ICMP message settings 61-18
IPS Module interface settings policies 61-22
licenses 2-12
mixing deployment methods 9-13
selecting policy types to manage 5-11
setting up SSL (HTTPS) 2-4
SSL certificate configuration 11-22
system variables 7-13
troubleshooting deployment 9-14
Route Tree
PIM 54-17
routing
PIX/ASA/FWSM
about EIGRP 55-33
about OSPF 55-67
about OSPFv3 55-93
authentication 55-67
BGP 55-2, 55-3
BGP - General tab 55-5
BGP - IPv4 Family - Aggregate Address configuration 55-9, 55-22
BGP - IPv4 Family - Filter configuration 55-10
BGP - IPv4 Family - General tab 55-7, 55-21
BGP - IPv4 Family - Neighbor configuration 55-11, 55-24
BGP - IPv4 Family - Network configuration 55-17, 55-29
BGP - IPv4 Family - Redistribution configuration 55-18, 55-30
BGP - IPv4 Family - Route Injection configuration 55-19, 55-31
BGP - IPv4 Family tab 55-6, 55-20
configuring on 55-1
configuring static routes 55-120
EIGRP 55-32
EIGRP - advanced settings 55-34
EIGRP - Filter Rule configuration 55-40
EIGRP - Filter Rules tab 55-39
EIGRP - Interface configuration 55-48
EIGRP - Interfaces tab 55-47
EIGRP - neighbor configuration 55-42
EIGRP - Neighbors tab 55-41
EIGRP - redistribution configuration 55-44
EIGRP - Redistribution tab 55-42
EIGRP - Setup tab 55-36
EIGRP - Summary Address configuration 55-46
EIGRP - Summary Address tab 55-45
IPv6 Static Route configuration 55-123
No Proxy ARP 55-1
OSPF 55-67
OSPF - advanced settings 55-69
OSPF - Area/Area networks 55-74
OSPF - Area Range 55-76
OSPF - Area tab 55-73
OSPF - Filtering configuration 55-85
OSPF - Filtering tab 55-84
OSPF - Filter Rule configuration 55-86
OSPF - Filter Rule tab 55-86
OSPF - General tab 55-68
OSPF - Interface configuration 55-90
OSPF - Interface tab 55-88
OSPF - Neighbors tab 55-77
OSPF - Range tab 55-76
OSPF - Redistribution rule 55-79
OSPF - Redistribution tab 55-78
OSPF - static neighbor 55-77
OSPF - Summary Address configuration 55-88
OSPF - Summary Address tab 55-87
OSPFv3 55-92, 55-93
OSPFv3 - advanced settings 55-96
OSPFv3 - Area/Area networks 55-100
OSPFv3 - Area Range 55-102
OSPFv3 - Area tab 55-100
OSPFv3 - Interface configuration 55-106
OSPFv3 - Interface tab 55-106
OSPFv3 - Process tab 55-95
OSPFv3 - Redistribution rule 55-104
OSPFv3 - static neighbor 55-110
OSPFv3 - Summary Prefix configuration 55-105
OSPFv3 - Virtual Link configuration 55-103
OSPF - Virtual Link configuration 55-82
OSPF - Virtual Link MD5 configuration 55-83
OSPF - Virtual Link tab 55-81
RIP (PIX/ASA 6.3–7.1, FWSM) 55-112
RIP (PIX/ASA 6.3–7.1, FWSM) configuration 55-113
RIP (PIX/ASA 7.2+) 55-114
RIP (PIX/ASA 7.2+) Filtering 55-118
RIP (PIX/ASA 7.2+) Filtering configuration 55-119
RIP (PIX/ASA 7.2+) Interface 55-119
RIP (PIX/ASA 7.2+) Interface configuration 55-120
RIP (PIX/ASA 7.2+) Redistribution 55-117
RIP (PIX/ASA 7.2+) Redistribution configuration 55-117
RIP (PIX/ASA 7.2+) Setup 55-115
RIP page 55-111
static null 0 routing 55-120
Static Route configuration 55-122
VPNs with routing processes 9-13
routing redistribution
BGP Redistribution Mapping dialog box 66-7
BGP Redistribution tab 66-6
EIGRP Redistribution Mapping dialog box 66-18
EIGRP Redistribution tab 66-17
into BGP 66-3
into EIGRP 66-12
into OSPF 66-22
into RIP 66-44
OSPF Max Prefix Mapping dialog box 66-41
OSPF Process Redistribution tab 66-38
OSPF Redistribution Mapping dialog box 66-39
RIP Redistribution Mapping dialog box 66-49
RIP Redistribution tab 66-48
RPC
configuring for inspection rules 17-20
RSA keys
generating, synchronizing for GET VPN 29-13
Rule Analysis Detail Report
generating 16-33
Rule Combiner Results dialog box 12-25
rule expiration
configuring for access rules 16-21
Rule Expiration page 11-65
rules
default 5-5
mandatory 5-5
rules tables
adding rules 12-9
columns and headings 1-48
commands, Edit menu 1-30
converting IPv4 rules 12-28
cut, copy, and paste rules 12-9
disabling rules 12-20
enabling rules 12-20
filtering 1-47
finding and replacing items 12-16
removing rules 12-9
sections 12-20
using 12-7
rule tables
moving rules 12-19
RX-Boot Mode Credentials dialog box 3-47
S
Save As command (Report Manager) 69-8
Save command 1-29
Save command (Report Manager) 69-8
Save Map As command 1-32
Save Map As dialog box 35-10
Save Map command 1-32
ScanSafe Web Security Settings 20-6
scenarios
creating FlexConfigs 7-25
SCEP (Simple Certificate Enrollment Protocol)
CA server authentication 26-49
Schedule dialog box 8-56
schedules
configuring in Report Manager 69-33
deleting in Report Manager 69-35
disabling in Report Manager 69-35
enabling in Report Manager 69-35
reports in Report Manager 69-32
viewing in Report Manager 69-32
viewing results in Report Manager 69-34
schedules, deployment
changes not deployed 8-55
creating or editing 8-55
including devices 8-8
suspending or resuming 8-58
viewing status and history 8-26
scripting language
examples
looping 7-3
looping with if/else statements 7-4
looping with two-dimensional arrays 7-3
FlexConfig objects 7-3
SDEE
subscriptions for IOS IPS 45-8
SDI
settings in AAA server objects 6-43
SDM
access rule look-up 71-26
device manager 71-23
searching for items 1-41
Secondary Interface Specific Authentication Server Groups dialog box 31-15
secure desktop manager policies
configuring 32-9
Secure Device Provisioning (SDP)
configuring AAA for administrative introducers 62-84
contents of bootstrap 62-82
defining policies 62-83
Secure Device Provisioning page 62-85
understanding
introducers 62-81
petitioners 62-81
registrars 62-81
TTI 62-81
workflow 62-82
SecureID servers (SDI)
description 6-29
Secure Shell
PIX/ASA/FWSM
add/edit SSH host 49-8
Secure Shell (SSH)
Cisco IOS routers
defining optional settings 62-63
optional settings overview 62-63
Secure Shell Policy page 62-64
PIX/ASA/FWSM 49-7, 49-8
security associations
GET VPN
using passive mode during migration 29-23
security certificate
invalid during discovery 9-6
security context
Failover page 50-25
security contexts
adding to failover group 2 50-7
admin context
overview 58-1
configuring multiple 58-2
configuring on firewall devices 58-1
deleting FWSM 58-7
discovering policies 5-13
FWSM 58-8
configuration 58-8
managing Resources 51-2
Resources 51-3
PIX/ASA
allocate interfaces 58-11
configuration 58-9
viewing allocated interfaces 58-11
PIX/ASA/FWSM
enabling multi-context mode 58-1
managing 58-7
restoring single-context mode 58-1
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions 8-64
rollback restrictions for failover devices 8-64
showing containment 3-54
security group aware firewall policies
configuring ISE settings 11-54
security group-aware firewall policies
configuring 14-7
managing 14-1
overview 14-1
security group objects
creating 14-14
security group tagging 46-38
Security Manager
access by CS-MARS 71-44
applications overview 1-6
archiving (backing up) the event data store 68-34
backing up and restoring database 10-24
Configuration Manager interface overview 1-13
configuring administrative settings 11-1
getting started 1-1
how permissions affect what you can do 1-10
initial configuration 1-24
installing client 1-11
integrating with Security Manager 71-42
integration with CS-MARS 71-43
logging into and exiting 1-11
managing the server 10-1
overview 1-1
recovering the event data store 68-34
reports overview 69-2
server cluster
managing 10-2
overview 10-2
splitting server 10-3
synchronizing shared policies 10-5
server management and administration 10-1
using 1-13
Security Manager Administration command 1-35
Security Manager Diagnostics command 1-35
Security Manager Online command 1-37
security policies
PIX/ASA/FWSM 56-1
General configuration 56-3
General page 56-1
timeouts 56-4
security ratings for Trend class maps 21-20
see LACP 46-11
Select Address Pool
PIX/ASA/FWSM Platform 24-23
Select Interfaces dialog box 35-20
selectors
filtering items 1-44
using 1-44
selector trees
selecting items 1-44
Select Policy Object dialog box 35-18
Select VPN to Configure dialog box 35-22
self near-end crosstalk (SNEXT) 61-45
Self zone 21-5
sensors, IPS
allowed hosts 36-7
anomaly detection
configuring 41-6
configuring histograms 41-11
configuring learning accept mode 41-8
configuring signatures 41-4
configuring thresholds 41-11
detection zones 41-3
managing 41-1
modes 41-2
understanding 41-1
understanding histograms 41-9
understanding thresholds 41-9
understanding worms 41-2
when to turn off 41-4
blocking
configuring 43-7
configuring ARC 43-1
configuring blocking devices 43-14
configuring master blocking sensors 43-13
configuring never block hosts and networks 43-17
configuring router blocking interfaces 43-15
configuring user profiles 43-12
configuring VLAN blocking interfaces 43-16
general options 43-10
master blocking sensor 43-6
policy 43-8
rate limiting 43-4
router and switch blocking devices 43-4
strategies 43-3
understanding 43-1
capturing network traffic 36-2
certificates 44-10
configuration overview 36-5
configuration overview for IOS IPS 45-4
configuring AAA 36-21
configuring Analysis Engine global variables 36-30
configuring DNS servers 36-24
configuring HTTP proxy server 36-24
configuring NTP 36-23
configuring OS maps 40-21
configuring SNMP 36-8
configuring target value ratings 40-17
configuring the external product interface 36-26
configuring user accounts 36-18
deployment of passwords 36-17
deployment topology 36-4
discovery of passwords 36-17
event actions
example filter rule 68-64
filter rule attributes 40-9
filter rules 40-4, 40-7
filter rules tips 40-6
network information 40-17
overrides 40-13
overview 40-1
possible actions 40-2
process overview 40-1
settings 40-23
getting started 36-1
global correlation
configuring 42-1
configuring inspection and reputation 42-5
configuring network participation 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-1
understanding network participation 42-3
understanding reputation 42-2
interfaces
configuring 37-6
configuring bypass mode 37-12
configuring CDP mode 37-12
configuring inline interface pairs 37-13
configuring inline VLAN pairs 37-14
configuring physical 37-9
configuring VLAN groups 37-15
deploying VLAN groups 37-5
inline interface mode 37-3
inline VLAN pair mode 37-3
interfaces policy 37-6
managing interface configurations 37-1
physical interface properties 37-10
promiscuous mode 37-2
roles 37-1
sensing modes overview 37-2
understanding 37-1
viewing summary 37-8
VLAN group mode 37-4
IPS modules for ASA 57-14
licenses
automating 44-3
managing 44-1
redeploying 44-2
updating 44-1
managing 44-1
managing user accounts and passwords 36-15
monitoring
removing false positive IPS events 68-64
passive OS fingerprinting 40-19
password requirements 36-20
rebooting 44-12
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
configuring settings 39-30
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
inheritance 39-3
parameters list 39-24
policy 39-4
shortcut menu 39-10
understanding 39-1
viewing update level 39-9, 39-13
traffic flow notifications 36-30
tuning recommendations 36-4
understanding managed and unmanaged passwords 36-16
understanding network sensing 36-1
understanding user roles 36-15
updates
automatically applying 44-6
checking for and downloading 44-5
configuring server 44-4
managing 44-4
manually applying 44-7
user account attributes 36-19
virtual sensors
advantages 38-3
assigning interfaces 38-4
attributes 38-7
configuring 38-1, 38-5
deleting 38-10
editing policies 38-9
identifying 38-5
inline TCP session tracking mode 38-3
Normalizer mode 38-4
renaming 38-8
restrictions 38-3
understanding 38-1
sensorupdate.properties 44-6
server
managing Security Manager 10-1
syslog
PIX/ASA/FWSM 53-21, 53-27
server, IPS update 44-4
server, Security Manager
configuring administrative settings 11-1
managing or administrating 10-1
Server Access
PIX/ASA/FWSM 52-1
AUS, add/edit server 52-3
AUS page 52-1
DDNS interface rule 52-19
DDNS page 52-18
DDNS update methods 52-19
DDNS update methods, add/edit 52-20
DHCP Relay, add/edit agent 52-6
DHCP Relay, add/edit server 52-7
DHCP Relay page 52-5
DHCP Server, add/edit 52-12
DHCP Server, advanced configuration 52-13
DHCP Server, options 52-13
DHCP Server page 52-10
DHCPv6 Relay, add/edit agent 52-9
DHCPv6 Relay, add/edit server 52-9
DHCPv6 Relay page 52-7
DNS page 52-14
DNS server, add 52-17
DNS server group 52-16
NTP page 52-21
NTP server configuration 52-21
SMTP page 52-22
TFTP server page 52-23
server cluster, Security Manager
managing 10-2
overview 10-2
splitting server 10-3
synchronizing shared policies 10-5
Server Load Balance page 27-17
server load balancing
configuring for large scale DMVPN 27-16, 27-17
server attributes in large scale DMVPN 27-17
Server Properties dialog box 3-36
Server Security page 10-2
Server Security Settings page 11-66
Service
ASA CX
Auth Proxy Configuration 57-16
PIX/ASA/FWSM
identity-aware IPS, QoS, and Connection Rules 13-21
IPS, QoS, and Connection Rules wizard 57-6, 57-8
policy wizard 57-6
priority queues 57-4
priority queues configuration 57-4
security group aware IPS, QoS, and Connection Rules 14-17
Service Policy Rules 57-5
traffic class 57-7
service, Event Manager
configuring 68-29
managing 68-29
monitoring event store disk space 68-33
monitoring status 68-30
selecting devices to monitor 68-32
starting or stopping 68-29
status icon colors 68-30
service agreement contracts 10-16
Service Contents dialog box 12-14
Service Device Provisioning (SDP)
on Cisco IOS routers 62-81
Service Module Credentials dialog box 3-18
Service Modules
Catalyst
firewalls 46-1
service objects
creating 6-92
naming when provisioned as object groups 6-99
provisioning as object groups 6-100
Services dialog box 6-95
understanding 6-92
service policy
configuring identity-aware rules 13-21
configuring security group aware rules 14-17
Service Policy (MPC) Rule Wizard 57-6
Connection Settings tab 57-8
CSC tab 57-8
CXSC tab 57-8
IPS tab 57-8
QoS tab 57-8
User Statistics tab 57-8
service policy rules
configuring on firewall devices 57-1
services
specifying 6-92
Set Linked Map dialog box 35-13
Settings
ScanSafe 20-6
settings
device communications 9-4
Settings, Event Actions policy 40-23
settings, report
editing 69-22
Settings pages
Autolink 11-3
CCO Settings 11-4
Configuration Archive 11-6
CS-MARS 11-7
CSM Mobile 11-9
Customize Desktop 11-10
Debug Options 11-11
Deployment 11-13
Device Communication 11-21
Device Groups 11-24
Discovery 11-25
Event Management 11-27, 11-33
CPU Throttling Policy 11-32
Health and Performance Monitor 11-35
Identity 11-36
Image Manager 11-38
IP Intelligence Settings 11-39
ISE 11-54
Licensing 11-54
Logs 11-59
Policy Management 11-60
Policy Objects 11-62
Report Manager 11-36
Rule Expiration 11-65
Server Security 11-66
Take Over User Session 11-67
Ticket Management 11-68
Token Management 11-69
VPN Policy Defaults 11-70
Workflow 11-71
SHA hash algorithm 26-6
Share Device Policies command 1-31
shared license clients
configuring 31-73
shared license servers
configuring 31-74
shared policies
cloning (copying) 5-47
Device view
adding local rules to selected device 5-45
assigning to selected device 5-44
modifying 5-48
modifying assignments 5-49
policy banner 5-38
sharing local 5-41
sharing multiple local policies 5-42
unsharing 5-43
working with 5-37
exporting 10-12
exporting with device inventory 10-6
importing 10-13
inheriting policies 5-46
Policy Bundle view
cloning 5-58
creating 5-57
renaming 5-58, 5-59
Policy view
creating 5-54
deleting 5-56
managing 5-50
modifying assignments 5-54
renaming 5-48
Site-to-Site VPN Manager
assigning to selected device 5-44
modifying assignments 5-49
sharing local 5-41
unsharing 5-43
working with 5-37
synchronizing among Security Manager servers 10-5
Shared Policy Assignments dialog box 5-49
Share Policies wizard 5-42
Share Policy command 1-31
Share Policy dialog box 5-41
SHDSL
Controller Auto Name Generator dialog box 61-45
defining controllers 61-40
on Cisco IOS routers 61-40
SHDSL Controller dialog box 61-42
SHDSL Policy page 61-41
shortcut menu commands
policies in Device view and Site-to-Site VPN Manager 5-40
Show Containment command 1-34
Show Devices On Map command 1-32
Show Devices on Map dialog box 35-16
Show Navigation Window command 1-32
Show VPN Peers dialog box 35-22
Show VPNs On Map command 1-32
Show VPNs on Map dialog box 35-21
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
configuring settings 39-30
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
inheritance 39-3
parameters list 39-24
policy 39-4
selecting category for Cisco IOS IPS 45-6
shortcut menu 39-10
tuning 68-64
tuning recommendations 36-4
understanding 39-1
updates
automatically applying 44-6
checking for and downloading 44-5
configuring server 44-4
managing 44-4
manually applying 44-7
viewing related CS-MARS events 71-51
viewing related events 68-55
viewing update level 39-9, 39-13
Signature Settings page 39-30
Signatures page
overview 39-4
shortcut menu 39-10
Simple Network Management Protocol
see SNMP 49-12
single sign on server (SSO) objects
properties 34-41
SIP (ASA, PIX) class map objects
creating 17-21
SIP (ASA/PIX/FWSM) policy map objects
creating 17-21
properties 17-80, 17-90, 17-98
SIP (IOS) class map objects
creating 21-16
match criteria 21-25
SIP (IOS) policy map objects
creating 21-16
match conditions and actions 21-35
SIP class map objects
match criteria 17-82, 17-92
SIP policy map objects
match conditions and actions 17-82, 17-92
Site-to-Site VPN Manager
assigning shared policies 5-44
copying shared policies 5-47
managing policies 5-30
modifying policy assignments 5-49
policy banner 5-38
policy shortcut menu 5-40
renaming policies 5-48
sharing local policies 5-41
unassigning policies 5-36
understanding shared policies 5-37
unsharing policies 5-43
Site-to-Site VPN Manager window 25-18
Site-to-Site VPN policy page (Device view) 25-19
site-to-site VPNs
accessing topologies and policies 25-17
configuring global settings
configuring fragmentation settings 26-30, 26-42
configuring IKEv2 settings 26-35
configuring ISAKMP/IPsec settings 26-31
configuring NAT settings 26-40
overview 26-29
understanding NAT settings 26-39
configuring IKE and IPsec policies 26-1
creating or editing Extranet VPN topologies 25-65
creating or editing VPN topologies 25-28
discovering 25-24
managing 25-1
rediscovering 25-26
repairing discovered VPNs with multiple spoke definitions 25-25
understanding discovery 25-19
understanding topologies 25-2
using device overrides to customize VPN policies 25-13
viewing summary of VPN configuration 25-61
Site-to-Site VPNs command 1-33
Skinny policy map objects
creating 17-21
match conditions and actions 17-86
properties 17-84
SLA monitor objects
attributes 51-10
configuring 51-9
understanding 51-8
Smartfilter (N2H2)
configuring for web filter rules policies 18-15, 18-19
configuring for zone based firewall rules policies 21-36, 21-39, 21-41
Smart Tunnel Auto Signon Entry dialog box 34-71
Smart Tunnel Auto Signon Lists dialog box 34-70
smart tunnels
configuring for ASA SSL VPNs 31-83
SMTP
configuring for inspection rules 17-19
preventing DoS attacks using zone based firewall 21-26
preventing spam using zone based firewall 21-26
SMTP class map objects
creating 21-16
match criteria 21-26
SMTP policy map objects
creating 21-16
match conditions and actions 21-35
SMTP server
configuring 1-26
PIX/ASA/FWSM 52-22
SNEXT 61-45
SNMP
about SNMP Version 3 49-14
Cisco IOS routers
defining agent properties 62-67
enabling traps 62-68
overview 62-66
Permission dialog box 62-70
SNMP Policy page 62-69
SNMP Traps dialog box 62-72
Trap Receiver dialog box 62-71
configuring for HPM S2S polling 70-37
configuring for IPS sensors 36-8
configuring on firewall devices 49-12
IPS general options 36-10
IPS trap options 36-11, 36-13
PIX/ASA/FWSM 49-15
groups 49-21
host access 49-20
MIBs 49-12
OIDs 49-12
SNMPv3 49-21, 49-22
Trap configuration 49-17
users 49-22
terminology 49-13
SNMP Credentials dialog box 3-47
SNMP policy map objects
creating 17-21
properties 17-87
SNMP Trap Communication dialog box 36-12, 36-14
SNMP Trap Communication tab, SNMP policy for IPS 36-11, 36-13
socket read timeout
device communication 11-22
Software Application Support contracts 10-16
Source Contents dialog box 12-14
spam
blocking spam using zone-based firewall rules 21-26
spoke-to-spoke connections, DMVPN 27-10
spoofing, preventing 56-1, 56-3
spoofing attacks, preventing 17-4
SSH
configuring on IOS routers, Catalyst switches, Catalyst 6500/7600 devices 2-6
line ending conventions 2-5
preventing non-SSH connections 2-7
setting up 2-5
testing authentication 2-5
troubleshooting connections 9-7
SSL
remote access SSL VPNs
advanced settings (ASA) 31-70
AnyConnect client settings (ASA) 31-60, 31-62
browser plug-ins 31-58
content rewrite rules (ASA) 31-51
encoding rules (ASA) 31-53
Kerberos Constrained Delegation (KCD on ASA) 31-64, 31-66
proxy bypass rules (ASA) 31-57
remote access VPNs 31-42
access modes 30-4
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
AnyConnect client image settings (ASA) 31-63
AnyConnect custom attributes (ASA) 31-68, 31-69
cluster load balancing 31-4, 31-5
configuring HTTP/HTTPS proxies and proxy bypass(ASA) 31-55
connection profiles 31-6
connection profiles (ASA) 31-8
Context Editor dialog box (IOS) 33-15, 33-16
creating on ASA 30-14
creating on IOS devices 30-31
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
example 30-3
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
limitations 30-7
managing support files 30-5
NAT settings 26-40
other settings (ASA) 31-49
performance settings (ASA) 31-50
policies (IOS) 33-14
prerequisites 30-7
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
server certificate verification (ASA) 31-29, 31-31, 31-71
shared license clients (ASA) 31-73
shared licenses (ASA) 31-72
shared license servers (ASA) 31-74
understanding 30-2
understanding NAT settings 26-39
wizard 30-13
setting up 2-3
troubleshooting certificate errors 9-4
VPN
sharing connection profiles on ASAs 30-8
SSL authentication certificates
adding thumbprints manually 9-4
configuring default settings for how handled 11-22
SSL VPN
policy discovery restriction 3-8
SSL VPN Access page (ASA) 31-43
SSL VPN bookmark objects
configuring 31-80
post URL method and macro substitutions 31-82
SSL VPN Bookmarks objects
SSL VPN Bookmarks dialog box 34-44
SSL VPN Configuration wizard
Access page (ASA) 30-15
Connection Profile page (ASA) 30-16
Gateway and Context Page (IOS) 30-32
Portal Page Customization Page (IOS) 30-34
SSL VPN Customization objects
configuring 31-75
creating custom Logon page 31-79
localizing 31-78
SSL VPN gateway objects
properties 34-63
SSL VPN Other Settings page (ASA)
Advanced tab 31-70
Client Settings tab 31-62
Content Rewrite tab 31-51
Encoding tab 31-53
Microsoft KCD Server tab 31-64, 31-66
overview 31-49
Performance tab 31-50
Proxy tab 31-55
SSL Server Verification tab 31-29, 31-31, 31-71
SSL VPN Policy page (IOS) 33-14
SSL VPNs
ASA devices
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
IOS devices
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
SSL VPN Shared License page (ASA) 31-72
SSL VPN smart tunnel auto sign-on list objects
attributes 34-70
SSL VPN smart tunnel list objects
attributes 34-65, 34-68
configuring 31-83
stateful failover 50-3, 50-4
site-to-site VPN 25-52
stateless failover 50-3
states
activity 4-4
ticket 4-4
static crypto maps 26-18
Static Group tab (IGMP) 54-6
static NAT
Cisco IOS routers
disable automatic aliasing 24-7
disable payload 24-9
on Cisco IOS routers 24-6
static null 0 routing 55-120
static routes
configuring on firewall devices 55-120
PIX/ASA/FWSM
configuration 55-122
static routing
Cisco IOS routers
defining on 66-50
overview 66-50
Static Routing dialog box 66-52
Static Routing Policy page 66-51
Static Rule
PIX/ASA/FWSM 24-26
add/edit 24-27
status
activity 4-4
ticket 4-4
subinterfaces 46-7, 46-14
specifying during policy definition 6-74
Submit Activity command 1-35
Submit Activity dialog box 4-20
Submit and Deploy command 1-29
Submit command 1-29
Submit Deployment Job dialog box 8-38
Submitted activity state 4-5
Submit Ticket command 1-36
Sun RPC class map objects
creating 21-16
match criteria 21-29
Sun RPC policy map objects
creating 21-16
match conditions and actions 21-35
support, technical
creating diagnostic file 10-28
generating data 10-28
generating deployment or discovery status reports 10-30
generating partial database backup 10-30
Suspend Deployment Schedule dialog box 8-20, 8-58
switches
communication requirements 2-1
SYN flooding attacks, preventing 17-4
syslog
access rule look-up 71-24
deeply parsed for Event Viewer 68-6
logging
PIX/ASA/FWSM 53-1
message properties 68-17
syslog messages supported for policy lookup 71-53
syslog relay
CPU throttling policy 11-32
syslogs
Cisco IOS routers 64-1
system variables
devices 7-7
firewall 7-9
FlexConfigs 7-7
remote access VPN 7-19
routers 7-13
VPN 7-14
T
tables
using 1-47
tables, rules
adding rules 12-9
columns and headings 1-48
commands, Edit menu 1-30
converting IPv4 rules 12-28
cut, copy, and paste rules 12-9
disabling rules 12-20
enabling rules 12-20
filtering 1-47
finding and replacing items 12-16
removing rules 12-9
sections 12-20
using 12-7
TACACS+
description 6-28
settings in AAA server objects 6-37
Take Over User Session page 11-67
Target Value Rating dialog box 40-19
Target Value Ratings, IPS Network Information policy 40-17
target value ratings (IPS) 40-17
task flow
deployment
non-Workflow mode 8-3
Workflow mode 8-5
taskflow 1-18
TCP Map objects
properties 57-21
TCP State Bypass
ASA/FWSM 57-3
Telnet
PIX/ASA/FWSM 49-24
configuration 49-25
text fields
ASCII limitations 1-49
finding text in multiple-line 1-49
navigating 1-49
using 1-48
text objects
creating 7-32
TFTP servers
PIX/ASA/FWSM 52-23
thin client access mode 30-4
thresholds
configuring anomaly detection 41-11
understanding anomaly detection 41-9
throughput
VPN user reports 69-16
ticketing
overview 1-19
Ticket Management
settings 11-68
ticket management
comparing workflow modes 1-21
Ticket Manager window 4-10
tickets
closing 4-16
creating 4-14
discarding 4-22
multiple users 4-4
opening 4-15
states 4-4
Ticket Manager window 4-10
understanding 4-1
using global search to find specific tickets 1-41
validating 4-18
viewing change reports 4-16
viewing status and history 4-23
working with 4-7
Tickets menu 1-35
tiered hub-and-spoke topologies 25-5
time
changing range for reports 69-22
timeouts
on firewall devices 56-4
timeouts (NAT)
Cisco IOS routers 24-13
Timeout Value
Firewall AAA 15-30
time range objects
attributes for recurring ranges 6-71
configuring 6-70
time slider (Event Viewer)
filtering with 68-42
using 68-24
time synchronization
on IOS routers 62-96
time zone settings
certificate errors 9-6
Cisco IOS routers
Clock Policy page 62-23
defining time zone and DST 62-22
overview 62-22
TMS
deploying configurations 8-42
deployment method 8-10
Token Management page 11-69
Token Management System (TMS)
settings 11-69
toolbar
activities 4-8, 4-9
toolbar reference
Configuration Manager 1-38
event table in Event Viewer 68-15
toolbars
Report Manager generated report 69-12
Report Manager report settings 69-10
Tools menu
Configuration Manager 1-33
Report Manager 69-8
Trace Route 71-32
TraceRoute 71-35
traffic class
PIX/ASA/FWSM
rules wizard 57-7
Traffic Classification dialog box 19-12
Traffic Classification tab 19-11
traffic encryption key (KEK), GET VPN 29-4
traffic flow notifications
configuring for IPS 36-30
traffic flow objects
default inspection traffic 57-19
properties 57-17
traffic match criteria 57-2
traffic zones 22-1
asymmetric routing 22-1
benefits 22-1
clustering 22-8
configuring 22-9
Equal-Cost Multi-Path (ECMP) 22-4
failover 22-8
firewall mode 22-8
guidelines 22-8
load balancing 22-1
lost route 22-1
prerequisites 22-7
security levels 22-6
supported services 22-6
understanding 22-6
transactional commit model 59-2
Transactional Commit page
PIX/ASA/FWSM Platform 59-2
transcripts
viewing 8-59
Transcript Viewer window 8-61
transform sets
attributes 26-25
understanding 26-19
Translation Exemption (NAT-0 ACL) Rule
PIX/ASA/FWSM 24-20
add/edit 24-21
Translation Options
PIX/ASA/FWSM 24-16, 24-17
Translation Rules
Add/Edit Per-Session NAT rules dialog boxes 24-47
ASA 8.3+ 24-33
Add/Edit NAT rules dialog boxes 24-36
per-session NAT rules 24-46
PIX/ASA/FWSM 24-19
translation table
clearing on deployment 59-1
transparent bridging
Cisco IOS routers
BVI interfaces 62-19
overview 62-18
defining bridge groups 62-20
transparent firewall
configuring on PIX/ASA/FWSM 47-1
NAT 24-16
transparent rules
adding or editing a rule 23-5
configuring 23-1
configuring DHCP passthrough for IOS devices 23-3
configuring in Map view 35-23
deleting 12-9
disabling 12-20
editing 12-10
editing the EtherType 23-6
editing the mask 23-7
enabling 12-20
managing 23-1
moving 12-19
Transparent Rules page 23-3
understanding processing order 12-2
Transparent Rules page 23-3
transport protocols
device defaults 11-22
overview of device requirements 2-1
transport settings
AUS 2-7
Configuration Engine 2-7
SSH 2-5
SSL (HTTPS) 2-3
traps, SNMP
configuring for IPS sensors 36-8
IPS options 36-11, 36-13
trees
selecting items 1-44
Trend class map objects
creating 21-36
Trend parameter map objects
creating 21-36
properties 21-42
troubleshooting
AUS deployment 9-18
Catalyst switch and module deployment 9-15
Configuration Engine deployment 9-18
creating diagnostics file 10-28
CS-MARS queries 71-47
deleted FWSM contexts do not remove configuration files 58-7
deployment 9-9
device communication and deployment 9-1
device discovery failures 3-7
device managers 71-23
device managers, using 71-21
devices marked with red X in device selector 9-8
error attempting to remove unreferenced object 9-12
Event Manager service status 68-30
Event Viewer Unavailable message 11-27, 11-35, 68-29
FlexConfigs 7-38
FWSM multiple-context deployment failures 9-17
generating data for TAC 10-28
generating deployment or discovery status reports 10-30
GET VPN registration failure 29-9
global correlation (IPS) configuration 42-4
ignoring device errors during deployment 9-10
invalid certificate error 9-6
minimum memory errors for ASA 8.3+ 9-11
mixing deployment methods 9-13
Not able to connect to server message, Report Manager 69-35
online help, problems accessing 1-51
packet capture, using 71-36
packet tracer, using 71-30
policy objects not available in Event Viewer 68-65
preshared key policies in VPN not discovered 25-23
Report Manager 69-35
router connection failures 2-2
router deployment 9-14
Security Manager cannot contact device after deployment 9-12
SSL certificate errors 9-4, 9-6
user interface problems 1-50
VPN crypto traffic unexpectedly dropped on GET VPN interfaces 29-9
VPNs with routing processes 9-13
VRF-aware IPsec deployment failures on Catalyst 6500/7600 devices 25-17
trunk ports
Create and Edit Interface dialog boxes-Trunk Port mode 67-14
understanding 67-5
Trusted Transitive Introduction (TTI)
use in SDP policies 62-81
TrustSec
Add/Edit Connection Peer dialog box 14-13
configuring connection peers 14-13
configuring ISE settings 11-54
configuring SXP 14-8
configuring SXP connection peers 14-12
security group objects
creating 14-14
SGT role mapping 14-11
TrustSec firewall policies
configuring 14-7
configuring rules 14-17
managing 14-1
TrustSec policies
monitoring 14-17
TrustSec security group objects
selecting 14-16
U
Unassign Policy command 1-31
Undock Map View command 1-32
unicast rekey in GET VPN 29-6
Unicast Reverse Path Forwarding 56-1, 56-3
unicast reverse path forwarding
enabling on routers 61-20
Unshare Policy command 1-31
Unspecified Bit Rate (UBR) 61-48
Unspecified Bit Rate Plus (UBR+) 61-48
Update Level dialog box 39-9, 39-13
updating images on devices 72-20
Updating Licenses from File dialog box 11-58
Updating Licenses via CCO dialog box 11-58
URLF Glob parameter map objects
metacharacters 21-46
properties 21-45
URL Filter parameter map objects
creating 21-36
properties 21-43
usage reports
generating 6-14
user accounts
configuring IPS 36-18
configuring IPS password requirements 36-20
discovery and deployment of IPS 36-17
IPS account attributes 36-19
managing IPS device 36-15
PIX/ASA/FWSM 51-7
add/edit 51-7
rolling back configurations 8-63
understanding IPS user roles 36-15
understanding managed and unmanaged passwords 36-16
User Accounts policy, IPS devices 36-18
user group objects
advanced PIX 6.3 settings 34-81
browser proxy settings 34-86
clientless settings 34-82
client VPN software update (IOS) settings 34-80
DNS/WINS settings 34-76
general settings 34-74
IOS client settings 34-77
IOS Xauth settings 34-79
split tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN connection settings 34-87
SSL VPN full tunnel settings 34-83
SSL VPN split tunneling settings 34-85
technology settings 34-72
thin client settings 34-83
user group policies
configuring for Easy VPN 28-14
configuring for remote access IPsec VPNs on IOS/PIX 6.3 33-13
User Group Policy page 33-13
user identity acquisition 13-2
user interface
applications overview 1-6
basic features 1-28
dialog box too big for screen 1-51
freezing 1-50
how permissions affect what you can do 1-10
Java errors 1-51
maps toolbar reference 35-4
map view 35-1
menu reference for Configuration Manager 1-28
missing text 1-51
overview of Configuration Manager 1-13
rules tables 12-7
searching for items 1-41
selecting items in a tree 1-44
selecting or specifying files 1-49
table
columns and headings 1-48
sections 12-20
tables 1-47
text fields
ASCII limitations 1-49
finding text in multiple-line 1-49
navigating 1-49
using 1-48
toolbars
Configuration Manager 1-38
event table in Event Viewer 68-15
troubleshooting 1-50
wizards 1-46
user login credentials for device access 3-4
user passwords
changing 10-24
user preferences
PIX/ASA/FWSM 59-1
Deployment page 59-1
Transactional Commit page 59-2
user roles, IPS 36-15
users
how permissions affect what you can do 1-10
taking over configuration session 10-23
User Statistics
MPC rule wizard
tab 57-8
user statistics, collecting 13-25
user taskflow 1-18
V
Validate Activity command 1-35
Validate command 1-29
Validate Ticket command 1-36
Validation dialog box 4-18
validation error messages 4-18
Values Assignment dialog box 7-37
Variable Bit Rate-Non-Real Time (VBR-nrt) 61-48
Variable Bit Rate-Real Time (VBR-rt) 61-48
variables
deleting FlexConfig 7-28
FlexConfig objects 7-5, 7-6
changing variable values 7-35
VDI servers 34-16
Velocity Engine error message 7-38
Velocity Template Engine
scripting language 7-3
View Changes command 1-29, 1-35, 1-36
viewing interface allocations 58-11
View menu
Configuration Manager 1-30
Event Viewer 68-9
views
Device 1-14
Event Viewer
clearing filters 68-46
column based filters 68-43
event based filters 68-45
filtering overview 68-41
refreshing event table 68-42
selecting time range 68-41
switching between real-time and historical 68-40
text searches (quick filter) 68-45
using time slider with filtering 68-42
HPM 70-21
column-based filters 70-17
Map 1-17
overview 1-13
Policy 1-15
views (Event Viewer)
arranging 68-36
configuring color rules 68-38
creating custom 68-39
customizing event table appearance 68-37
deleting custom 68-41
editing description 68-39
editing name 68-39
Event Monitoring window overview 68-13
Event Viewer overview 68-7
floating 68-36
list 68-11
opening 68-36
overview 68-3
saving 68-40
using 68-35
virtual ASA
about 46-1
virtual channel identifier (VCI) 61-46
virtual firewalls
See security contexts
virtual fragment reassembly (VFR) 61-19
virtual path identifier (VPI) 61-46
Virtual Routing Forwarding (VRF)
VRF-Aware IPsec 25-14
virtual sensors
advantages 38-3
assigning interfaces 38-4
attributes 38-7
configuring 38-1, 38-5
deleting 38-10
discovering policies 5-14
editing policies 38-9
identifying 38-5
inline TCP session tracking mode 38-3
Normalizer mode 38-4
renaming 38-8
restrictions 38-3
showing containment 3-54
understanding 38-1
Virtual Sensors page 38-5
virtual terminal (VTY)
Cisco IOS routers
defining AAA settings 62-40
defining line groups 62-38
defining line setup parameters 62-38
virtual terminal (VTY) lines
Cisco IOS routers
VTY Line dialog box 62-51
VTY Policy page 62-50
VLAN
configuring IPS groups 37-15
configuring IPS inline pairs 37-14
VLAN ACLs (VACLs)
defining 67-37
deleting 67-38
understanding 67-36
VLAN access maps 67-37
VLANs
Catalyst switches and 7600 Series routers
Create and Edit VLAN ACL Content dialog boxes 67-41
Create and Edit VLAN ACL dialog boxes 67-41
Create and Edit VLAN dialog boxes 67-28
defining 67-26
defining Data Port for IDSM 67-46
defining EtherChannel for IDSM 67-44
defining groups 67-32
defining VACLs 67-37
deleting 67-27
deleting Data Port for IDSM 67-47
deleting EtherChannel for IDSM 67-45
deleting groups 67-33
deleting VACLs 67-38
Interfaces/VLANs page-VLANs tab 67-27
understanding 67-25
understanding VACLs 67-36
understanding VLAN groups 67-31
VLAN Access Lists page 67-39
VPDN groups 46-55
VPN
configuring policy defaults 11-70, 25-12
mixing deployment methods 9-13
policy discovery restriction for web VPNs 3-8
Report Manager reports
general VPN reports 69-16
VPN top reports 69-16
system variables 7-14
traffic sent unencrypted 9-14
updating routing processes 9-13
using device overrides to customize VPN policies 25-13
zone-based firewall 21-6
VPN default policies
configuring 25-12
factory defaults 25-12
understanding 25-12
VPN discovery
prerequisites 25-21
procedure 25-24
rules 25-21
supported and unsupported technologies and topologies 25-20
understanding 25-19
VPN global settings
GET VPN
VPN Global Settings for GET page 29-16
VPN Global Settings policy
General Settings tab 26-30, 26-42
IKEv2 tab 26-35
ISAKMP/IPsec tab 26-31
NAT Settings tab 26-40
VPN Peers dialog box 35-22
VPN Policy Defaults page 11-70
VPN rediscovery 25-26
VPNs
AAA services 48-4
ASA devices
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
configuring remote access using wizard 30-13
creating in Map view 35-21
Easy VPN
connection profiles 28-13
connection profiles (ASA, PIX 7+) 31-8
IOS devices
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
IPsec
access policies for IKEv2 (ASA), configuring 31-48
access policies for IKEv2 (ASA), reference 31-43
access policies for IKEv2 (ASA), understanding 31-42
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1) 31-36
cluster load balancing 31-4, 31-5
configuring IKE and IPsec policies 26-1
connection profiles 31-6
connection profiles (ASA, PIX 7+) 31-8
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
Dynamic VTI/VRF Aware IPsec settings 33-7
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
high availability policies 33-11
IKE proposals 26-9
IKEv2 authentication 26-65, 26-66, 26-69
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
NAT settings 26-40
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
understanding IKE 26-5
understanding NAT settings 26-39
user group policies for IOS, PIX 6.3 33-13
VPNSM, VPN SPA, VSPA settings 33-6
IPsec proposals
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring for ASA and PIX 7.0+ devices 31-39
configuring for IOS and PIX 6.3 devices 33-3
Map view 35-20
policy discovery 5-12
remote access
access modes 30-4
device support 30-8
discovering 30-12
managing 30-1
managing (ASA, PIX 7.0+) 31-1
managing (IOS, PIX 6.3) 33-1
SSL 31-42
remote access IPSec
understanding 30-2
remote access SSL
example 30-3
limitations 30-7
managing support files 30-5
prerequisites 30-7
understanding 30-2
shared policies 5-4
site-to-site
configuring IKE and IPsec policies 26-1
policies overview 25-8
site-to-site VPNs 25-1
SSL
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
advanced settings (ASA) 31-70
AnyConnect client image settings (ASA) 31-63
AnyConnect client settings (ASA) 31-60, 31-62
AnyConnect custom attributes (ASA) 31-68, 31-69
browser plug-ins (ASA) 31-58
cluster load balancing 31-4, 31-5
configuring HTTP/HTTPS proxies and proxy bypass(ASA) 31-55
connection profiles 31-6
connection profiles (ASA) 31-8
content rewrite rules (ASA) 31-51
Context Editor dialog box (IOS) 33-15, 33-16
creating on ASA 30-14
creating on IOS devices 30-31
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
encoding rules (ASA) 31-53
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
Kerberos Constrained Delegation (KCD on ASA) 31-64, 31-66
NAT settings 26-40
other settings (ASA) 31-49
performance settings (ASA) 31-50
policies (IOS) 33-14
proxy bypass rules (ASA) 31-57
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
server certificate verification (ASA) 31-29, 31-31, 31-71
shared license (ASA) 31-72
shared license clients (ASA) 31-73
shared license servers (ASA) 31-74
understanding NAT settings 26-39
wizard 30-13
understanding 30-1
VPN Service Port Adapters (VSPAs)
configuring 25-41
VPN Services Module (VPNSM)
configuring 25-41
VPN Shared Port Adapter (VPN SPA)
configuring 25-41
VPNSM/VPN SPA/VSPA Settings dialog box 33-6
VPN Summary page 25-61
VPN topologies
accessing 25-17
assigning initial policies to new 25-60
assigning shared policies 5-44
cloning device VPN assignments 3-55
cloning shared policies 5-47
configuring dial backup 25-39
configuring GET VPN peers 25-59
configuring in Device view 25-19
creating or editing 25-28
creating or editing Extranet 25-65
defining endpoints and protected networks 25-33
defining GET VPN group encryption 25-53
deleting 25-69
discovering 25-19, 25-24
full mesh 25-4
hub-and-spoke 25-2
including unmanaged or non-Cisco devices 25-11
joined hub-and-spoke 25-5
locking 5-10
naming 25-30
partial mesh 25-5
point-to-point 25-3
rediscovering 25-26
removing devices 25-32
renaming policies 5-48
repairing discovered VPNs with multiple spoke definitions 25-25
selecting devices 25-32
tiered hub-and-spoke 25-5
unassigning policies 5-36
understanding 25-2
unsharing policies 5-43
using device overrides to customize VPN policies 25-13
viewing summary of VPN configuration 25-61
VRF-Aware IPsec
changing on Catalyst switches and 7600 routers 25-17
configuring 25-47
one-box solution 25-14
two-box solution 25-15
understanding 25-14
VRF-Aware IPsec tab (site-to-site VPN) 25-47
VTP modes, for Catalyst switches 67-1
VTY Line dialog box 62-51
Accounting tab 62-57
Authentication tab 62-55
Authorization tab 62-56
Setup tab 62-52
W
WAN interface card (WIC) 61-35
Warning - Partial VPN Deployment dialog box 8-31
warnings
significance of iii-lxiii
Web Filter policy map objects
creating 21-36
match conditions and actions 21-35
properties 21-47
web filter rules
ACL naming conventions 12-5
ASA/FWSM/PIX
converting IPv4 12-28
deleting 12-9
editing 12-10
moving 12-19
attributes (IOS) 18-13
configuring exclusive domains for IOS devices 18-10
configuring for ASA, PIX, FWSM devices 18-2
configuring for IOS devices 18-10
configuring in Map view 35-23
disabling 12-20
enabling 12-20
exclusive domain names (IOS) 18-14
managing 18-1
preserving ACL names 12-4
understanding 18-1
understanding NAT effects 12-3
understanding processing order 12-2
Web Filter Rules page (ASA/FWSM/PIX) 18-3
Web Filter Rules page (IOS) 18-11
web filter server properties 18-19
Web Filter Rules page (ASA/FWSM/PIX) 18-3
Web Filter Rules page (IOS) 18-11
Web Filter Server Configuration dialog box 18-19
web filter servers
attributes 18-19
configuring settings 18-15
configuring settings in Map view 35-24
configuring zone-based firewall settings in Map view 35-24
Web Filter settings page 18-16
Websense
configuring for web filter rules policies 18-15, 18-19
configuring for zone based firewall rules policies 21-36, 21-39, 21-41
Websense class map objects
creating 21-36
match criteria 21-30
Websense parameter map objects
creating 21-36
properties 21-39
web VPN
policy discovery restriction 3-8
Weighted Random Early Detection (WRED) 65-4
Whitelist/Blacklist tab 19-14
windows
arranging report 69-29
arranging views 68-36
closing report 69-31
undocking maps 35-2
Windows Messenger class map objects
creating 21-16
match criteria 21-21
Windows NT servers
use by ASA, PIX, and FWSM devices 6-28
Windows Server 2012 security settings 10-2
WINS Server Lists objects
attributes 34-89
creating 31-85
wizard
installation manager 72-25
wizards
configuring remote access SSL VPNs on ASA devices 30-14
configuring remote access SSL VPNs on IOS devices 30-31
configuring remote access VPNs 30-13
Copy Policies 5-33
Create Extranet VPN Topology 25-65
Create VPN Topology 25-28
creating remote access IPsec VPNs on ASA/PIX 7.0+ devices 30-24
creating remote access IPsec VPNs on IOS/PIX 6.3 devices 30-35
creating user group policies 30-19
Discover VPN policies 25-24
New Device 3-6
Rediscover VPN policies 25-26
Share Policies 5-42
wizards, using 1-46
workflow
overview 1-19
Workflow mode
changing modes 1-27
comparing with non-Workflow mode 1-21
configuration files
deploying 8-34, 8-39
previewing 8-44
configurations
rolling back 8-68
creating activities 4-14
deployment
viewing device details 8-26
viewing job history 8-26
jobs
aborting 8-54
approving 8-39
discarding 8-40
rejecting 8-39
states 8-6
submitting 8-38
opening activities 4-15
understanding 1-20
workflow modes
changing 1-27
comparing 1-21
Workflow Settings page 11-71
working with 3-57
worms
configuring IPS anomaly detection signatures 41-4
understanding 41-2
understanding IPS anomaly detection 41-1
understanding when to turn off anomaly detection 41-4
X
xdm-launcher.exe
device manager 71-23
XLATE table
clearing on deployment 59-1
Y
Yahoo Messenger class map objects
creating 21-16
match criteria 21-21
Z
zone-based firewall
add/edit zones 21-53
advanced options 21-67
changing the default drop rule 21-48
configuring PAM 21-69
configuring rules 21-13, 21-62
configuring settings 21-49
configuring settings in Map view 35-24
Content Filter tab 21-52
designing network zones 21-1
development overview 21-12
general recommendations 21-12
Global Parameters tab 21-50
IPSec VPN 21-6
logging 21-1
overview 21-1
page 21-50
preserving ACL names 12-4
protocol selection 21-68
restrictions 21-3
rules table 21-58
Self zone 21-5
tabs 21-49
troubleshooting 21-54
understanding 21-3
understanding NAT effects 12-3
understanding permit/deny and action 21-8
understanding processing order 12-2
understanding services and protocols 21-11
VPN tab 21-50
VRF 21-7
WAAS tab 21-50
Zones tab 21-50
zone-based firewall rules
configuring in Map view 35-23
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
moving 12-19
zone-based firewall rules policies
blocking spam using zone-based firewall rules 21-26
configuring map objects for content filtering rules 21-36
configuring map objects for inspection rules 21-16
creating zones 6-72
inspection parameters 21-31
match conditions for IM applications 21-21
match conditions for P2P applications 21-21
preventing SMTP DoS attacks 21-26
protocol information for IM application inspection 21-33
understanding interface role objects 6-71
Zone Contents dialog box 12-14
zones
creating 6-72
understanding interface role objects 6-71
zones, anomaly detection 41-3
Zoom In command 1-32
Zoom Out command 1-32
Index
Numerics
12.1 and 12.2
managing routers 60-2
3DES encryption algorithm
in IKE proposals 26-6
802.1x
802.1x Policy page 63-5
defining policies 63-4
interface authorization states 63-2
on Cisco IOS routers 63-1
supported topologies 63-3
understanding device roles 63-2
A
AAA
about 48-1
Cisco IOS routers
AAA Policy page 62-6
Accounting tab 62-10
Authentication tab 62-6
Authorization tab 62-7
Command Accounting dialog box 62-12
Command Authorization dialog box 62-9
defining services 62-4
overview 62-2
supported accounting types 62-3
supported authorization types 62-2
understanding method lists 62-3
configuring access control for IPS 36-21
configuring on firewall devices 48-1
credentials for device access 3-4
device administration 48-4
local fallback 48-3
network access 48-4
PIX/ASA/FWSM 48-5
Accounting tab 48-7
Authentication tab 48-5
Authorization tab 48-6
support 48-2
VPN access 48-4
AAA authentication groups
predefined 6-30
AAA firewall
MAC exempt lists 15-26
AAA Firewall page
Advanced Setting tab 15-20
AAA firewall policy
advanced settings 15-20
configuring 15-6
AAA page 15-28
AAA rules
ACL naming conventions 12-5
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring AAA firewall settings (PIX/ASA/FWSM) 15-6
configuring AuthProxy settings (IOS) 15-9
configuring cut-through proxy (ASA) 13-24
configuring for ASA/PIX/FWSM devices 15-4
configuring for IOS devices 15-7
configuring identity aware 13-21
configuring in Map view 35-23
configuring security group aware 14-17
configuring settings
for IOS devices in Map view 35-24
for PIX/ASA/FWSM in Map view 35-24
converting IPv4 12-28
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
managing 15-1
moving 12-19
preserving ACL names 12-4
properties 15-13
understanding 15-1
understanding how users authenticate 15-2
understanding NAT effects 12-3
understanding processing order 12-2
AAA Rules page 15-10
AAA server group objects
attributes 6-49
creating 6-47
default server groups on IOS devices 6-31
predefined authentication groups 6-30
understanding 6-27
AAA server objects
creating 6-32
HTTP-FORM settings 6-44
Kerberos settings 6-38
LDAP settings 6-39
NT settings 6-42
RADIUS settings 6-35
SDI settings 6-43
supported additional types for ASA/PIX/FWSM 6-28
supported types 6-28
TACACS+ settings 6-37
understanding 6-27
AAA servers
supported types on ASA, PIX, FWSM devices 6-28
Abort the Job dialog box 8-54
About Configuration Manager command 1-38
ABR
definition 55-67
access control list objects
creating 6-52
extended objects 6-53
standard objects 6-55
unified objects 6-57
web objects 6-56
access control lists
GET VPN security policies 29-10
policy discovery 5-14
access control lists (ACLs)
names preserved during discovery 12-4
naming conventions 12-5
resolving naming conflicts 12-6
access controls
configuring ACL names 16-22
configuring settings 16-22
configuring settings in Map view 35-24
Access Control Settings page 16-23
Access Group tab (IGMP) 54-5
Access Interface Configuration dialog box (ASA) 31-46
access permissions
Event Viewer 68-4
Health and Performance Monitor 70-3
maps 35-8
Report Manager 69-5
access policies
configuring 31-48
reference 31-43
understanding 31-42
access ports
Create and Edit Interface dialog boxes-Access Port mode 67-9
understanding 67-5
access rule
look up
from device managers 71-24
access rules
access control settings 16-23, 16-25
Access Rules page 16-10
ACL naming conventions 12-5
address requirements 16-5
Advanced dialog box 16-17
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring 16-7
configuring access control settings 16-22
configuring identity aware 13-21
configuring in Map view 35-23
configuring security group aware 14-17
controlling non-IP layer-2 traffic 23-1
deleting 12-9
detecting conflicts 16-27
disabling 12-20
editing 12-10
enabling 12-20
examples of event analysis
user access to server blocked 68-57
expiration dates 16-21
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
generating analysis reports 16-33
hit counts
details 16-35
how deployed 16-5
identity-aware rules
requirements 13-3
import examples 16-43
importing 16-39
IPS blocking, affect of 43-4
managing 16-1
moving 12-19
optimizing during deployment 16-45
packet tracer, analyzing with 71-30
preserving ACL names 12-4
Report Manager reports
firewall traffic reports 69-14
resolving conflicts 16-33
rule attributes 16-14
sharing ACLs among interfaces 11-18
syslog messages supported for look-up 71-53
understanding 16-1
understanding device-specific behavior 16-4
understanding global 16-3
understanding NAT effects 12-3
understanding processing order 12-2
understanding requirements when using inspection 17-4
understanding the automatic conflict detection user interface 16-29
viewing related CS-MARS events 71-49
viewing related events in Event Viewer 68-54
Accounting
Cisco IOS routers
settings 62-10
accounts and credentials
Cisco IOS routers
overview 62-13
PIX/ASA/FWSM
user accounts 51-7
user accounts, add/edit 51-7
accounts and credentials policies
Accounts and Credentials Policy page 62-15
User Accounts dialog box 62-17
ACLs
configuring names 16-22
ACS user authorization
configuring notifications when unavailable 1-26
Event Viewer 68-4
Health and Performance Monitor 70-3
how permissions affect what you can do 1-10
Report Manager 69-5
Active/Active failover
about 50-2
command replication 50-4
configuration synchronization 50-3
Active/Standby failover 50-2
Active Directory (AD)
collecting user statistics 13-25
configuring agent communication options 13-15
enabling for identity-aware firewall 13-8
identifying AD servers and agents 11-36, 13-8
requirements for identity-aware firewall 13-3
activities
accessing functions 4-8, 4-9
Activity Manager window 4-10
Approved state 4-5
approving 4-3, 4-21
benefits of 4-2
closing 4-16
creating 4-14
discarding 4-22
Edit state 4-4
locking 4-3
managing 4-1
multiple users 4-4
opening 4-15
overview 1-19
rejecting 4-21
responding to the Activity Required dialog box 4-14
states 4-4
Submitted state 4-5
submitting for approval 4-20
understanding 4-1
validating 4-18
viewing change reports 4-16
viewing status and history 4-23
working with 4-7
Activities command 1-33
Activities menu 1-35
Activity Manager window 4-10
Activity Required dialog box 4-14
Add/Edit Action Configuration dialog box 53-7
Add/Edit AnyConnect Client Image dialog box (ASA) 31-63
Add/Edit AnyConnect Custom Attributes dialog box (ASA) 31-68, 31-69
Add/Edit Applet dialog box 53-4
Add/Edit Collector dialog box 53-2
Add/Edit Content Rewrite dialog box (ASA) 31-52
Add/Edit DAP Entry Dialog Box > Device 32-29
Add/Edit File Encoding dialog box 31-53
Add/Edit Multicast Route dialog box 54-8, 54-10
description 54-9
Add/Edit PIM Neighbor Filter dialog box 54-13
Add/Edit Proxy Bypass dialog box 31-57
Add/Edit Syslog Configuration dialog box 53-6
Add AAA Rule dialog box 15-13
Add AAA Server dialog box 6-33
Add AAA Server Group dialog box 6-49
Add Access List dialog box (Allowed Hosts policy) 36-7
Add Access Rule dialog box 16-14
Add an Entry dialog box 39-30
Add AOL Class Map dialog box 17-27, 21-19
Add A Port Forwarding Entry dialog box 34-41
Add ASA Group Policies dialog box
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
overview 34-1
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
Technology settings 34-1
Add A Smart Tunnel Entry dialog box 34-66, 34-69
Add AS Path Entry dialog box 55-144
Add AS Path Object dialog box 55-143
Add Auto Signon Rules dialog box 34-26
Add Cat6k Block Vlan dialog box 43-16
Add Certificate dialog box 11-24
Add Certificate Filter dialog box 25-56
Add Cisco Secure Desktop Configuration dialog box 34-34
Add Client Access Rules dialog box 34-12
Add Client Update dialog box 34-80
Add Column dialog box 34-60
Add Community List Entry dialog box 55-146
Add Community List Object dialog box 55-145
Add Custom Pane dialog box 34-60
Add Custom Signature dialog box 39-15
Add DCE/RPC Map dialog box 17-28
Add Destinations dialog box 12-11
Add Device from Network wizard
Device Credentials page 3-44
Add Devices to Group command 1-30
Add Devices to Group dialog box 3-61
Add DNS Class Map dialog box 17-27
Add DNS Map dialog box
Filtering tab 17-33
overview 17-31
Protocol Conformance tab 17-32
Add eDonkey Class Map dialog box 17-27, 21-19
Add ESMTP Map dialog box 17-37
Add Extended Access Control Entry dialog box 6-60
Add Extended Access List dialog box 6-58
Add External Filter dialog box 21-41
Add FastTrack Class Map dialog box 17-27, 21-19
Add File Object dialog box 34-36
Add FlexConfig dialog box 7-30
Add FTP Class Map dialog box 17-27
Add FTP Map dialog box 17-40
Add Gnutella Class Map dialog box 17-27, 21-19
Add Group dialog box 3-61
Add Group Member dialog box 29-19
Add GTP Map dialog box 17-43
Add H.323 Class Map dialog box 17-27, 21-19
Add H.323 Map dialog box 17-48, 21-34
Add HSI Endpoint IP Address dialog box 17-51
Add HSI Group dialog box 17-50
Add HTTP Class Map dialog box 17-27, 21-19
Add HTTP Map dialog box 21-34
ASA 7.1.x, PIX 7.1.x, FWSM 3.x, IOS devices
Entity Length tab 17-55
Extension Request Method tab 17-58
General tab 17-54
overview 17-53
Port Misuse tab 17-59
RFC Request Method tab 17-57
Transfer Encoding tab 17-60
ASA 7.2+ and PIX 7.2+ devices 17-61
Add ICQ Class Map dialog box 17-27, 21-19
Add IKEv1 Proposal dialog box 26-10
Add IKEv2 Proposal dialog box 26-13
Add IMAP Class Map dialog box 17-27, 21-19
Add IMAP Map dialog box 21-34
Add IM Class Map dialog box 17-27
Add IM Map dialog box 21-34
ASA and PIX device 17-67
IOS device 17-70
Add Inspect/Application FW Rule wizard
Address and Port page 17-12
Inspected Protocol page 17-16
Match Traffic page 17-10
Add Inspect Parameter Map dialog box 21-31
Add Interfaces dialog box 12-13
Add IP Options Map dialog box 17-71
Add IPsec Pass Through Map dialog box 17-77
Add IPSec Transform Set dialog box 26-25
Add IPv4 Pool Object dialog box 6-87
Add IPv6 Map dialog box 17-74, 17-88
Add IPv6 Pool Object dialog box 6-88
Add Kazaa2 Class Map dialog box 17-27, 21-19
Add Key Server dialog box 29-19
Add Language dialog box 34-55
Add LDAP Attribute Map dialog box 6-45
Add LDAP Attribute Map Value dialog box 6-46
Add Link command 1-32
Add Link dialog box 35-20
Add Local Rules command 1-31
Add Local Web Filter Class Map dialog box 17-27, 21-19
Add Local Web Filter Parameter Map dialog box 21-38
Add MAC Address Pool Object dialog box 6-89
Add Map Object command 1-32
Add Map Object dialog box 35-17
Add Map Value dialog box 6-47
Add Match Condition and Action dialog box
DNS policy maps 17-34
ESMTP policy maps 17-38
FTP policy maps 17-41
GTP policy maps 17-46
H.323 (IOS) policy maps 21-35
H.323 policy maps 17-51
HTTP (Zone Based IOS) policy maps 21-35
HTTP policy maps 17-62
IM (Zone Based IOS) policy maps 21-35
IMAP policy maps 21-35
IM policy maps 17-68
IPv6 policy maps 17-75, 17-89
P2P policy maps 21-35
POP3 policy maps 21-35
SIP (IOS) policy maps 21-35
SIP policy maps 17-82, 17-92
Skinny policy maps 17-86
SMTP policy maps 21-35
Sun RPC policy maps 21-35
Web Filter policy maps 21-35
Add Match Criterion dialog box
AOL class maps 21-21
DNS class maps 17-34
eDonkey class maps 21-21
FastTrack class maps 21-21
FTP class maps 17-41
Gnutella class maps 21-21
H.323 (IOS) class maps 21-22
H.323 class maps 17-51
HTTP (IOS) class maps 21-22
HTTP class maps 17-62
ICQ class maps 21-21
IMAP class maps 21-24
IM class maps 17-68
Kazaa2 class maps 21-21
Local Web Filter class maps 21-29
MSN Messenger class maps 21-21
N2H2 class maps 21-30
POP3 class maps 21-24
SIP (IOS) class maps 21-25
SIP class maps 17-82, 17-92
SMTP class maps 21-26
Sun RPC class maps 21-29
Websense class maps 21-30
Windows Messenger class maps 21-21
Yahoo Messenger class maps 21-21
Add MSN Messenger Class Map dialog box 17-27, 21-19
Add N2H2 Parameter Map dialog box 21-39
Add N2H2 Web Filter Class Map dialog box 17-27, 21-19
Add NAT Rule dialog box
ASA 8.3+ 24-36
Add NetBIOS Map dialog box 17-78
Add Network/Host dialog box
General tab 6-81
NAT tab 24-42
Add New Device wizard
Device Credentials page 3-44
Add New Security Association dialog box 25-57
Add or Edit Plug-in Entry dialog box (ASA) 31-58
Add Other Devices dialog box 8-57
Add P2P Map dialog box 21-34
Add Permit Response dialog box 17-45
Add Per-Session NAT Rule dialog box 24-47
Add PIX/ASA/FWSM Web Filter Rule dialog box 18-5
Add PKI Enrollment dialog box
CA Information tab 26-57
Certificate Subject Name tab 26-63
Enrollment Parameters tab 26-61
overview 26-55
Trusted CA Hierarchy tab 26-64
Add Policy List Object dialog box 55-135
Add POP3 Class Map dialog box 17-27, 21-19
Add Port Forwarding List dialog box 34-39
Add Port List dialog box 6-94
Add Prefix List Entry dialog box 55-140, 55-142
Add Prefix List Object dialog box 55-138, 55-140
Add Protocol Info Parameter Map dialog box 21-33
Add Regular Expression dialog box 17-100
Add Regular Expression Group dialog box 17-100
Address Pools
PIX/ASA/FWSM 24-18
add/edit 24-18
address pools
overriding in connection profiles 30-8
Add Route Map Entry dialog box 55-129
Add Route Map Object dialog box 55-128
Add Row command 1-30
Add Rule Section dialog box 12-22
Add Server dialog box
Protocol Info Parameter maps 21-34
Add Service dialog box 6-95
Add Services dialog box 12-13
Add Single Sign On Server dialog boxes 34-41
Add SIP Class Map dialog box 17-27, 21-19
Add SIP Map dialog box 17-80, 17-90, 21-34
Add Skinny Map dialog box 17-84
Add SLA Monitor dialog box 51-10
Add Smart Tunnel Auto Signon Entry dialog box 34-71
Add Smart Tunnel Auto Signon Lists dialog box 34-70
Add Smart Tunnel Lists dialog box 34-65, 34-68
Add SMTP Class Map dialog box 17-27, 21-19
Add SMTP Map dialog box 21-34
Add SNMP Map dialog box 17-87
Add Sources dialog box 12-11
Add SSL VPN Customization dialog box 34-50
Applications 34-59
Copyright Panel 34-57
Custom Panes 34-59
Full Customization 34-58
Home Page 34-61
Informational Panel 34-56
Language 34-53
Logon Form 34-55
Logout Page 34-62
Title Panel 34-52
Toolbar 34-58
Add SSL VPN Gateway dialog box 34-63
Add Standard Access Control Entry dialog box 6-63
Add Standard Access List dialog box 6-58
Add Sun RPC Class Map dialog box 17-27, 21-19
Add Sun RPC Map dialog box 21-34
Add TCP Map dialog box 57-21
Add TCP Option Range Dialog Box 57-23
Add Text Object dialog box 7-32
Add Time Range dialog box 6-70
Add Traffic Flow dialog box 57-17
Add Transparent Firewall Rule dialog box 23-5
Add Trend Content Filter Class Map dialog box 17-27, 21-19
Add Trend Parameter Map dialog box 21-42
Add Unified Access Control Entry dialog box 6-66
Add URL Domain Name dialog box 21-45
Add URLF Glob Parameter Map dialog box 21-45
Add URL Filter Parameter Map dialog box 21-43
Add User dialog box 12-12, 36-19
Add User Group dialog box
Advanced PIX 6.3 settings 34-81
Browser Proxy settings 34-86
Client (IOS) settings 34-77
Clientless settings 34-82
Client VPN Software Update (IOS) settings 34-80
DNS/WINS settings 34-76
General settings 34-74
IOS Xauth Options settings 34-79
overview 34-72
Split Tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN Connection settings 34-87
SSL VPN Full Tunnel settings 34-83
SSL VPN Split Tunneling settings 34-85
Technology settings 34-72
Thin Client settings 34-83
Add User Profile dialog box 43-12
Add VDI Server dialog box 34-16
Add Virtual Sensor dialog box 38-7, 38-8
Add Web Access Control Entry dialog box 6-64
Add Web Filter Map dialog box 21-47
Add WebSense Parameter Map dialog box 21-39
Add Websense Web Filter Class Map dialog box 17-27, 21-19
Add Web Type Access List dialog box 6-58
Add Windows Messenger Class Map dialog box 17-27, 21-19
Add WINS Server dialog box 34-89
Add WINS Server List dialog box 34-88
Add Yahoo Messenger Class Map dialog box 17-27, 21-19
Add Zones dialog box 12-13
admin context 58-1
administration
selecting policies to manage 5-11
administrative settings, configuring 11-1
admin password, changing 10-24
ADSL
ADSL Policy page 61-36
ADSL Settings dialog box 61-37
defining settings 61-35
supported operating modes 61-34
ADSL policies
unable to deploy 9-15
Advanced dialog box
access rules 16-17
Advanced NAT Options
PIX/ASA/FWSM
add/edit 24-29
Advanced settings
interface configuration
PIX/ASA/FWSM 46-52
AES encryption algorithm
in IKE proposals 26-6
AIM-IPS interfaces
IPS Module Interface Settings page 61-22
AIP-SSM/SSC
ASA 57-14
Alarm Indication Signal (AIS) cells 61-50
allowed hosts, configuring for IPS 36-7
Allowed Hosts policy 36-7
Analysis Engine global variables
configuring 36-30
analysis reports
generating 16-33
anomaly detection
configuring 41-6
configuring histograms 41-11
configuring learning accept mode 41-8
configuring signatures 41-4
configuring thresholds 41-11
managing 41-1
modes 41-2
understanding 41-1
understanding histograms 41-9
understanding thresholds 41-9
understanding worms 41-2
when to turn off 41-4
zones
overview 41-3
anti-spoofing 56-2
AnyConnect
client images 31-60, 31-62
profiles 31-60, 31-62
editing 31-61
AnyConnect Client Image dialog box (ASA) 31-62
AnyConnect custom attributes 31-68, 31-69
AnyConnect Profile Editor 31-61
AOL class map objects
creating 21-16
match criteria 21-21
applet
embedded event manager 53-3
Apply IPS Update command 1-34
Apply IPS Update wizard 44-7
Approve Activity command 1-35
Approve Activity dialog box 4-21
Approved activity state 4-5
Approve Deployment Job dialog box 8-20, 8-39
Area Border Router
See ABR 55-67
ARP
PIX/ASA/FWSM
configuration 47-4
inspection 47-5
inspection, enable/disable 47-6
table 47-3
ARP table
static entry 47-3, 47-4
ASA
ASDM 71-22
CX 57-16
Auth Proxy Configuration 57-16
CX module
detecting 71-28
Failover
Add Failover Group 50-24
edit bridge group 50-16
FirePOWER module
detecting 71-28
IPS, QoS, and Connection Rules
ASA CX Auth Proxy Configuration 57-16
IPS modules 57-14
policy discovery 5-13
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-64
rollback restrictions for multiple context mode 8-64
security contexts
allocate interfaces 58-11
configuration 58-9
viewing allocated interfaces 58-11
setting up AUS or CNS 2-8
setting up SSL (HTTPS) 2-3
TCP State Bypass 57-3
ASA 5505
Management IPv6 47-10
ports and interfaces 46-6
ASA 8.3+
NAT policies
Add/Edit NAT rules dialog boxes 24-36
Translation Rules page 24-33
ASA Cluster Load Balance page 31-5
ASA CX
CX
about 57-16
ASA devices
5505
hardware port configuration 46-49
AAA support 6-28
about 46-1
adding or changing modules 3-39
adding SSL thumbprints manually 9-4
Bridge Groups
add/edit 46-51
Catalyst Service Module 46-1
changing those selected for reports 69-22
configuring for event management 68-27
configuring for report management 69-3
configuring IKE and IPsec policies 26-1
configuring IKEv2 authentication 26-65
configuring transparent firewall rules 23-1
Easy VPNs
connection profiles 28-13
Event Viewer support 68-4
FlexConfig object samples 7-20
global access rules 16-3
identity-aware services
configuring to provide 13-7, 14-8
interfaces 46-21
add/edit 46-26
Advanced tab 46-35
configuring 46-3
edit EtherChannel-assigned interface 46-11
EtherChannels 46-9, 46-13
General tab 46-27
IP Type 46-46
IPv6 46-39, 46-56
IPv6, add/edit 46-43
IPv6, add/edit prefixes 46-44
LACP 46-11
MAC address 46-48
PPPoE Users 46-54
VPDN groups 46-55
licenses 2-11
monitoring service level agreements 51-8
object group search 16-25
packet capture, using 71-36
packet tracer, using 71-30
remote access SSL VPNs
advanced settings 31-70
Anyconnect client settings 31-60, 31-62
browser plug-ins 31-58
configuring HTTP/HTTPS proxies and proxy bypass 31-55
content rewrite rules 31-51
encoding rules 31-53
Kerberos Constrained Delegation (KCD) 31-64, 31-66
other settings 31-49
performance settings 31-50
server certificate verification settings 31-29, 31-31, 31-71
shared license 31-72
shared license clients (ASA) 31-73
shared license servers (ASA) 31-74
remote access VPNs
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
AnyConnect client image settings (ASA) 31-63
AnyConnect custom attributes (ASA) 31-68, 31-69
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1 IPSec) 31-36
cluster load balancing 31-4, 31-5
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
connection profiles 31-6, 31-8
creating IPSec 30-24
creating SSL 30-14
customizing 31-75
device support 30-8
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
fragmentation settings 26-30, 26-42
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKE proposals 26-9
IKEv2 settings 26-35
IPsec proposals 31-40
ISAKMP/IPsec settings 26-31
managing 31-1
NAT settings 26-40
policy overview 31-2
post URL method and macro substitutions in bookmarks 31-82
proxy bypass rules (ASA) 31-57
Public Key Infrastructure (PKI) 26-54
secure desktop manager policies 32-9
smart tunnels 31-83
understanding IKE 26-5
understanding NAT settings 26-39
wizard 30-13
Report Manager reports
firewall summary botnet reports 69-15
firewall traffic reports 69-14
general VPN reports 69-16
VPN top reports 69-16
selecting for Event Viewer 68-32
selecting policy types to manage 5-11
SSL certificate configuration 11-22
ASA group policies objects
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
ASA Image Management 72-15, 72-32
ASAv
about 46-1
ASBR
definition 55-67
ASCII limitations for text 1-49
ASDM
access rule look-up 71-25
device manager 71-22
AS path objects
properties 55-143
ASR
zone-based firewall
global parameters 21-50
restrictions 21-3
assignment overview 1-19
Assignments tab, Policy view 5-54
Assign Shared Policy command 1-31
Assign Shared Policy dialog box 5-44
Asymmetric Digital Subscriber Line (ADSL)
on Cisco IOS routers 61-33
Asymmetric Routing Groups 46-5
Asynchronous Transfer Mode (ATM) 61-46
ATM 61-46
virtual channel connections (VCCs) 61-46
virtual channel identifier (VCI) 61-46
virtual path connections (VPCs) 61-46
virtual path identifier (VPI) 61-46
Attack Response Controller 43-1
attacks
broadcast 17-4
Denial of Service (DoS) 17-4
spoofing 17-4
SYN flooding 17-4
audit logs
configuring default settings 11-59
purging entries 10-23
understanding 10-19
working with 10-19
Audit Message Detail dialog box 10-21
Audit Report command 1-33
audit reports
generating and viewing 10-20
understanding 10-19
working with 10-19
Audit Report window 10-21
AUS
deploying configurations 8-41
deployment method 8-10
setting up 2-7
setting up on PIX Firewall and ASA devices 2-8
Authentication
Cisco IOS routers
settings 62-6
authentication
routing protocols 55-67
Authentication-Authorization-Accounting
see AAA 48-1
Authentication Header (AH) encryption algorithm 26-29
authentication methods
certificates (RSA signatures) 26-8
in IKE proposals 26-8
preshared keys 26-8
authentication testing
SSH 2-5
Authorization
Cisco IOS routers
settings 62-7
authorization proxy (AuthProxy)
configuring AAA rules 15-7
AuthProxy
configuring settings in Map view 35-24
Auth Proxy Configuration
ASA CX 57-16
AuthProxy dialog box 15-19
AuthProxy settings policy
configuring 15-9
autolink
omitting reserved networks from maps 11-3
automatic conflict detection
resolving conflicts 16-33
understanding 16-27
understanding the user interface 16-29
using 16-27
autonomous system paths
See AS paths
auto signon rules
ASA group policy objects 34-26
Auto Update Server (AUS)
adding 3-35
licensing 10-17
PIX/ASA/FWSM 52-1
add/edit server 52-3
troubleshooting deployment 9-18
Auto Update Server Properties dialog box 3-36
Available Bit Rate (ABR) 61-47
Available Servers dialog box 3-38
B
background image, map
deleting 35-13
importing 35-13
scale and position 35-13
setting 35-13
backup
event data store 68-34
backup.pl command 10-25
Backup command 1-34
backups, Security Manager database 10-25
bandwidth
VPN user reports 69-16
banners
configuring on firewall devices 48-9
benefits of product 1-2
BGP routing
BGP Routing Policy page 66-4
defining routes 66-2
Neighbors dialog box 66-6
on Cisco IOS routers 66-1
PIX/ASA/FWSM 55-2, 55-3
General tab 55-5
IPv4 Family - Aggregate Address configuration 55-9, 55-22
IPv4 Family - Filter configuration 55-10
IPv4 Family - General tab 55-7, 55-21
IPv4 Family - Neighbor configuration 55-11, 55-24
IPv4 Family - Network configuration 55-17, 55-29
IPv4 Family - Redistribution configuration 55-18, 55-30
IPv4 Family - Route Injection configuration 55-19, 55-31
IPv4 Family tab 55-6, 55-20
redistributing routes 66-3
Redistribution Mapping dialog box 66-7
Redistribution tab 66-6
Setup tab 66-4
Bidirectional Neighbor Filter 54-14
Bidirectional Neighbor Filter tab
PIM 54-13
blocking, IPS
configuring 43-7
configuring ARC 43-1
configuring blocking devices 43-14
configuring master blocking sensors 43-13
configuring never block hosts and networks 43-17
configuring router blocking interfaces 43-15
configuring user profiles 43-12
configuring VLAN blocking interfaces 43-16
general options 43-10
master blocking sensor 43-6
policy 43-8
rate limiting 43-4
router and switch blocking devices 43-4
strategies 43-3
understanding 43-1
Blocking page 43-8
Boot image/configuration
PIX/ASA 48-9
add/edit 48-11
bootstrap configuration
Failover 50-26
Botnet Traffic Filter Drop Rules Editor 19-13
botnet traffic filter rules
adding static entries 19-5
blocking blacklisted traffic 19-6
configuring DNS snooping 17-18
configuring in Map view 35-23
configuring the dynamic database 19-4
configuring with IPS global correlation 42-1
databases 19-1
Device Blacklist dialog box 19-15
Device Whitelist dialog box 19-15
Drop Rules Editor 19-13
Dynamic Blacklist Configuration tab 19-10
enabling DNS snooping 19-6
field definitions 19-9
illustrations 19-1
mitigating botnet activity 68-62
monitoring
activity using ASDM 68-62
activity using Event Viewer 68-60, 68-61
overview 68-59
understanding botnet syslog events 68-59
overview 19-1
preserving ACL names 12-4
Report Manager reports
firewall summary botnet reports 69-15
task flow 19-2
traffic classification 19-6
Traffic Classification dialog box 19-12
Traffic Classification tab 19-11
understanding 19-1
understanding NAT effects 12-3
understanding processing order 12-2
Whitelist/Blacklist tab 19-14
bridge group
failover
editing 50-16
Bridge Groups
ASA/FWSM
add/edit 46-51
bridge groups
defining 62-20
FWSM 3.1 47-3
Bridging
ASA 5505
Management IPv6 47-10
PIX/ASA/FWSM
ARP configuration 47-4
ARP Inspection 47-5
ARP Inspection, enable/disable 47-6
ARP Table 47-3
MAC Address, add/edit 47-8
MAC Address Table 47-7
MAC Learning 47-8
MAC Learning, enable/disable 47-9
Management IP address 47-10
bridging
Cisco IOS routers
Bridge Group dialog box 62-21
Bridging Policy page 62-20
BVI interfaces 62-19
overview 62-18
configuring transparent firewall rules 23-1
PIX/ASA/FWSM
about 47-1
configuring on 47-1
broadcast attacks, preventing 17-4
broadcasts
enabling directed on routers 61-20
browser plug-ins
configuring 31-58
Bundles 72-13
bypass mode
configuring for IPS 37-12
C
CA server authentication methods
SCEP (Simple Certificate Enrollment Protocol) 26-49
Cat6k Device dialog box 43-14
Catalyst 6500/7600 devices
configuring FWSM in site-to-site VPNs 25-46
configuring SSH 2-6
default transport protocol 11-22
deployment 8-28
FlexConfig object samples 7-22
IPS blocking devices 43-4
policy discovery for FWSM 5-13
rollback restrictions 8-65
Service Modules 46-1
Catalyst 6500/7600 switches
including in deployment jobs 8-27
Catalyst devices
policy discovery 5-13
remote access VPNs
Dynamic VTI/VRF Aware IPsec settings 33-7
high availability 33-11
IPsec proposals 33-4
user group policies 33-13
VPNSM/VPN SPA/VSPA settings 33-6
Catalyst platform policies
IDSM settings policy
Create and Edit IDSM Data Port VLANs dialog boxes 67-50
Create and Edit IDSM EtherChannel VLANs dialog boxes 67-49
IDSM Settings page 67-47
IDSM Slot-Port Selector dialog box 67-51
interfaces/VLANs policy
Access Port Selector dialog box 67-30
Create and Edit Interface dialog boxes-Access Port mode 67-9
Create and Edit Interface dialog boxes-Dynamic Port mode 67-18
Create and Edit Interface dialog boxes-Other mode 67-24
Create and Edit Interface dialog boxes-Routed Port mode 67-12
Create and Edit Interface dialog boxes-subinterfaces 67-22
Create and Edit Interface dialog boxes-Trunk Port mode 67-14
Create and Edit VLAN dialog boxes 67-28
Create and Edit VLAN Group dialog boxes 67-34
Interfaces tab 67-7
Service Module Slot Selector dialog box 67-35
Summary tab 67-3
Trunk Port Selector dialog box 67-31
VLAN Groups tab 67-33
VLAN Selector dialog box 67-35
VLANs tab 67-27
VLAN access lists policy
Create and Edit VLAN ACL Content dialog boxes 67-41
Create and Edit VLAN ACL dialog boxes 67-41
VLAN Access Lists page 67-39
Catalyst Summary Info command 1-34
Catalyst switches
configuring SSH 2-6
default transport protocol 11-22
showing modules, security contexts, and virtual sensors 3-54
Catalyst switches/7600 routers
troubleshooting deployment 9-15
Catalyst switches and 7600 devices
IDSM mode support 67-44
interface deployment failure 9-16
internal VLAN deployment failure 9-16
supported VTP modes 67-1
Catalyst switches and 7600 Series routers
access ports 67-5
Catalyst Summary Info page 67-2
defining IDSM Data Port VLANs 67-46
defining IDSM EtherChannel VLANs 67-44
defining ports 67-5
defining VACLs 67-37
defining VLAN groups 67-32
defining VLANs 67-26
deleting IDSM Data Port VLANs 67-47
deleting IDSM EtherChannel VLANs 67-45
deleting ports 67-7
deleting VACLs 67-38
deleting VLAN groups 67-33
deleting VLANs 67-27
discovering policies 67-1
generating interface names 67-6
IDSM settings 67-43
IDSM Settings page 67-47
interfaces 67-5
managing 67-1
routed ports 67-5
trunk ports 67-5
viewing interface and VLAN summary 67-3
VLAN Access Lists page 67-39
VLAN ACLs (VACLs) 67-36
VLAN groups 67-31
VLANs 67-25
Catalyst VPN Service Port Adapters (VSPAs)
configuring 25-41
Catalyst VPN Services Module (VPNSM)
configuring 25-41
configuring in remote access VPNs 33-6
Catalyst VPN Shared Port Adapter (VPN SPA)
configuring 25-41
configuring in remote access VPNs 33-6
categories
using 6-13
cautions
significance of iii-lxiii
CCO settings 11-4
CDP
configuring mode for IPS 37-12
CEF Interface Settings dialog box 61-26
CEF interface settings policies 61-24
certificates
accepting 11-4, 11-49
retrieving 11-4, 11-49
viewing 11-4, 11-49
certificates, SSL
adding thumbprints manually 9-4
configuring default settings for how handled 11-22
managing IPS 44-10
certificates for ASA image downloads 11-4
certificates for IPS package downloads 11-49
certificate to connection profile map policies
configuring policy 31-35
configuring rules 31-36
certificate trust management 11-4, 11-49
Change Report dialog box 4-18
change reports
selecting session in non-Workflow mode 4-18
viewing 4-16
Change Reports command 1-33
Checkpoint migration
configuring object group search on ASA 8.3+ devices 16-25
Choose a file dialog box 34-38
Cisco 7600 Series routers
managing 67-1
Cisco AnyConnect Profile Editor 31-61
Cisco Configuration Engine
troubleshooting device setup and deployment 9-18
Cisco Discovery Protocol (CDP)
enabling CDP on router interfaces 61-18
Cisco Express Forwarding (CEF)
CEF Interface Settings policy 61-25
CEF router interface settings policies 61-24
importance for QoS 65-2
Cisco IOS IPS
affect of load balancing 45-8
configuration files 45-3
configuration overview 45-4
configuring 45-1
configuring general settings 45-7
configuring interface rules 45-9
getting started 36-1
initial preparation of router 45-5
lightweight signature engines 45-2
limitations and restrictions 45-3
selecting signature category 45-6
understanding 45-1
understanding subsystems and revisions 45-2
Cisco IOS Routers
configuring IOS IPS 45-1
IPS blocking devices 43-4
Cisco IOS routers
802.1x 63-1
AAA 62-2
accounts and credentials 62-13
ADSL 61-33
advanced interface settings 61-13
available interface types 61-2
basic interface settings 61-1
BGP routing 66-1
CNS call-home mode 2-9
CNS event-bus mode 2-8
configuring SSH 2-6
CPU settings 62-25
default AAA server groups 6-31
deploying configurations using TMS 8-42
dialer interfaces 61-27
discovering policies 60-3
Domain Name System (DNS) 62-74
Dynamic Host Configuration Protocol (DHCP) 62-87
EIGRP routing 66-8
host and domain names 62-77
HTTP 62-28
interface deployment failure 9-14
IOS 12.1 and 12.2 60-2
licenses 2-12
line access 62-35
managing 60-1
memory settings 62-78
NAT 24-5
designating interfaces 24-6
dynamic rules 24-10
static rules 24-6
timeouts 24-13
NetFlow 64-1, 64-5, 64-12
Network Admission Control (NAC) 63-8
Network Time Protocol (NTP) 62-96
optional SSH settings 62-63
OSPF routing 66-19
permanent virtual connections (PVCs) 61-46
platform policies 60-1
Point-to-Point Protocol (PPP) 61-70
policy discovery 5-13
quality of service (QoS) 65-1
RIP routing 66-42
Secure Device Provisioning (SDP) 62-81
setting up SSL (HTTPS) 2-4
SHDSL 61-40
SNMP 62-66
static routing 66-50
syslog logging 64-1
time zone settings 62-22
transparent bridging 62-18
Cisco IOS Software
FlexConfig object samples 7-22
selecting policy types to manage 5-11
Cisco Prime Security Manager
see PRSM 71-27, 71-28
Cisco Secure Desktop configuration objects
creating 33-18
Cisco Security Management Suite server
logging into or exiting 1-11
Cisco Technical Assistance Center
creating diagnostic file 10-28
generating data 10-28
generating deployment or discovery status reports 10-30
generating partial database backup 10-30
Cisco Trust Agent (CTA) 63-9
CiscoWorks Common Services
backing up and restoring Security Manager 10-24
logging into or exiting 1-11
CiscoWorks user authorization, affect on what you can do 1-10
Class-Based Policing 65-6
class maps
understanding 6-76
Clear Connection Configuration dialog box 15-25
clear xlate
PIX/ASA/FWSM platform 59-1
CLI commands
FlexConfig objects 7-2
client applications 71-2
client connection characteristics
configuration modes 28-3
configuring policies for Easy VPN 28-7
extended authentication (xauth) 28-4
clientless access mode 30-4
client settings
configuring AnyConnect 31-62
understanding AnyConnect 31-60
client-side file browsing 1-49
enabling or disabling 11-10
CLI prompt
configuring on firewall devices 48-12
Clock
PIX/ASA/FWSM 48-13
clock
Cisco IOS routers
overview 62-22
clock settings
Cisco IOS routers
Clock Policy page 62-23
Clone Device command 1-29
Clone Policy Bundle dialog box 5-58
Clone Policy command 1-31
Clone Policy dialog box 5-47
Close Activity command 1-35
Close All Reports command (Report Manager) 69-8
Close Report command (Report Manager) 69-8
Close Ticket command 1-36
cluster, server
managing 10-2
overview 10-2
splitting server 10-3
synchronizing shared policies 10-5
Cluster Information page, device properties 3-49
clustering 3-9
cluster load balancing
configuring 31-5
understanding 31-4
understanding FQDN redirection 31-5
CNS
call-home mode 2-9
deploying configurations 8-41
deployment method 8-10
event-bus mode 2-8
setting up on PIX Firewall and ASA devices 2-8
color rules, configuring in Event Viewer 68-38
Combine Rules Selection Summary dialog box 12-24
commands
Activities menu 1-35
Edit menu (Configuration Manager) 1-30
Event Viewer File menu 68-9
Event Viewer View menu 68-9
File menu (Configuration Manager) 1-29
Help menu (Configuration Manager) 1-37
Launch menu 1-36
Manage menu 1-33
Map menu 1-32
Policy menu (Configuration Manager) 1-31
Report Manager menus 69-8
Tickets menu 1-35
Tools menu (Configuration Manager) 1-33
View menu (Configuration Manager) 1-30
Common Services
licensing 10-17
communication, device
troubleshooting 9-7
community list objects
properties 55-145
configurable dashboard for IPS and FW 71-1
configuration
initial Security Manager 1-24
understanding rollback 8-63
Configuration Archive
adding configurations from devices 8-58
overview 8-15
rolling back to archived configuration files 8-70
rolling back when deploying to file 8-71
settings 11-6
version viewer 8-60
viewing and comparing configuration versions 8-59
viewing transcripts 8-61
window 8-23
Configuration Archive command 1-33
Configuration Archive page 11-6
Configuration Engine
adding 3-35
CNS call-home mode 2-9
CNS event-bus mode 2-8
setting up 2-7
Configuration Engine Properties dialog box 3-36
configuration files
deploying in non-Workflow mode 8-28
deploying in Workflow mode 8-34, 8-39
deploying to 8-11
deploying to an AUS or CNS 8-41
deploying to a TMS 8-42
deployment process overview 8-1
factory-default configurations 46-2
previewing 8-44
redeploying to devices 8-52
rolling back after deploying to file 8-71
rolling back to archived configurations 8-70
rolling back to devices 8-68
selecting 1-49
web VPN policy discovery restrictions 3-8
configuration location, configuring for IOS IPS 45-7
Configuration Manager
overview 1-13
using 1-13
configurations
adding to the Configuration Archive 8-58
avoiding out-of-band changes 8-46
detecting out-of-band changes 8-45
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rolling back 8-62
rolling back Catalyst 6500/7600 8-65
rolling back failover devices 8-64
rolling back IPS and IOS IPS 8-65
rolling back multiple context mode 8-64
understanding out-of-band changes 8-12
viewing and comparing 8-59
configuration session
selecting session for change reports 4-18
viewing change reports 4-16
configuration sessions
discarding 4-22
configuration views 1-13
Configure dialog box 17-21
Configure DNS dialog box 17-18
Configure ESMTP dialog box 17-19
Configure Fragments dialog box 17-19
Configure Hardware Ports
ASA 5505 46-49
Configure IMAP dialog box 17-20
Configure POP3 dialog box 17-20
Configure RPC dialog box 17-20
Configure SMTP dialog box 17-19
Config Version Viewer (Preview Configuration) dialog box 8-44
conflict analysis reports
generating 16-33
conflict detection
resolving conflicts 16-33
understanding 16-27
understanding the user interface 16-29
using 16-27
connection
PIX/ASA/FWSM
identity-aware rules 13-21
rules 57-5
Connection Alias dialog box 31-24, 31-33
Connection Profile dialog box
AAA tab 31-12
General tab 31-10
IPSec tab 31-18
Secondary AAA tab 31-16
SSL tab 31-21
connection profiles
configuring 31-6
configuring for Easy VPN 28-13
properties
AAA 31-12
general 31-10
IPSec 31-18
policy overview 31-8
secondary AAA 31-16
SSL 31-21
sharing among multiple ASAs 30-8
Connection Profiles page 31-8
Connection Settings
MPC rule wizard
tab 57-8
connection timeout
device communication settings 11-22
Connection URL dialog box 31-24
connectivity, testing device 9-1
console
Cisco IOS routers
AAA tab 62-44
Accounting tab 62-47
Authentication tab 62-44
Authorization tab 62-45
Console Policy page 62-42
Setup tab 62-42
console port
Cisco IOS routers
defining AAA settings 62-37
defining setup parameters 62-35
Console timeout
PIX/ASA/FWSM 49-1
Constant Bit Rate (CBR) 61-47
contained modules
showing 3-54
content rewrite rules
defining for SSL VPN on ASA 31-51
Context-Based Access Control
choosing interfaces 17-2
configuring 17-5
configuring identity aware 13-21
preventing DoS attacks on IOS devices 17-4
selecting protocols 17-3
understanding 17-1
understanding access rule requirements 17-4
Context Editor dialog box (IOS) 33-15
contexts
see “security contexts” 58-1
continuity check (CC) cells 61-50
control plane (CP)
defining QoS on 65-12
policing on 65-9
Control Plane Policing 65-9
conventions iii-lxiii
cookie challenges 26-35
Copy command 1-30, 12-9
Copy Policies Between Devices command 1-31
Copy Policies wizard 5-33
CPU settings
defining utilization settings 62-25
overview 62-25
CPU Throttling Policy 11-32
CPU utilization
CPU Policy page 62-26
Create a Clone of Device dialog box 3-55
Create Activity dialog box 4-14
Create a Policy dialog box 5-54
Create Discovery Task dialog box 5-18
Create Extranet VPN Topology wizard
overview 25-65
Create Filter dialog box 1-45
Create Group Policy wizard
Clientless and Thin Client Access Modes page 30-22
Full Tunnel page 30-20
Group Policy page 30-19
using 30-19
Create Overrides for Device dialog box 6-20
Create Policy Bundle dialog box 5-57
Create Text Object dialog box 7-32
Create Ticket dialog box 4-14
Create VPN Topology wizard
Device Selection page 25-32
Edit Endpoints dialog box 25-33
Endpoints page 25-33
GET VPN Group Encryption page 25-53
GET VPN Peers page 25-59
High Availability page 25-50
Name and Technology page 25-30
overview 25-28
VPN Defaults page 25-60
credential objects
attributes 28-9
credentials
configuring on firewall devices 48-15
device manager validation 71-21
IPS module 3-19
service module 3-18
testing 9-1
understanding device 3-4
Credentials page
HTTPS port number
overriding with HTTP policy 3-46
Credentials page, device properties 3-44
crypto maps
understanding 26-18
CSC
MPC rule wizard
tab 57-8
CSDM Policy Editor dialog box 32-41
CS-MARS
access to Security Manager 71-44
configuring servers 11-7
discovering or changing controller used by device 71-46
events
historical and real-time lookup 71-48
looking up 71-48
integrating with Security Manager 71-42
integration with Security Manager 71-43
looking up Security Manager policies based on events 71-52
NetFlow 71-54
query
troubleshooting 71-47
registering in Security Manager 71-45
supported log messages 71-53
viewing access rule events 71-49
viewing IPS signature events 71-51
CS-MARS page 11-7
CSMDiagnostics.zip
setting debug options 11-11
CSMDiagnostics.zip file, creating 10-28
CSM Mobile 71-18
settings page 11-9
CSM Monitor widget 71-14
CSM tab, Licensing page 11-55
CSV (comma-separated values) files
supported formats for device inventory 10-9
CSV file
export HPM data as 70-29
Customize Desktop Settings page 11-10
Customized Toolbar command 1-31
Custom Protocol dialog box 17-21
Custom Report List command (Report Manager) 69-9
Cut command 1-30, 12-9
cut-through proxy, configuring 13-24
CX
ASA module
detecting 71-28
CXSC
MPC rule wizard
tab 57-8
D
Dashboard
CSM Mobile settings page 11-9
Dashboard tabs
default view 71-15
re-arranging 71-15
Dashboard widgets for device heath trends 71-2
database
backing up 10-25
backing up and restoring 10-24
generating partial backups for TAC 10-30
restoring 10-27
DCE/RPC policy map objects
creating 17-21
properties 17-28
DCS.properties file
DCS.doSerialAccessForFWSMVCs property 9-17
DCS.FWSM.checkThreshold property 9-16
SSH settings 9-7
warning message expression properties 9-10
DDNS
PIX/ASA/FWSM 52-18
add interface rules 52-19
update methods 52-19
update methods, add/edit 52-20
dead-peer detection (DPD) 26-32
debugging
configuring debug levels 11-11
Debug Options page 11-11
Default Report Settings command (Report Manager) 69-9
defaults, configuring 11-1
Delete Device command 1-29
Delete Map command 1-32
Delete Map dialog box 35-10
Delete Row command 1-30
Denial of Service (DoS)
preventing in SMTP using zone based firewall 21-26
denial of service (DoS)
preventing using unicast reverse path forwarding (RFP) 61-20
Denial of Service (DoS) attacks
configuring inspection settings to mitigate 17-103
preventing on IOS devices using inspection 17-4
denial of service (DoS) attacks
preventing using IKEv2 cookie challenge 26-35
deny
inspection
rules 17-5
Deploy command 1-29
Deploy Job dialog box 8-39
deployment
Add Other Devices dialog box 8-57
Auto Update Server 8-41
Catalyst 6500/7600 devices 8-28
changes not deployed when using schedules 8-55
changing device message severity level to ignore errors 9-10
changing FWSM multiple-context deployment to serial 9-17
Cisco Networking Services configuration engine 8-41
clearing XLATE on 59-1
configuration files, to 8-11
configurations 8-28
creating jobs in Workflow mode 8-35
creating or editing schedules 8-55
Deployment Manager window 8-16
device communication settings 9-4
devices, directly to 8-9
devices, through intermediate server 8-10
Edit Deploy Method dialog box 8-30
Edit Selected Deployment Method dialog box 8-30
error attempting to remove unreferenced object 9-12
errors
OS version mismatches 8-13
generating status report 10-30
handling OS version mismatches 8-13
managing 8-1
methods 8-8
minimum memory errors for ASA 8.3+ 9-11
non-Workflow mode 8-3
optimizing access rules 16-45
out-of-band changes
avoiding 8-46
detecting and analyzing 8-45
understanding 8-12
process overview 8-1
rolling back archived configurations 8-70
rolling back configurations 8-62
rolling back configurations, Catalyst 6500/7600 8-65
rolling back configurations, command conflicts 8-67
rolling back configurations, commands to recover from failover misconfiguration 8-68
rolling back configurations, failover devices 8-64
rolling back configurations, IPS and IOS IPS devices 8-65
rolling back configurations, multiple context mode 8-64
rolling back configuration when deploying to file 8-71
rolling back to last deployed configuration 8-68
setting debug options 11-11
suspending or resuming schedules 8-58
system settings 11-13
task flow
non-Workflow mode 8-3
Workflow mode 8-5
tips for successful jobs 8-27
TMS server 8-42
troubleshooting 9-1, 9-9
ADSL or PVC deployment failures 9-15
AUS problems 9-18
Catalyst interface settings 9-16
Catalyst internal VLANs 9-16
Catalyst switch and modules 9-15
Configuration Engine problems 9-18
Error Writing to Server messages 9-15
HTTP Response Code 500 messages 9-15
layer 2 interfaces 9-14
mixing deployment methods with routers and VPNs 9-13
router interface settings 9-14
routers 9-14
Security Manager cannot contact device 9-12
VPNs with routing processes 9-13
troubleshooting device communication 9-7
troubleshooting router connection failures 2-2
troubleshooting SSL certificate errors 9-4
troubleshooting VRF-aware IPsec on Catalyst 6500/7600 devices 25-17
understanding 8-1
understanding configuration rollback 8-63
using a Cisco Networking Services (CNS) server 8-41
viewing device details 8-26
viewing job summary 8-26
viewing status and history for jobs and schedules 8-26
viewing transcripts 8-61
Warning - Partial VPN Deployment dialog box 8-31
Workflow mode 8-5, 8-34, 8-39
working with 8-25
Deployment—Create or Edit a Job dialog box 8-35
deployment jobs
aborting 8-54
approval 8-7
approving 8-39
creating and editing in non-Workflow mode 8-28
creating and editing in Workflow mode 8-35
Deployment Manager 8-16
discarding 8-40
including devices in 8-8
multiple users 8-8
redeploying 8-52
rejecting 8-39
states
non-Workflow mode 8-4
Workflow mode 8-6
submitting 8-38
viewing history 8-26
Deployment Manager
overview 8-15, 8-16
Deployment Manager window 8-16
Deployment Schedules tab 8-21
Deployment page
PIX/ASA/FWSM Platform
clear xlate 59-1
Deployment Schedules tab 8-21
Deployments command 1-33
Deployment Settings page 11-13
Deployment Status Details dialog box 8-32
Deployment Workflow Commentary dialog boxes 8-20
Deploy Saved Changes dialog box 8-28
DES encryption algorithm
in IKE proposals 26-6
Designated Router
PIX/ASA/FWSM 54-12
Destination Contents dialog box 12-14
Dest Port Map dialog box 41-12
Detect Out of Band Changes command 1-34
device
AAA administration 48-4
firewall types 46-1
viewing inventory status 71-19
Device Access
FWSM
Resources, add/edit 51-3
PIX/ASA/FWSM 49-1
console timeout 49-1
host name 51-1
HTTP configuration 49-4
HTTP page 49-2
ICMP rules 49-4
ICMP rules, add/edit 49-5
Management Access interface 49-6
Secure Shell, add/edit host 49-8
Secure Shell (SSH) 49-7, 49-8
Server Access 52-1
SNMP host access 49-20
SNMP page 49-15
SNMP Trap configuration 49-17
Telnet configuration 49-25
Telnet page 49-24
user accounts 51-7
user accounts, add/edit 51-7
device access policies
defining 62-14
Device Admin
FWSM
Resources 51-3
device administration policies
configuring on firewall devices 48-1
device authentication
adding SSL thumbprints manually 9-4
SSL certificate default configuration 11-22
Device Blacklist dialog box 19-15
device clusters 3-9
device communication
changing device message severity level 9-10
managing settings 9-4
routers without K8/K9 crypto image 9-7
Security Manager cannot contact device after deployment 9-12
troubleshooting failures 9-7
Device Communication page 11-21
device communications
troubleshooting 9-1
device communication settings
connection timeout 11-22
retry count 11-22
socket read timeout 11-22
Device Connectivity Test dialog box 9-3
device credentials
understanding 3-4
Device Credentials page 3-44
Device Delete Validation dialog box 3-57
device groups 3-57, 3-61
adding or removing devices 3-61
creating group types 3-60
deleting groups or types 3-61
understanding 3-58
Device Groups page 3-48, 11-24
device health trends in Dashboard 71-2
Device Information page - Add Device from File 3-31
Device Information page - Configuration File 3-22
Device Information page - Network 3-14
Device Information page- New Device 3-26
device inventory
exporting
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
using command line utility 10-10
importing
device with policies 10-13
importing with policies 10-13
managing 3-1
sharing with PRSM 71-29
testing device connectivity 9-1
understanding 3-1
understanding contents 3-3
understanding device clusters 3-9
understanding generic devices 3-8
working with 3-34
device manager
access rule look up 71-24
ASDM 71-22
access rule look-up 71-25
credentials 71-21
IDM 71-22
PDM 71-22
prerequisites 71-23
SDM 71-23
access rule look-up 71-26
starting from HPM 70-3, 70-26
starting from Security Manager 71-21
troubleshooting 71-23
xdm-launcher.exe 71-23
Device Manager command 1-36
Device Properties
Cluster Information page 3-49
Credentials page 3-44
Device Groups page 3-48
General page 3-40
Policy Object Override pages
general reference 3-50
device properties
changes with policy effects 3-52
changing critical 3-51
image version changes with no policy effects 3-51
understanding 3-6
viewing or changing 3-39
Device Properties command 1-34
Device Properties page
creating object overrides 6-19
deleting overrides 6-21
overview 3-39
device response
to appear as an error message 9-10
devices
adding 3-6
adding configurations to the Configuration Archive 8-58
adding from configuration files 3-20
adding from inventory file 3-29
adding from network 3-12
adding local rules to shared policies 5-45
adding manually 3-25
adding or changing modules 3-39
assigning shared policies 5-44
avoiding out-of-band changes 8-46
changing critical properties 3-51
changing those selected for reports 69-22
cloning or duplicating 3-55
cloning shared policies 5-47
communication requirements 2-1
communication settings and certificates 9-4
configuring ASA licenses 2-11
configuring IOS licenses 2-12
configuring local policies 5-31
copying policies between 5-33
creating policy object overrides 6-19
deleting from inventory 3-56
deleting policy object overrides 6-21
deployment through intermediate server 8-10
deployment to 8-9
detecting out-of-band changes 8-45
discovering or changing CS-MARS controller 71-46
discovering policies 5-12
discovering policies on existing devices 5-15
dynamic IP addresses 3-35
image version changes with no policy effects 3-51
including in deployment jobs or schedules 8-8
including unmanaged or non-Cisco in a VPN 25-11
inheriting policy rules 5-46
maps
adding existing managed 35-16
adding new managed 35-16
displaying devices from Device View 35-16
displaying managed 35-16
removing managed 35-16
showing containment for Catalyst switches, ASA, PIX, IPS devices 35-16
modifying policy assignment 5-49
modifying shared policies 5-48
naming conventions 3-3
overview of monitoring 1-7
policy status icons 5-30
preparing for management 2-1
property changes with policy effects 3-52
redeploying configuration files to 8-52
redeploying configurations to replaced hardware 8-52
renaming policies 5-48
replacing policies 5-44
rolling back configurations 8-68, 8-70, 8-71
selecting in site-to-site VPNs 25-32
selecting multiple 1-44
sharing multiple policies 5-42
sharing with PRSM 71-29
showing contained modules 3-54
system variables 7-7
testing connectivity 9-1
troubleshooting communication 9-7
troubleshooting communication and deployment 9-1
troubleshooting device discovery failures 3-7
unassigning policies 5-36
understanding out-of-band changes 8-12
unsharing policies 5-43
using global search to find specific devices 1-41
what counts as a device 3-3
device selector
filtering 1-44
Device Selector dialog box 1-44
Device Server Assignment dialog box 9-8
device status view
working with 3-62
Device Status View command 1-31
Device view
adding local rules to shared policies 5-45
assigning shared policies 5-44
cloning shared policies 5-47
configuring local policies 5-31
configuring VPN topologies 25-19
copying policies between devices 5-33
inheriting policies 5-46
managing policies 5-30
modifying policy assignments 5-49
modifying shared policies 5-48
overview 1-14
policy banner 5-38
policy shortcut menu 5-40
policy status icons 5-30
renaming policies 5-48
sharing local policies 5-41
sharing multiple policies 5-42
unassigning policies 5-36
understanding basic policy management 5-31
understanding shared policies 5-37
unsharing policies 5-43
device view
understanding 3-1
Device View command 1-31
Device Whitelist dialog box 19-15
DHCP
Cisco IOS routers
defining address pools 62-91
defining policies 62-90
DHCP Database dialog box 62-94
DHCP Policy page 62-92
IP Pool dialog box 62-94
overview 62-87
understanding database agents 62-88
understanding option 82 62-89
understanding relay agents 62-88
understanding secured ARP 62-89
configuring passthrough for IOS devices 23-3
PIX/ASA/FWSM 52-10
add/edit servers 52-12
advanced configuration 52-13
configuring DHCP servers 52-10
server options 52-13
traffic blocked 9-15
DHCP relay
interface-specific 46-35
Option 82 46-35, 52-5
PIX/ASA/FWSM 52-5, 52-7
add/edit agent 52-6
add/edit server 52-7
Trusted Interface (Option 82) 46-35, 52-5
DHCPv6 relay
PIX/ASA/FWSM
add/edit agent 52-9
add/edit server 52-9
diagnostics
setting debug options 11-11
diagnostics file, creating 10-28
dial backup
configuring in Easy VPN 28-2
configuring in VPN 25-39
configuring VPN advanced settings 25-40
Dial Backup Settings dialog box 25-40
dialer interfaces
defining BRI properties 61-29
defining profiles 61-27
Dialer Physical Interface dialog box 61-32
Dialer Policy page 61-30
Dialer Profile dialog box 61-31
on Cisco IOS routers 61-27
Diffie-Hellman groups
in IKE proposals 26-7
Digital Subscriber Line (DSL) 61-33
digital subscriber line-access multiplexer (DSLAM) 61-34
directed broadcasts
enabling 61-20
Disable/enable NAT rules 24-33, 24-46
Discard Activity command 1-35
Discard Activity dialog box 4-22
Discard command 1-30
Discard Deployment Job dialog box 8-20
Discard Ticket command 1-36
Discard Ticket dialog box 4-22
discovering
remote access VPNs 30-12
site-to-site VPNs 25-24
Discover Policies on Device command 1-31
Discover VPN Policies command 1-31
Discover VPN Policies wizard 25-24
discovery
default behavior settings 11-25
generating status report 10-30
invalid certificate error 9-6
overview 1-19
security certificate error 9-4, 9-6
setting debug options 11-11
Discovery Settings page 11-25
Discovery Status dialog box 5-23
discovery task
frequently asked questions 5-27
starting 5-15
viewing status 5-22
disk space, monitoring event data store 68-33
Display Actual Size command 1-32
Distributed Traffic Shaping (DTS) 65-7
DMVPN (Dynamic Multipoint VPN)
advantages of using with GRE 27-11
configuring 27-12
configuring GRE modes 27-12
large scale DMVPNs
configuring 27-16
configuring server load balancing 27-17
overview 27-1, 27-9
spoke-to-spoke connections 27-10
supported platforms 25-9
understanding 27-10
DNS
configuring for inspection rules 17-18
PIX/ASA/FWSM
add/edit server group 52-16
add server 52-17
servers page 52-14
DNS class map objects
creating 17-21
match criteria 17-34
DNS policy map objects
creating 17-21
match conditions and actions 17-34
properties 17-31
DNS servers
configuring for IPS global correlation 36-24
DNS snooping 19-6
dock
report windows 69-29
view windows 68-36
Dock Map View command 1-32
documentation
conventions iii-lxiii
Domain AD Server dialog box 13-10
Domain Name System (DNS)
Cisco IOS routers
defining policies 62-75
DNS Policy page 62-76
IP Host dialog box 62-76
overview 62-74
do not ask warnings, resetting 11-10
drill-down reports 69-26
DSLAM 61-34
duration
VPN user reports 69-16
dynamic access policies
attributes 32-4, 32-7
configuring 32-2
managing 32-1
understanding 32-1
dynamic access policies (DAP) 32-29
Dynamic Access Policy page
Add/Edit Dynamic Access Policy dialog box
Add/Edit DAP Entry dialog box 32-20
Add/Edit DAP Entry dialog box > AAA Attributes Cisco 32-22
Add/Edit DAP Entry dialog box > AAA Attributes LDAP 32-23
Add/Edit DAP Entry dialog box > AAA Attributes RADIUS 32-25
Add/Edit DAP Entry dialog box > Anti-Spyware 32-25
Add/Edit DAP Entry dialog box > Anti-Virus 32-26
Add/Edit DAP Entry dialog box > AnyConnect Identity 32-28
Add/Edit DAP Entry dialog box > Application 32-29
Add/Edit DAP Entry dialog box > File 32-30
Add/Edit DAP Entry dialog box > NAC 32-32
Add/Edit DAP Entry dialog box > Operating System 32-32
Add/Edit DAP Entry dialog box > Personal Firewall 32-33
Add/Edit DAP Entry dialog box > Policy 32-34
Add/Edit DAP Entry dialog box > Process 32-35
Add/Edit DAP Entry dialog box > Registry 32-36
Advanced Expressions tab 32-40
Logical Operations tab 32-37
Main tab 32-13
Dynamic Access Policy page (ASA) 32-11
Cisco Secure Desktop Manager Policy Editor dialog box 32-41
Dynamic Access policy page (ASA) > Add/Edit Dynamic Access Policy dialog box 32-12
Dynamic Blacklist Configuration tab 19-10
dynamic crypto maps 26-18
dynamic filter snooping (DNS)
enabling 17-18
Dynamic Multipoint VPN (DMVPN)
mandatory and optional policies 25-6
dynamic NAT
Cisco IOS routers 24-10
Dynamic Translation Rule
PIX/ASA/FWSM 24-22
add/edit 24-23
dynamic VTI
configuring in Easy VPN 28-12
in remote access VPNs 33-7
understanding use in Easy VPN 28-2
E
Easy VPN
configuration modes 28-3
configuration overview 28-5
configuring client connection characteristics 28-7
configuring dial backup 28-2
configuring dynamic VTI 28-12
configuring high availability 28-2
connection profile policies 28-13
connection profiles (ASA, PIX 7+) 31-8
extended authentication (xauth) 28-4
important configuration notes 28-6
IPsec proposals 28-10
mandatory and optional policies 25-6
overview 28-1
supported platforms 25-9
understanding 28-1
understanding dynamic VTI 28-2
user group policies 28-14
ECMP 22-4
Edit AAA Option dialog box 15-19
Edit AAA Rule dialog box 15-13
Edit AAA Server dialog box 6-33
Edit AAA Server Group dialog box 6-49
Edit Access Rule dialog box 16-14
Edit Actions dialog box 39-12
Edit activity state 4-4
Edit AOL Class Map dialog box 17-27, 21-19
Edit A Port Forwarding Entry dialog box 34-41
Edit ASA Group Policies dialog box
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
overview 34-1
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
Edit A Smart Tunnel Entry dialog box 34-66, 34-69
Edit AS Path Entry dialog box 55-144
Edit AS Path Object dialog box 55-143
Edit Auto Signon Rules dialog box 34-26
Edit Auto Update Settings dialog box 11-52
Edit Category dialog box 12-14
Edit Cisco Secure Desktop Configuration dialog box 34-34
Edit Client Access Rules dialog box 34-12
Edit Client Update dialog box 34-80
Edit Column dialog box 34-60
Edit Community List Entry dialog box 55-146
Edit Community List Object dialog box 55-145
Edit Custom Pane dialog box 34-60
Edit DCE/RPC Map dialog box 17-28
Edit Deploy Method dialog box 8-30
Edit Description dialog box 12-14
Edit Destinations dialog box 12-11
Edit Device Groups command 1-30
Edit Device Groups dialog box 3-59
Edit DNS Class Map dialog box 17-27
Edit DNS Map dialog box
Filtering tab 17-33
overview 17-31
Protocol Conformance tab 17-32
Edit eDonkey Class Map dialog box 17-27, 21-19
Edit Endpoints dialog box
FWSM tab 25-46
overview 25-33
Protected Networks tab 25-45
VPN Interface tab 25-35, 25-49
VPNSM/VPN SPA/VSPA settings, VPN Interface tab 25-41
VRF Aware IPsec tab 25-47
Edit ESMTP Map dialog box 17-37
Edit Extended Access Control Entry dialog box 6-60
Edit Extended Access List dialog box 6-58
Edit External Filter dialog box 21-41
Edit Extranet VPN dialog box
overview 25-65
Edit FastTrack Class Map dialog box 17-27, 21-19
Edit Fidelity dialog box 39-13
Edit File Object dialog box 34-36
Edit FlexConfig dialog box 7-30
Edit FTP Class Map dialog box 17-27
Edit FTP Map dialog box 17-40
Edit Gnutella Class Map dialog box 17-27, 21-19
Edit Group Member dialog box 29-21
Edit GTP Map dialog box 17-43
Edit H.323 Class Map dialog box 17-27, 21-19
Edit H.323 Map dialog box 17-48, 21-34
Edit HSI Endpoint IP Address dialog box 17-51
Edit HSI Group dialog box 17-50
Edit HTTP Class Map dialog box 17-27, 21-19
Edit HTTP Map dialog box 21-34
ASA 7.1.x, PIX 7.1.x, FWSM 3.x, IOS devices
Entity Length tab 17-55
Extension Request Method tab 17-58
General tab 17-54
overview 17-53
Port Misuse tab 17-59
RFC Request Method tab 17-57
Transfer Encoding tab 17-60
ASA 7.2+ and PIX 7.2+ devices 17-61
Edit ICQ Class Map dialog box 17-27, 21-19
Edit IKEv1 Proposal dialog box 26-10
Edit IKEv2 Proposal dialog box 26-13
Edit IMAP Class Map dialog box 17-27, 21-19
Edit IMAP Map dialog box 21-34
Edit IM Class Map dialog box 17-27
Edit IM Map dialog box 21-34
ASA and PIX device 17-67
IOS device 17-70
Edit Inspect/Application FW Rule wizard
Address and Port page 17-12
Inspected Protocol page 17-16
Match Traffic page 17-10
Edit Inspect Parameter Map dialog box 21-31
Edit Interfaces dialog box 12-13
Edit IP Options Map dialog box 17-71
Edit IPsec Pass Through Map dialog box 17-77
Edit IPSec Transform Set dialog box 26-25
Edit IPv4 Pool Object dialog box 6-87
Edit IPv6 Map dialog box 17-74, 17-88
Edit IPv6 Pool Object dialog box 6-88
Edit Kazaa2 Class Map dialog box 17-27, 21-19
Edit Key Server dialog box 29-19
Edit Language dialog box 34-55
Edit LDAP Attribute Map dialog box 6-45
Edit LDAP Attribute Map Value dialog box 6-46
Edit Load Balancing Parameters dialog box 27-17
Edit Local Web Filter Class Map dialog box 17-27, 21-19
Edit Local Web Filter Parameter Map dialog box 21-38
Edit MAC Address Pool Object dialog box 6-89
Edit Map Value dialog box 6-47
Edit Match Condition and Action dialog box
DNS policy maps 17-34
ESMTP policy maps 17-38
FTP policy maps 17-41
GTP policy maps 17-46
H.323 (IOS) policy maps 21-35
H.323 policy maps 17-51
HTTP (Zone Based IOS) policy maps 21-35
HTTP policy maps 17-62
IM (Zone Based IOS) policy maps 21-35
IMAP policy maps 21-35
IM policy maps 17-68
IPv6 policy maps 17-75, 17-89
P2P policy maps 21-35
POP3 policy maps 21-35
SIP (IOS) policy maps 21-35
SIP policy maps 17-82, 17-92
Skinny policy maps 17-86
SMTP policy maps 21-35
Sun RPC policy maps 21-35
Web Filter policy maps 21-35
Edit Match Criterion dialog box
AOL class maps 21-21
DNS class maps 17-34
eDonkey class maps 21-21
FastTrack class maps 21-21
FTP class maps 17-41
Gnutella class maps 21-21
H.323 (IOS) class maps 21-22
H.323 class maps 17-51
HTTP (IOS) class maps 21-22
HTTP class maps 17-62
ICQ class maps 21-21
IMAP class maps 21-24
IM class maps 17-68
Kazaa2 class maps 21-21
Local Web Filter class maps 21-29
MSN Messenger class maps 21-21
N2H2 class maps 21-30
POP3 class maps 21-24
SIP (IOS) class maps 21-25
SIP class maps 17-82, 17-92
SMTP class maps 21-26
Sun RPC class maps 21-29
Websense class maps 21-30
Windows Messenger class maps 21-21
Yahoo Messenger class maps 21-21
Edit menu
Configuration Manager 1-30
Edit MSN Messenger Class Map dialog box 17-27, 21-19
Edit N2H2 Parameter Map dialog box 21-39
Edit N2H2 Web Filter Class Map dialog box 17-27, 21-19
Edit NAT Rule dialog box
ASA 8.3+ 24-36
Edit NetBIOS Map dialog box 17-78
Edit Network/Host dialog box
General tab 6-81
NAT tab 24-42
Edit Options dialog box 16-17
Edit P2P Map dialog box 21-34
Edit Permit Response dialog box 17-45
Edit Per-Session NAT Rule dialog box 24-47
Edit PIX/ASA/FWSM Web Filter Rule dialog box 18-5
Edit PKI Enrollment dialog box
CA Information tab 26-57
Certificate Subject Name tab 26-63
Enrollment Parameters tab 26-61
overview 26-55
Trusted CA Hierarchy tab 26-64
Edit Policy Assignments command 1-31
Edit Policy List Object dialog box 55-135
Edit POP3 Class Map dialog box 17-27, 21-19
Edit Port Forwarding List dialog box 34-39
Edit Port List dialog box 6-94
Edit Prefix List Entry dialog box 55-140, 55-142
Edit Prefix List Object dialog box 55-138, 55-140
Edit Protocol Info Parameter Map dialog box 21-33
Edit Regular Expression dialog box 17-100
Edit Regular Expression Group dialog box 17-100
Edit Route Map Entry dialog box 55-129
Edit Route Map Object dialog box 55-128
Edit Row command 1-30
Edit Rule Section dialog box 12-22
Edit Security Association Dialog Box 25-57
Edit Selected Deployment Method dialog box 8-30
Edit Server dialog box
Protocol Info Parameter maps 21-34
Edit Server Group dialog box 15-19
Edit Service dialog box 6-95
Edit Services dialog box 12-13
Edit Signature dialog box 39-15
Edit Signature Parameter—Component List dialog box 39-29
Edit Signature Parameters dialog box 39-24
Edit Single Sign On Server dialog boxes 34-41
Edit SIP Class Map dialog box 17-27, 21-19
Edit SIP Map dialog box 17-80, 17-90, 17-98, 21-34
Edit Skinny Map dialog boxes 17-84
Edit SLA Monitor dialog box 51-10
Edit Smart Tunnel Auto Signon Entry dialog box 34-71
Edit Smart Tunnel Auto Signon Lists dialog box 34-70
Edit Smart Tunnel Lists dialog box 34-65, 34-68
Edit SMTP Class Map dialog box 17-27, 21-19
Edit SMTP Map dialog box 21-34
Edit SNMP Map dialog box 17-87
Edit Sources dialog box 12-11
Edit SSL VPN Customization dialog box 34-50
Applications 34-59
Copyright Panel 34-57
Custom Panes 34-59
Full Customization 34-58
Home Page 34-61
Informational Panel 34-56
Language 34-53
Logon Form 34-55
Logout Page 34-62
Title Panel 34-52
Toolbar 34-58
Edit SSL VPN Gateway dialog box 34-63
Edit Standard Access Control Entry dialog box 6-63
Edit Standard Access List dialog box 6-58
Edit Sun RPC Class Map dialog box 17-27, 21-19
Edit Sun RPC Map dialog box 21-34
Edit TCP Map dialog box 57-21
Edit TCP Option Range Dialog Box 57-23
Edit Text Object dialog box 7-32
Edit Time Range dialog box 6-70
Edit Traffic Flow dialog box 57-17
Edit Translated Address dialog box 24-29
Edit Transparent EtherType dialog box 23-6
Edit Transparent Firewall Rule dialog box 23-5
Edit Transparent Mask dialog box 23-7
Edit Trend Content Filter Class Map dialog box 17-27, 21-19
Edit Trend Parameter Map dialog box 21-42
Edit Unified Access Control Entry dialog box 6-66
Edit Update Server Settings dialog box 11-49
Edit URL Domain Name dialog box 21-45
Edit URLF Glob Parameter Map dialog box 21-45
Edit URL Filter Parameter Map dialog box 21-43
Edit User Credentials dialog box 36-19
Edit User dialog box 12-12
Edit User Group dialog box
Advanced PIX 6.3 settings 34-81
Browser Proxy settings 34-86
Client (IOS) settings 34-77
Clientless settings 34-82
Client VPN Software Update (IOS) settings 34-80
DNS/WINS settings 34-76
General settings 34-74
IOS Xauth Options settings 34-79
overview 34-72
Split Tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN Connection settings 34-87
SSL VPN Full Tunnel settings 34-83
SSL VPN Split Tunneling settings 34-85
Technology settings 34-72
Thin Client settings 34-83
Edit VDI Server dialog box 34-16
Edit Virtual Sensor dialog box 38-7, 38-8
Edit VPN dialog box
Device Selection tab 25-32
Edit Endpoints dialog box 25-33
Endpoints tab 25-33
High Availability tab 25-50
Name and Technology tab 25-30
overview 25-28
Edit Web Access Control Entry dialog box 6-64
Edit Web Filter Map dialog box 21-47
Edit Web Filter Options dialog box 18-9
Edit Web Filter Type dialog box 18-8
Edit Websense Parameter Map dialog box 21-39
Edit Websense Web Filter Class Map dialog box 17-27, 21-19
Edit Web Type Access List dialog box 6-58
Edit Windows Messenger Class Map dialog box 17-27, 21-19
Edit WINS Server dialog box 34-89
Edit WINS Server List dialog box 34-88
Edit Yahoo Messenger Class Map dialog box 17-27, 21-19
Edit Zones dialog box 12-13
eDonkey class map objects
creating 21-16
match criteria 21-21
EIGRP routing
defining interface properties 66-10
defining routes 66-9
EIGRP Routing Policy page 66-13
Interface dialog box 66-16
Interfaces tab 66-15
on Cisco IOS routers 66-8
PIX/ASA/FWSM
advanced settings 55-34
Filter Rule configuration 55-40
Filter Rules tab 55-39
Interface configuration 55-48
Interfaces tab 55-47
neighbor configuration 55-42
Neighbors tab 55-41
policy 55-32
redistribution configuration 55-44
Redistribution tab 55-42
Setup tab 55-36
Summary Address configuration 55-46
Summary Address tab 55-45
redistributing routes 66-12
Redistribution Mapping dialog box 66-18
Redistribution tab 66-17
Setup dialog box 66-14
Setup tab 66-13
e-mail
blocking spam using zone-based firewall rules 21-26
preventing DoS attacks 21-26
e-mail notifications
configuring SMTP server 1-26
PIX/ASA/FWSM
recipient set-up 53-8
syslog messages 53-8
embedded event manager
add/edit action configuration 53-7
add/edit applet 53-4
add/edit syslog configuration 53-6
ASA 53-3
Enable/disable NAT rules 24-33, 24-46
Enable PIM and IGMP
PIX/ASA/FWSM 54-1
Encapsulating Security Protocol (ESP) encryption algorithm 26-28
encoding rules
defining for SSL VPN (ASA) 31-53
encryption algorithms
3DES (Triple DES) 26-6
AES (Advanced Encryption Standard) 26-6
DES (Data Encryption Standard) 26-6
in IKE proposals 26-6
endpoints and protected networks
configuring dial backup 25-39
defining in GET VPN topologies 25-59
defining in VPN topologies 25-33
VPN Interface tab 25-35, 25-49
equal-cost multi-path 22-4
Error Writing to Server deployment errors 9-15
ESMTP
configuring for inspection rules 17-19
ESMTP policy map objects
creating 17-21
match conditions and actions 17-38
properties 17-37
EtherChannel
Create and Edit IDSM EtherChannel VLANs dialog boxes 67-49
defining IDSM VLANs 67-44
deleting IDSM VLANs 67-45
EtherChannels
ASA 46-9
edit assigned interface 46-11
LACP 46-11
load balancing 46-13
evaluation license
upgrading to permanent license 10-16
event
lists 53-9
add/edit 53-10
syslog class
add/edit 53-11
syslog message ID
add/edit 53-11
Event Action Filters page 40-7
Event Action Overrides page 40-13
event actions, IPS
configuring filter rules 40-4
configuring network information 40-17
configuring OS maps 40-21
configuring overrides 40-13
configuring settings 40-23
configuring target value ratings 40-17
example filter rule 68-64
filter rule attributes 40-9
filter rules policy 40-7
filter rules tips 40-6
overview 40-1
possible actions 40-2
process overview 40-1
Event Management page 11-27, 11-33
CPU Throttling Policy dialog box 11-32
event manager applet 53-3
Event Manager service
configuring 68-29
managing 68-29
monitoring event store disk space 68-33
monitoring status 68-30
selecting devices to monitor 68-32
starting and stopping 68-29
status icon colors 68-30
events
archiving (backing up) the event data store 68-34
configuring firewall devices (ASA, FWSM) 68-27
configuring IPS devices 68-28
copying 68-51
CS-MARS 71-53
looking up 71-48
looking up policies based on related events 71-52
Netflow support for policy lookup 71-54
viewing access rule events 71-49
viewing IPS signature events 71-51
ensuring time synchronization 68-26
Event Viewer
clearing filters 68-46
context menu 68-47
cross-launching from HPM 68-56
filtering by column 68-43
filtering by events 68-45
filtering overview 68-41
looking up 68-53
looking up policies based on related events 68-52
refreshing event table 68-42
selecting time range 68-41
text searches (quick filter) 68-45
using time slider with filtering 68-42
viewing access rule events 68-54
viewing IPS signature events 68-55
examining details 68-51
examples of analysis
mitigating botnet activity 68-62
monitoring and mitigating botnet activity 68-59
monitoring botnet activity using ASDM 68-62
monitoring botnet activity using Event Viewer 68-60
monitoring botnet activity using Report Manager 68-61
monitoring identity-aware firewall policies 13-27
monitoring TrustSec policies 14-17
overview 68-56
removing false positive IPS events 68-64
understanding botnet syslog events 68-59
user access to server blocked 68-57
performing operations on 68-47
properties 68-17
recovering the event data store 68-34
saving to a file 68-51
understanding Event Viewer access control 68-4
viewing 68-1
Event Viewer
archiving (backing up) the event data store 68-34
arranging views 68-36
ASA devices, configuring to provide events 68-27
columns 68-17
configuring color rules 68-38
configuring Event Manager service 68-29
copying events 68-51
creating custom views 68-39
cross-launching from HPM 68-56
deleting custom views 68-41
editing view name and description 68-39
ensuring time synchronization 68-26
Event Monitoring window 68-13
events
context menu 68-47
historical and real-time lookup 68-53
looking up 68-53
event table
customizing appearance 68-37
event details pane 68-25
refreshing 68-42
time slider 68-24
toolbar 68-15
examining event details 68-51
examples of analysis
mitigating botnet activity 68-62
monitoring and mitigating botnet activity 68-59
monitoring botnet activity 68-60
monitoring identity-aware firewall policies 13-27
monitoring TrustSec policies 14-17
overview 68-56
removing false positive IPS events 68-64
understanding botnet syslog events 68-59
user access to server blocked 68-57
features
historical views 68-2
overview 68-1
policy navigation 68-3
real-time views 68-2
views and filters 68-3
File menu reference 68-9
filters
advantages of using network/host objects 68-65
clearing 68-46
column based 68-43
event based 68-45
overview 68-41
submission requirements for policy objects 68-65
text searches (quick filter) 68-45
time range 68-41
time slider 68-42
floating views 68-36
FWSM devices, configuring to provide events 68-27
IPS devices, configuring to provide events 68-28
limits of 68-4
looking up Security Manager policies based on events 68-52
managing service 68-29
monitoring event store disk space 68-33
monitoring status 68-30
opening views 68-36
overview 68-7
performing operations on 68-47
preparation for use 68-26
recovering the event data store 68-34
saving events 68-51
saving views 68-40
selecting devices to monitor 68-32
settings 11-27, 11-33
starting or stopping the Event Manager service 68-29
status icon colors 68-30
switching between IP addresses and host object names 68-37
switching between real-time and historical views 68-40
syslogs 68-6
troubleshooting
Event Viewer Unavailable message 11-27, 11-35, 68-29
policy objects not available for filtering 68-65
understanding access control 68-4
using 68-35
using views 68-35
viewing access rule events 68-54
viewing IPS signature events 68-55
view list 68-11
View menu reference 68-9
Event Viewer command 1-37
exclusive domains
configuring for IOS devices 18-10
Exit command 1-30
Exit command (Report Manager) 69-8
exiting
Cisco Security Management Suite server 1-11
CiscoWorks Common Services 1-11
Security Manager 1-10, 1-11
expiration dates
configuring for access rules 16-21
export
device inventory
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
HPM data 70-29
IPS event action overrides 40-13
IPS event filter rules 40-4, 40-7
policy objects 6-23
reports 69-28
shared policies 10-12
Export Devices or Policies commands 1-29
Export Inventory dialog box 10-6
Export Map command 1-32
External Product Interface dialog box 36-27
External Product Interface policy 36-26
F
factory-default configurations 46-2
failover
Active/Active
command replication 50-4
configuration synchronization 50-3
add new context to group 2 50-7
configuring in site-to-site VPN 25-50
edit bridge group 50-16
FWSM 50-12
advanced settings 50-15
PIX/ASA 50-17
Add Failover Group 50-24
settings 50-20
PIX/ASA/FWSM 50-10
active/active 50-2, 50-3
active/standby 50-2
bootstrap configuration 50-26
configuration basics 50-5
configuring 50-1
interface configuration 50-23
interface MAC address 50-22
security context 50-25
stateful 50-3, 50-4
stateless 50-3
types of 50-2
understanding 50-1
PIX 6.3 50-10
interface configuration 50-11
stateful in site-to-site VPN 25-52
false negatives
definition of 39-23
false positives
definition of 39-23
FastTrack class map objects
creating 21-16
match criteria 21-21
feature sets 1-4
File menu
Configuration Manager 1-29
Event Viewer 68-9
Report Manager 69-8
file objects
attributes 34-36
selecting 34-38
files
deploying to 8-11
selecting or specifying 1-49
Filter Item dialog box 40-9
filter rules, event action (IPS)
attributes 40-9
configuring 40-4
example rule 68-64
exporting 40-4
policy 40-7
tips 40-6
filters
Event Viewer
clearing 68-46
column based 68-43
context menu 68-47
event based 68-45
overview 68-41
refreshing event list 68-42
selecting time range 68-41
text searches (quick filter) 68-45
using time slider 68-42
filtering selectors 1-44
filtering tables 1-47
HPM
column based 70-17
custom 70-17
filters (Event Viewer)
advantages of using network/host objects 68-65
overview 68-3
submission requirements for policy objects 68-65
Find and Replace dialog box 12-17
find and replace in rules policies 12-16
Find Map Node command 1-32
Find Node dialog box 35-12
FirePOWER
ASA module
detecting 71-28
FireSIGHT Management Center
starting from Security Manager 71-27
FireSIGHT Management Center command 1-36
Firewall
AAA IOS Timeout Values 15-30
firewall
AAA firewall
advanced settings 15-20
configuring 15-6
MAC exempt lists 15-26
AAA firewall policy
advanced settings 15-20
configuring 15-6
AAA page 15-28
AAA rules
configuring AAA firewall settings 15-6
configuring AuthProxy settings 15-9
configuring cut-through proxy (ASA) 13-24
configuring for ASA/PIX/FWSM devices 15-4
configuring for IOS devices 15-7
configuring identity aware 13-21
configuring security group aware 14-17
managing 15-1
properties 15-13
understanding 15-1
understanding how users authenticate 15-2
Access Control page 16-23
access controls
per user downloadable ACLs 16-26
access control settings
configuring settings 16-22
access rule
event analysis example, user access blocked 68-57
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
viewing related CS-MARS events 71-49
viewing related events 68-54
access rules
address requirements 16-5
configuring 16-7
configuring expiration dates 16-21
configuring identity aware 13-21
configuring security group aware 14-17
how deployed 16-5
import examples 16-43
importing 16-39
IPS blocking, affect of 43-4
managing 16-1
optimizing during deployment 16-45
sharing ACLs among interfaces 11-18
understanding 16-1
understanding device-specific behavior 16-4
understanding global 16-3
understanding requirements when using inspection 17-4
ACL naming conventions 12-5
adding rules 12-9
analysis reports 16-33
AuthProxy
configuring 15-9
AuthProxy settings policy
configuring 15-9
botnet traffic filter rules 19-9
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring policies in Map view 35-23
configuring settings 18-15
configuring settings policies in Map view 35-23
conflict detection 16-27
converting IPv4 rules 12-28
deleting rules 12-9
device types 46-1
disabling rules 12-20
editing rules 12-10
enabling rules 12-20
finding and replacing items in rules policies 12-16
Firewall ACL Setting dialog box 16-25
identity-aware policies
collecting user statistics 13-25
configuring 13-7
configuring cut-through proxy 13-24
configuring identity options 13-15
configuring rules 13-21
configuring the ASA 13-7, 14-8
enabling 13-8
filtering VPN traffic 13-26
identifying AD servers and agents 11-36, 13-8
managing 13-1
monitoring 13-27
overview 13-1
requirements 13-3
user identity acquisition 13-2
Inspection page 17-103
inspection rules
add/edit rule wizard 17-10, 17-12, 17-16
choosing interfaces 17-2
configuring 17-5
configuring identity aware 13-21
configuring security group aware 14-17
managing 17-1
preventing DoS attacks on IOS devices 17-4
selecting protocols 17-3, 17-16
understanding 17-1
understanding access rule requirements 17-4
inspection settings
configuring for IOS devices 17-103
introduction 12-1
IPv6 access rules
configuring expiration dates 16-21
sharing ACLs among interfaces 11-18
understanding global 16-3
MAC exempt lists, AAA firewall 15-26
managing rules tables 12-7
moving rules 12-19
object groups
expanding during discovery 12-35
optimizing network object groups during deployment 12-35
overview 12-1
per user downloadable ACLs 16-26
policy discovery 5-13
policy query
example report 12-34
generating reports 12-28
interpreting results 12-32
preserving ACL names 12-4
reference information for AAA rules 15-20
resolving access rule conflicts 16-33
resolving ACL naming conflicts 12-6
rule table sections 12-20
security group aware policies
configuring ISE settings 11-54
configuring rules 14-17
security group-aware policies
configuring 14-7
managing 14-1
system variables 7-9
transparent rules
adding or editing a rule 23-5
configuring 23-1
configuring passthrough for IOS devices 23-3
editing the EtherType 23-6
editing the mask 23-7
managing 23-1
Transparent Rules page 23-3
TrustSec firewall policies
configuring 14-7
managing 14-1
overview 14-1
TrustSec policies
monitoring 14-17
understanding NAT effects 12-3
understanding rule order 12-19
understanding rule processing order 12-2
using rules tables 12-7
Web Filter page 18-16
web filter rules
configuring for ASA, PIX, FWSM devices 18-2
configuring for IOS devices 18-10
managing 18-1
understanding 18-1
zone-based firewall
add/edit zones 21-53
advanced options 21-67
configuring PAM 21-69
configuring rules 21-13, 21-62
configuring settings 21-49
Content Filter tab 21-52
designing network zones 21-1
development overview 21-12
Global Parameters tab 21-50
page 21-50
protocol selection 21-68
rules table 21-58
tabs 21-49
VPN tab 21-50
WAAS tab 21-50
Zones tab 21-50
zone-based firewalls
changing the default drop rule 21-48
general recommendations 21-12
IPSec VPN 21-6
logging 21-1
overview 21-1
restrictions 21-3
Self zone 21-5
troubleshooting 21-54
understanding 21-3
understanding permit/deny and action 21-8
understanding services and protocols 21-11
VRF 21-7
Firewall AAA IOS Timeout Value Setting dialog box 15-30
Firewall AAA MAC Exempt Setting dialog box 15-27
Firewall ACL Setting dialog box 16-25
Firewall Device dialog box 43-14
Firewall Services Module
see FWSM 47-1
Fit to Window command 1-32
FlexConfig objects
adding to policies 7-35
ASA samples 7-20
Catalyst 6500/7600 samples 7-22
changing order in policies 7-35
changing variable values 7-35
Cisco IOS Software samples 7-22
CLI commands 7-2
configuring 7-25
configuring AAA for administrative introducers 62-84
creating 7-28
creating text objects 7-32
deleting variables 7-28
PIX firewall samples 7-23
previewing CLI 7-35
properties 7-30
property selector 7-34
removing from policies 7-35
router samples 7-24
samples 7-19
scripting language
example of looping 7-3
example of looping with if/else statements 7-4
example of two-dimensional looping 7-3
understanding 7-3
system variables
device 7-7
firewalls 7-9
remote access VPN 7-19
router 7-13
understanding 7-7
VPN 7-14
undefined variables 7-33
understanding 7-2
variables 7-5
variables, example 7-6
FlexConfig policies
adding objects 7-35
changing object order 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
editing 7-35
previewing CLI 7-35
removing objects 7-35
understanding 7-2
FlexConfig Policy page 7-36
FlexConfig Preview dialog box 7-38
FlexConfigs
creating (scenario) 7-25
managing 7-1
troubleshooting 7-38
FlexConfig Undefined Variables dialog box 7-33
float
report windows 69-29
view windows 68-36
floodguard 56-2
FQDN objects
creating 6-80
understanding 6-78
fragmentation
configuring settings in VPNs 26-30, 26-42
fragments settings 56-2
frequently asked questions
policy discovery 5-27
FTP class map objects
creating 17-21
match criteria 17-41
FTP policy map objects
creating 17-21
match conditions and actions 17-41
properties 17-40
full mesh topologies
description 25-4
partial mesh 25-5
full tunnel client access mode 30-5
FWSM
AAA support 6-28
about 46-1
adding SSL thumbprints manually 9-4
adding when using multiple-context mode 3-7
adding when using non-default HTTPS (SSL) port 3-7
Asymmetric Routing Groups 46-5
Bridge Groups
add/edit 46-51
bridge groups 47-3
changing deployment method to serial for multiple-context mode 9-17
configuring for event management 68-27
configuring FWSM endpoints in site-to-site VPNs 25-46
configuring transparent firewall rules 23-1
credentials 3-18
deleting security contexts 58-7
deployment failures after changing interface policies 9-16
deployment failures in multiple-context mode 9-16
deployment failures with large ACLs 9-16
Device Access
managing Resources 51-2
Resources 51-3
Resources, add/edit 51-3
discovering failover modules 3-7
Event Viewer support 68-4
Failover 50-12
advanced settings 50-15
edit bridge group 50-16
including in deployment jobs 8-27
interfaces
add/edit 46-26
configuring 46-3
General tab 46-27
IPv6 46-39, 46-56
IPv6, add/edit 46-43
IPv6, add/edit prefixes 46-44
managing 46-21
packet capture, using 71-36
PDM 71-22
policy discovery 5-13
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-64
rollback restrictions for multiple context mode 8-64
security contexts
configuration 58-8
selecting policy types to manage 5-11
setting up SSL (HTTPS) 2-3
SSL certificate configuration 11-22
TCP State Bypass 57-3
troubleshooting deployment 9-15
G
General
PIX/ASA/FWSM
security policies 56-1
General Configuration tab, SNMP policy for IPS 36-10
General page, device properties 3-40
General tab, IPS blocking policy 43-10
General tab (Translation Rules)
PIX/ASA/FWSM 24-31
generic routers 3-8
GET VPN
anti-replay, time based 29-11
configuring 29-12
configuring global ISAKMP and IPsec settings 29-16
configuring group members 29-20
cooperative key servers 29-7
defining group encryption 25-53
generating, synchronizing RSA keys 29-13
group members
adding 29-19
editing 29-21
IKE proposal 29-15
key servers
adding 29-19
editing 29-19
mandatory and optional policies 25-6
migrating to 29-23
overview 29-1
receive-only SAs 29-23
registration
choosing the rekey transport mechanism 29-6
configuring fail-close mode 29-8
registration process 29-4
SAs
passive SA mode 29-23
receive-only mode 29-23
security policy 29-10
supported platforms 25-9
troubleshooting 29-25
understanding 29-2
GET VPNs
group encryption policies
certificate authorization 25-56
security associations 25-57
global correlation
configuring 42-1
configuring DNS servers 36-24
configuring HTTP proxy server 36-24
configuring inspection and reputation 42-5
configuring network participation 42-7
configuring with Botnet Traffic Filtering 42-1
data collected 42-3
requirements and limitations 42-4
understanding 42-1
understanding network participation 42-3
understanding reputation 42-2
Global Search
using 1-41
Global Search command 1-30
global settings
remote access VPN
configuring 26-29
Gnutella class map objects
creating 21-16
match criteria 21-21
GRE (generic routing encapsulation) VPN
advantages of IPsec tunneling with GRE 27-3
configuring 27-5
configuring GRE modes 27-6
dynamically addressed spokes 27-5
implementation 27-3
overview 27-1, 27-2
prerequisites for successful configuration 27-3
supported platforms 25-9
understanding 27-2
GRE Dynamic IP
mandatory and optional policies 25-6
GRE Modes Page
DMVPN properties 27-12
GRE or GRE Dynamic IP properties 27-6
overview 27-1
Group Domain of Interpretation (GDOI) protocol 29-3
group encryption
defining in GET VPN topologies 25-53
Group Encryption Policy page (GET VPN) 25-53
group members
adding 29-19
communication flow 29-2
configuring fail-close mode 29-8
editing 29-21
GET VPN
registration process 29-4
security policy ACLs 29-10
group members (GET VPN)
configuring 29-20
Group Members page (GET VPN) 29-20
group policies
configuring 31-25
creating 31-27
understanding 31-26
VPNs
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
Group Policies page 31-25
groups
adding or removing devices 3-61
creating 3-61
deleting 3-61
understanding 3-58
working with 3-57
group types
creating 3-60
deleting 3-61
GTP map objects
Add Country Network Codes dialog box 17-45
Edit Country Network Codes dialog box 17-45
GTP Map Timeouts dialog box 17-46
GTP policy map objects
creating 17-21
match conditions and actions 17-46
properties 17-43
H
H.323 class map objects
IOS
creating 21-16
match criteria 21-22
match criteria 17-51
H.323 policy map objects
ASA/PIX/FWSM
creating 17-21
properties 17-48
IOS
creating 21-16
match conditions and actions 21-35
match conditions and actions 17-51
hash algorithms
in IKE proposals 26-6
MD5 26-7
SHA 26-6
Health & Performance Monitor command 1-37
Health and Performance Monitor
see HPM 70-1
viewing related events in Event Viewer 68-56
Health and Performance Monitor in Dashboard 71-2
help
accessing 1-51
Help About This Page command 1-37
helper addresses 61-14
Help menu
Configuration Manager 1-37
Help Topics command 1-37
Hide Navigation Window command 1-32
high availability (HA groups)
configuring in Easy VPN 28-2
configuring in site-to-site VPN 25-50
stateful/stateless failover 25-52
high availability policies
configuring in remote access VPNs 33-11
Histogram dialog box 41-13
histograms
configuring anomaly detection 41-11
understanding anomaly detection 41-9
Hit Count Details
example 16-37
Hit Count Details page 16-35
Hit Count Selection Summary Dialog Box 16-20
Hostname
PIX/ASA/FWSM 51-1
hostnames
Cisco IOS routers
defining 62-77
Hostname Policy page 62-78
overview 62-77
HPM
access control 70-3
Alerts
firewall 70-35
IPS 70-33
VPN 70-36
VPN, SNMP configuration 70-37
alerts 70-30
acknowledging 70-39
clearing 70-39
configuring 70-32
history 70-40
viewing 70-38
application window 70-6
Alerts display 70-30
Monitoring display 70-24
columns
Alert table 70-16
Device-related 70-8
showing/hiding 70-8
sorting 70-8
VPN-related 70-12
configuring for 70-4
custom views 70-23
device
monitoring 70-20
monitoring multiple contexts 70-3
priority monitoring 70-30
views 70-21
Device Manager
launching 70-3, 70-26
device manager
cross-launch 70-30
devices
managing 70-5
email notifications
configuring 70-32
export data 70-29
filters
column based 70-17
introduction 70-1
launching 70-4
List Filter 70-19
monitoring
device details 70-27
device status list 70-26
RA and S2S views 70-28
Summary 70-26
VPN details 70-27
VPN Summary list 70-26
overview 70-1
read time-out 2-3, 70-4
Remote Access
log-off user 70-28
settings page 11-35
tables
showing/hiding columns 70-8
sorting columns 70-8
trending 70-2
viewing related events in Event Viewer 68-56
views
closing 70-22
custom 70-23
docking 70-23
floating 70-23
list 70-21
opening 70-22
tiling 70-22
HTML file
export HPM data as 70-29
HTTP
Cisco IOS routers
AAA tab 62-32
Command Authorization Override dialog box 62-34
defining policies 62-29
HTTP Policy page 62-31
overview 62-28
Setup tab 62-31
PIX/ASA/FWSM 49-2
configuration 49-4
HTTP (ASA, PIX) class map objects
creating 17-21
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy map objects
creating 17-21
properties 17-53
HTTP (ASA7.2+/PIX7.2+) policy map objects
creating 17-21
properties 17-61
HTTP (IOS) class map objects
creating 21-16
creating for zone-based firewall content filtering 21-36
match criteria 21-22
HTTP (Zone Based IOS) policy map objects
creating 21-16, 21-36
match conditions and actions 21-35
HTTP class map objects
match criteria 17-62
HTTP-FORM
settings in AAA server objects 6-44
HTTP policy
overriding HTTPS port number 3-46
sharing
HTTPS port number 3-46
HTTP policy map objects
match conditions and actions 17-62
HTTP proxy server
configuring for IPS global correlation 36-24
HTTP Response Code 500 deployment errors 9-15
HTTPS
setting up 2-3
troubleshooting certificate errors 9-4
hub-and-spoke topology
description 25-2
joined hub-and-spoke topology 25-5
tiered hub-and-spoke topologies 25-5
I
ICMP rules
PIX/ASA/FWSM 49-4
add/edit 49-5
ICMP settings
configuring on IOS routers 61-18
icons
Configuration Manager toolbar reference 1-38
event table toolbar reference 68-15
Event Viewer status color code 68-30
map elements 35-14
ICQ class map objects
creating 21-16
match criteria 21-21
identity-aware firewall policies
collecting user statistics 13-25
configuring 13-7
configuring cut-through proxy 13-24
configuring identity options 13-15
configuring layer 2 SGT imposition 46-38
configuring rules 13-21
configuring security group tagging 46-38
configuring the ASA 13-7, 14-8
enabling 13-8
filtering VPN traffic 13-26
identifying AD servers and agents 11-36, 13-8
managing 13-1
monitoring 13-27
overview 13-1
requirements 13-3
user identity acquisition 13-2
Identity Configuration wizard
Active Directory Agent Settings 13-13
Active Directory Settings 13-11
Preview 13-15
Identity Settings page 11-36
identity user group objects
creating 13-19
selecting 13-21
user identity acquisition 13-2
idle timeout, Security Manager client 11-10
IDM
device manager 71-22
IDSM
adding when using non-default HTTPS (SSL) port 3-7
Create and Edit IDSM Data Port VLANs dialog boxes 67-50
Create and Edit IDSM EtherChannel VLANs dialog boxes 67-49
credentials 3-18
defining Data Port VLANs 67-46
defining EtherChannel VLANs 67-44
deleting Data Port VLANs 67-47
deleting EtherChannel VLANs 67-45
deployment failures when changing data port VLAN running mode 9-16
IDSM Settings page 67-47
IDSM Slot-Port Selector dialog box 67-51
mode support limitations 67-44
troubleshooting deployment 9-15
understanding settings on Catalyst devices 67-43
IE 10 security settings 10-2
IGMP
PIX/ASA/FWSM
Access Group parameters 54-5
Access Group tab 54-5
enable 54-1
Join Group parameters 54-7
Join Group tab 54-7
page 54-2
parameters 54-4
Protocol tab 54-3
Static Group parameters 54-6
Static Group tab 54-6
ignore error message, configure Security Manager to 9-10
IKE (Internet Key Exchange)
comparing version 1 and 2 26-4
configuring IKE and IPsec policies 26-1
configuring IKEv2 authentication 26-65
configuring proposal 26-9
Diffie-Hellman modulus groups 26-7
encryption algorithms 26-6
hash algorithms 26-6
IKEv2 Authentication policy 26-66, 26-69
overview 26-2
selecting the IKE version for devices in site to site VPNs 26-25
understanding 26-5
IKE keepalive
understanding 26-32
IKE proposal objects
v1 properties 26-10
v2 properties 26-13
IKE proposals (policies)
in GET VPNs 29-15
IKEv2 Authentication dialog box 26-69
IKEv2 Authentication page 26-66
IKEv2 settings
configuring 26-35
configuring cookie challenges 26-35
IM (ASA7.2+/PIX7.2+) policy map objects
creating 17-21
properties 17-67
IM (IOS) policy map objects
creating 17-21
properties 17-70
IM (Zone Based IOS) policy map objects
creating 21-16
match conditions and actions 21-35
IM (Zone based IOS) policy map objects
creating 21-16
Image Management 72-1
supported versions 72-2
Image Manager 72-9, 72-15
abort installation job 72-34
Add Image 72-11
Bootstrapping Devices 72-8
bundled images 72-30
bundles 72-13
create 72-13
delete 72-15
rename 72-14
view images 72-14
compatible images 72-17
configuring install location 72-19
device memory 72-18
devices 72-15
Getting Started 72-1
Installation Job Summary 72-32
installation wizard 72-25
installing compatible images on devices 72-30
installing images on selected devices 72-31
job approval workflow 72-35
jobs 72-32
RAM 72-17
Repository 72-9
retry on installation failure 72-34
roll back 72-35
settings 11-38
supported image types 72-5
supported platforms 72-2
Troubleshooting 72-37
update validation 72-22
updating images on devices 72-20
Using 72-1
Admin Settings 72-6
View All Images 72-9
view device information 72-16
view installation job details 72-33
Image Manager command 1-37
images
view 72-9
image updates 72-20
IMAP
configuring for inspection rules 17-20
IMAP class map objects
creating 21-16
match criteria 21-24
IM applications
match conditions for zone-based firewalls 21-21
protocol information for IM application inspection 21-33
IMAP policy map objects
creating 21-16
match conditions and actions 21-35
IM class map objects
creating 17-21
match criteria 17-68
IM policy map objects
match conditions and actions 17-68
import
device inventory 3-29
device with policies 10-13
policy objects 6-23
Import Background Image dialog box 35-13
Import Rules wizard
Enter Parameters page 16-40
Preview page 16-42
Status page 16-42
inheritance
inheriting rules 5-46
understanding 5-4
understanding signature policies 39-3
versus assignment 5-6
Inherit Rules command 1-31
Inherit Rules dialog box 5-46
Inspect/Application FW Rule wizard
Address and Port page 17-12
Inspected Protocol page 17-16
Match Traffic page 17-10
inspection
deny rules 17-5
global correlation (IPS)
configuring 42-5
inspection map objects
understanding 6-76
inspection rules
ACL naming conventions 12-5
add/edit rule wizard 17-10, 17-12, 17-16
choosing interfaces 17-2
configuring 17-5
configuring custom protocol name 17-21
configuring DNS settings 17-18
configuring ESMTP settings 17-19
configuring fragment inspection 17-19
configuring identity aware 13-21
configuring in Map view 35-23
configuring RPC settings 17-20
configuring security group aware 14-17
configuring settings for IOS devices 17-103
configuring settings in Map view 35-24
configuring SMTP settings 17-19
deep inspection options
IMAP 17-20
POP3 17-20
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
Inspection Rules page 17-7
managing 17-1
moving 12-19
preserving ACL names 12-4
preventing DoS attacks on IOS devices 17-4
selecting protocols 17-3, 17-16
understanding 17-1
understanding access rule requirements 17-4
understanding NAT effects 12-3
understanding processing order 12-2
Inspection Rules page 17-7
Inspection settings page 17-103
inspect maps
policy maps
Add Country Network Codes dialog box 17-45
Edit Country Network Codes dialog box 17-45
Inspect parameter map objects
properties 21-31
Inspect Parameters map objects
creating 21-16, 21-36
installing
Security Manager client 1-11
Integrated Local Management Interface (ILMI) 61-49
Interactive Authentication Configuration dialog box 15-24
Interface Name Conflict dialog box 6-76
Interface Properties dialog box 35-18
Interface Role Contents dialog box 12-14
interface role objects
creating 6-72
defining subinterfaces 6-75
distinguishing from interfaces 6-74
handling conflicts between role and interface names 6-76
Interface Role dialog box 6-73
specifying during policy definition 6-74
understanding 6-71
use when a single interface name is allowed 6-75
interfaces
adding or changing modules 3-39
ASA
edit EtherChannel-assigned interface 46-11
EtherChannels 46-9, 46-13
LACP 46-11
ASA/FWSM
IPv6 46-39, 46-56
IPv6, add/edit 46-43
IPv6, add/edit prefixes 46-44
ASA 5505 46-6
ASA devices
Advanced tab 46-35
IP Type 46-46
Catalyst switches and 7600 Series routers
Access Port Selector dialog box 67-30
Create and Edit Interface dialog boxes-Access Port mode 67-9
Create and Edit Interface dialog boxes-Dynamic Port mode 67-18
Create and Edit Interface dialog boxes-Other mode 67-24
Create and Edit Interface dialog boxes-Routed Port mode 67-12
Create and Edit Interface dialog boxes-subinterfaces 67-22
Create and Edit Interface dialog boxes-Trunk Port mode 67-14
Create and Edit VLAN dialog boxes 67-28
Create and Edit VLAN Group dialog boxes 67-34
defining ports 67-5
deleting ports 67-7
generating names 67-6
Interfaces/VLANs page-Interfaces tab 67-7
Interfaces/VLANs page-Summary tab 67-3
Interfaces/VLANs page-VLAN Groups tab 67-33
Interfaces/VLANs page-VLANs tab 67-27
Service Module Slot Selector dialog box 67-35
Trunk Port Selector dialog box 67-31
understanding 67-5
VLAN Selector dialog box 67-35
Cisco IOS routers
Advanced Interface Settings dialog box 61-16
Advanced Interface Settings page 61-15
available types 61-2
Create Router Interface dialog box 61-8
defining advanced settings 61-13
defining basic settings 61-3
defining CEF interface settings 61-24
defining IPS module settings 61-22
deleting from 61-6
generating names 61-4
Interface Auto Name Generator dialog box 61-12
overview 61-1
Router Interfaces page 61-7
understanding helper addresses 61-14
configuring IOS IPS rules 45-9
configuring multiple contexts 58-2
distinguishing from interface roles 6-74
failover
MAC address 50-22
PIX/ASA/FWSM 50-23
PIX 6.3 50-11
IPS
configuring 37-6
configuring bypass mode 37-12
configuring CDP mode 37-12
configuring inline interface pairs 37-13
configuring inline VLAN pairs 37-14
configuring physical 37-9
configuring VLAN groups 37-15
deploying VLAN groups 37-5
inline interface mode 37-3
inline VLAN pair mode 37-3
interfaces policy 37-6
managing interface configurations 37-1
physical interface properties 37-10
promiscuous mode 37-2
roles 37-1
sensing modes overview 37-2
understanding 37-1
viewing summary 37-8
VLAN group mode 37-4
IP Type
PIX 6.3 46-25
PIX/ASA
allocation in security contexts 58-11
IP Type 46-46
PPPoE Users 46-54
redundant 46-8
subinterfaces 46-7, 46-14
VPDN groups 46-55
PIX/ASA/FWSM
add/edit 46-26
Advanced settings 46-52
configuring 46-3
contexts 46-5
DDNS update rules 52-19
enabling traffic between same security levels 46-54
General tab 46-27
manage 46-21
management access 49-6
understanding 46-3
PIX/ASA 7+ devices
MAC address 46-48
PIX 6.3
add/edit 46-23
routed and transparent 46-4
specifying during policy definition 6-74
specifying subinterfaces 6-75
throughput delay 61-18
Interface Selector dialog box (VLAN ACL Content) 67-42
Interfaces page (IPS) 37-6
Interface Specific Authentication Server Groups dialog box 31-15
Interface Specific Client Address Pools dialog box 31-11
inventory
deleting devices from 3-56
export devices
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
using command line utility 10-10
import devices
device with policies 10-13
inventory, device
adding devices 3-6
adding devices from configuration files 3-20
adding devices from inventory file 3-29
adding devices from network 3-12
adding devices manually 3-25
device status view
working with 3-62
managing 3-1
testing device connectivity 9-1
troubleshooting device discovery failures 3-7
understanding 3-1
understanding contents 3-3
understanding device clusters 3-9
understanding generic devices 3-8
viewing inventory status 71-19
working with 3-34
Inventory Status command 1-34
Inventory Status window 71-20
Inverse ARP 61-60
inverse multiplexing over ATM (IMA) 61-39
IOS devices
configuring transparent firewall rules 23-1
remote access IPSec VPNs
user group policies 33-13
remote access IPsec VPNs
creating using wizard 30-35
remote access SSL VPNs
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
creating using wizard 30-31
remote access VPNs
configuring SSL VPN policies 33-14
Context Editor dialog box (IOS) 33-15, 33-16
Dynamic VTI/VRF Aware IPsec settings 33-7
high availability 33-11
IPsec proposals 33-4
SDM 71-23
IOS IPS
affect of load balancing 45-8
comparing to IPS appliances and service modules 36-1
configuration files 45-3
configuration overview 45-4
configuring 45-1
configuring general settings 45-7
configuring interface rules 45-9
configuring target value ratings 40-17
event actions
filter rule attributes 40-9
filter rules 40-4, 40-7
filter rules tips 40-6
network information 40-17
overrides 40-13
overview 40-1
possible actions 40-2
process overview 40-1
settings 40-23
getting started 36-1
initial preparation of router 45-5
lightweight signature engines 45-2
limitations and restrictions 45-3
selecting signature category 45-6
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
inheritance 39-3
parameters list 39-24
policy 39-4
shortcut menu 39-10
understanding 39-1
viewing update level 39-9, 39-13
understanding 45-1
understanding subsystems and revisions 45-2
IOS Software Release 12.1 and 12.2
managing routers 60-2
IOS Web Filter Exclusive Domain Name dialog box 18-14
IOS Web Filter Rule and Applet Scanner dialog box 18-13
IP address
supporting dynamic 3-35
IP addresses
network masks 6-79
specifying in policies 6-85
IP Intelligence
settings 11-39
IP Intelligence dialog box 71-41
IP Intelligence in Report Manager 71-42
IP Intelligence Settings in Dashboard 71-2
IP Intelligence using Quick Launch 71-41
IP Intelligence widget 71-42
IP Options policy map objects
creating 17-21
properties 17-71
IPS
IPS Module router interface settings policies 61-22
MPC rule wizard
tab 57-8
PIX/ASA/FWSM
identity-aware rules 13-21
rules 57-5
IPS alerts
properties 68-17
IPS Certificates dialog box 44-10
IPS command 1-33
IPS Devices
selecting for Event Viewer 68-32
IPS devices
adding SSL thumbprints manually 9-4
allowed hosts 36-7
anomaly detection
configuring 41-6
configuring histograms 41-11
configuring learning accept mode 41-8
configuring signatures 41-4
configuring thresholds 41-11
detection zones 41-3
managing 41-1
modes 41-2
understanding 41-1
understanding histograms 41-9
understanding thresholds 41-9
understanding worms 41-2
when to turn off 41-4
blocking
configuring 43-7
configuring ARC 43-1
configuring blocking devices 43-14
configuring master blocking sensors 43-13
configuring never block hosts and networks 43-17
configuring router blocking interfaces 43-15
configuring user profiles 43-12
configuring VLAN blocking interfaces 43-16
general options 43-10
master blocking sensor 43-6
policy 43-8
rate limiting 43-4
router and switch blocking devices 43-4
strategies 43-3
understanding 43-1
capturing network traffic 36-2
certificates 44-10
changing those selected for reports 69-22
configuration overview 36-5
configuration overview for IOS IPS 45-4
configuring AAA 36-21
configuring Analysis Engine global variables 36-30
configuring DNS servers 36-24
configuring for event management 68-28
configuring for report management 69-3
configuring HTTP proxy server 36-24
configuring NTP 36-23
configuring OS maps 40-21
configuring SNMP 36-8
configuring target value ratings 40-17
configuring the external product interface 36-26
configuring user accounts 36-18
credentials, IPS router modules 3-19
deployment of passwords 36-17
deployment topology 36-4
discovery of passwords 36-17
event actions
example filter rule 68-64
filter rule attributes 40-9
filter rules 40-4, 40-7
filter rules tips 40-6
network information 40-17
overrides 40-13
overview 40-1
possible actions 40-2
process overview 40-1
settings 40-23
Event Viewer support 68-4
getting started 36-1
global correlation
configuring 42-1
configuring inspection and reputation 42-5
configuring network participation 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-1
understanding network participation 42-3
understanding reputation 42-2
initializing 2-12
interfaces
configuring 37-6
configuring bypass mode 37-12
configuring CDP mode 37-12
configuring inline interface pairs 37-13
configuring inline VLAN pairs 37-14
configuring physical 37-9
configuring VLAN groups 37-15
deploying VLAN groups 37-5
inline interface mode 37-3
inline VLAN pair mode 37-3
interfaces policy 37-6
managing interface configurations 37-1
physical interface properties 37-10
promiscuous mode 37-2
roles 37-1
sensing modes overview 37-2
understanding 37-1
viewing summary 37-8
VLAN group mode 37-4
IPS modules for ASA 57-14
license, exporting 11-57
licenses
automating 44-3
managing 44-1
redeploying 44-2
updating 44-1
looking up signature policies for CS-MARS events 71-52
looking up signature policies for Event Viewer events 68-52
managing 44-1
managing user accounts and passwords 36-15
monitoring
removing false positive IPS events 68-64
passive OS fingerprinting 40-19
password requirements 36-20
policy discovery 5-14
rebooting 44-12
Report Manager reports
general VPN reports 69-18
IPS top reports 69-17
rollback restrictions 8-65
showing containment 3-54
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
configuring settings 39-30
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
inheritance 39-3
parameters list 39-24
policy 39-4
shortcut menu 39-10
understanding 39-1
viewing update level 39-9, 39-13
SSL certificate configuration 11-22
traffic flow notifications 36-30
tuning recommendations 36-4
understanding managed and unmanaged passwords 36-16
understanding network sensing 36-1
understanding user roles 36-15
updates
automatically applying 44-6
checking for and downloading 44-5
configuring server 44-4
managing 44-4
manually applying 44-7
user account attributes 36-19
viewing signature events in CS-MARS 71-51
viewing signature events in Event Viewer 68-55
virtual sensors
advantages 38-3
assigning interfaces 38-4
attributes 38-7
configuring 38-1, 38-5
deleting 38-10
editing policies 38-9
identifying 38-5
inline TCP session tracking mode 38-3
Normalizer mode 38-4
renaming 38-8
restrictions 38-3
understanding 38-1
IPsec
remote access VPNs
access policies for IKEv2 (ASA), configuring 31-48
access policies for IKEv2 (ASA), reference 31-43
access policies for IKEv2 (ASA), understanding 31-42
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1) 31-36
cluster load balancing 31-4, 31-5
configuring IKE and IPsec policies 26-1
connection profiles 31-6
connection profiles (ASA, PIX 7+) 31-8
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
Dynamic VTI/VRF Aware IPsec settings 33-7
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
high availability policies 33-11
IKE proposals 26-9
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
NAT settings 26-40
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
understanding 30-2
understanding IKE 26-5
understanding NAT settings 26-39
user group policies 33-13
VPNSM, VPN SPA, VSPA settings 33-6
wizard 30-13
IPsec/GRE VPN
advantages of IPsec tunneling with GRE 27-3
configuring 27-5
configuring GRE modes 27-6
dynamically addressed spokes 27-5
implementation 27-3
overview 27-1, 27-2
prerequisites for successful configuration 27-3
supported platforms 25-9
understanding 27-2
IPSec Client Software Update dialog box 31-20
IPsec Pass Through policy map objects
creating 17-21
properties 17-77
IPsec Proposal Editor dialog box
ASA and PIX 7.0+ devices 31-40
IOS and PIX 6.3 devices 33-4
IPsec proposals
configuring for Easy VPN 28-10
configuring for remote access VPNs
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring in site-to-site VPNs 26-21
overview 26-2
remote access VPNs
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring for ASA and PIX 7.0+ devices 31-39
configuring for IOS and PIX 6.3 devices 33-3
selecting the IKE version for devices 26-25
understanding 26-17
understanding crypto maps 26-18
understanding site-to-site 26-18
understanding transform sets 26-19
using reverse route injection 26-20
IPsec technologies
defining 25-30
mandatory and optional policies 25-6
policies 25-5
supported platforms 25-9
supported platforms for remote access VPNs 30-8
understanding 25-5
IPSec transform set objects
attributes 26-25
understanding 26-19
IPSec VPN
zone-based firewalls 21-6
IPS event
definition of 40-1
IPS Health Monitor page in Dashboard 71-2
IPS interfaces
IPS Monitoring Information dialog box 61-23
IPS module
credentials 3-19
IPS Module Discovery dialog box 3-19
IPS Module interface settings policies 61-22
IPS Rules dialog box 45-10
IPS sensor
IDM 71-22
IPS sensors
default transport protocol 11-22
IPS signatures
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
tuning 68-64
viewing related CS-MARS events 71-51
viewing related events in Event Viewer 68-55
IPS tab, Licensing page 11-55
IPS Updates page 11-45
IP Type
interface configuration
ASA and PIX 7+ 46-46
PIX 6.3 46-25
IPv4 pool objects
attributes 6-87
IPv6
interfaces
add/edit 46-43
add/edit prefixes 46-44
ASA/FWSM 46-39, 46-56
management IPv4 address requirements 1-8
Neighbor cache 47-6
specifying addresses in policies 6-85
support in Security Manager 1-8
IPv6 access rules
ACL naming conventions 12-5
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
expiration dates 16-21
identity-aware rules
requirements 13-3
moving 12-19
preserving ACL names 12-4
sharing ACLs among interfaces 11-18
understanding global 16-3
understanding processing order 12-2
IPv6 policy map objects
match conditions and actions 17-75, 17-89
properties 17-74, 17-88
IPv6 pool objects
attributes 6-88
IPv6 static routes
PIX/ASA/FWSM
configuration 55-123
ISAKMP/IPsec settings
configuring 26-31
ISE Settings page 11-54
ISR
zone-based firewall
restrictions 21-3
J
job deployment methods
understanding 8-8
jobs
aborting 8-54
approving 8-39
creating and editing deployment in non-Workflow mode 8-28
creating and editing deployment in Workflow mode 8-35
Deployment Manager 8-16
discarding 8-40
including devices in 8-8
rejecting 8-39
states
Workflow mode 8-6
submitting 8-38
joined hub-and-spoke topology 25-5
Join Group tab (IGMP) 54-7
JumpStart 1-23
Jumpstart command 1-37
K
Kazaa2 class map objects
creating 21-16
match criteria 21-21
Kerberos
configuring constrained delegation (KCD) 31-66
description 6-28
settings in AAA server objects 6-38
understanding constrained delegation (KCD) 31-64
key encryption key (KEK), GET VPN 29-4
key servers
adding 29-19
choosing the rekey transport mechanism 29-6
communication flow 29-2
cooperative, for redundancy 29-7
editing 29-19
generating, synchronizing RSA keys 29-13
registration failures 29-8
registration process 29-4
security policy ACLs 29-10
key servers (GET VPN)
configuring 29-18
Key Servers page (GET VPN) 29-18
Key Servers Selection dialog box 29-21
knowledge base structure (IPS) 41-8
L
LACP
interface assigned to an EtherChannel 46-11
large scale Dynamic Multipoint VPN (DMVPN)
mandatory and optional policies 25-6
Launch menu 1-36
Report Manager 69-8
layer 2 SGT imposition 46-38
LDAP
settings in AAA server objects 6-39
LDAP Attribute Map objects
attributes 6-45
learning accept mode (IPS), configuring 41-8
licenses
configuring for ASA devices 2-11
configuring for IOS devices 2-12
exporting IPS 11-57
IPS
automating 44-3
managing 44-1
redeploying 44-2
updating 44-1
Security Manager 10-16
License Update Status Details dialog box 11-59
licensing
Settings page 11-54
Lightweight Directory Access Protocol (LDAP)
description 6-29
lightweight signature engines 45-2
line access
Cisco IOS routers
Console Policy page 62-42
overview 62-35
VTY Policy page 62-50
Link Aggregation Control Protocol 46-11
Link Properties dialog box 35-20
load balancing
configuring in large scale DMVPN 27-16, 27-17
configuring IOS IPS deny actions 45-8
server attributes in large scale DMVPN 27-17
Local Policy Will Be Replaced dialog box 5-44
Local Web Filter class map objects
match criteria 21-29
Local web filter class map objects
creating 21-36
Local Web Filter parameter map objects
properties 21-38
Local web filter parameter map objects
creating 21-36
locking
activities 4-3
devices and policies 5-9
objects 5-10
understanding 5-8
VPN topologies 5-10
Log Buffer window 71-25
logging
Cisco IOS routers
defining NetFlow interfaces 64-15
defining NetFlow parameters 64-6
defining syslog servers 64-3
Logging Setup Policy page 64-7
NetFlow policy page 64-12
overview 64-1
Syslog Server dialog box 64-11
Syslog Servers Policy page 64-10
syslog setup parameters 64-1
syslog severity levels 64-4
PIX/ASA/FWSM 53-1
email notifications 53-8
email recipients 53-8
embedded event manager 53-3
event lists 53-9
event lists, add/edit 53-10
filters 53-12
filters, editing 53-13
levels 53-24
logging setup 53-14
message classes and IDs 53-9
message editing 53-25
message limits 53-18
message limits, add/edit 53-18
NetFlow 53-1
NetFlow, add/edit collector 53-2
rate limit levels 53-17
rate limits, add/edit 53-19
server 53-21
server setup 53-20
set-up 53-15
syslog class 53-11
syslog message ID 53-11
syslog servers 53-26, 53-27
syslog servers, add/edit 53-28
syslog messages supported for CS-MARS queries 71-53
logging in to
Cisco Security Management Suite server 1-11
CiscoWorks Common Services 1-11
logging into
Security Manager 1-10, 1-11
Logging page, IPS platform 36-30
logs
configuring audit log default settings 11-59
configuring debug levels 11-11
Logs page 11-59
loopback cells 61-50
low-latency queuing (LLQ) 65-5
M
MAC address
interface configuration
ASA and PIX 7+ 46-48
PIX/ASA/FWSM
add/edit 47-8
interface 50-22
learning 47-8
learning, enable/disable 47-9
table 47-7
MAC address pool objects
attributes 6-89
MAC exempt lists
configuring 15-7, 15-26
rule attributes 15-27
Maintenance Operation Protocol (MOP), enabling 61-19
Management Access
PIX/ASA/FWSM
interface 49-6
management address
requirements for IPv6 devices 1-8
Management Center for Cisco Security Agents
configuring connection to IPS devices 36-26
connection attributes 36-27
posture ACLs 36-29
Management IP address
PIX/ASA/FWSM 47-10
Management IPv6
ASA 5505 47-10
Manage menu 1-33
Map menu 1-32
map objects
class maps
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
parameter maps
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
Inspect properties 21-31
Local Web Filter properties 21-38
N2H2 properties 21-39
Protocol Info properties 21-33
Trend properties 21-42
URLF Glob properties 21-45
URL Filter properties 21-43
Websense properties 21-39
policy maps
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
DCE/RPC properties 17-28
DNS properties 17-31
ESMTP properties 17-37
FTP properties 17-40
GTP properties 17-43
H.323 (ASA/PIX/FWSM) properties 17-48
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) properties 17-53
HTTP (ASA7.2+/PIX7.2+) properties 17-61
IM (ASA7.2+/PIX7.2+) properties 17-67
IM (IOS) properties 17-70
IP Options properties 17-71
IPsec Pass Through properties 17-77
IPv6 properties 17-74, 17-88
NetBIOS properties 17-78
regular expression group properties 17-100
regular expression properties 17-100
SIP (ASA/PIX/FWSM) properties 17-80, 17-90, 17-98
Skinny properties 17-84
SNMP properties 17-87
TCP Map properties 57-21
Web Filter properties 21-47
regular expression objects
metacharacters 17-101
understanding 6-76
Map Properties command 1-32
Map Rule dialog box
connection profile map matching rules 31-38
connection profile maps 31-38
maps
access permissions 35-8
adding existing managed devices 35-16
adding new managed devices 35-16
arranging elements 35-11
background color 35-13
background images
deleting 35-13
importing 35-13
scale and position 35-13
setting 35-13
centering elements 35-11
changing the zoom level 35-11
class maps
Class Map dialog box 17-27, 21-19
creating 35-9
default map 35-9
deleting 35-10
displaying devices from Device View 35-16
displaying managed devices 35-16
displaying your network 35-14
elements, understanding 35-14
excluding private and reserved networks 11-3
exporting 35-11
icons 35-14
layer 3 links
autolink settings 11-3
creating 35-19
deleting 35-19
layouts, using 35-11
linking maps 35-13
navigation window 35-4
objects
adding 35-17
deleting 35-17
opening 35-10
overview 35-1
panning 35-11
refreshing 35-1
removing managed devices 35-16
renaming 35-10
saving 35-10
searching for nodes 35-12
selecting elements 35-12
setting background 35-13
showing containment for Catalyst, ASA, PIX, IPS devices 35-16
understanding 35-1
undocking window 35-2
working with 35-8
Map Settings dialog box 35-13
Map View
cloning devices 35-22
configuring firewall policies 35-23
configuring firewall settings policies 35-23
context menu
Layer 3 link 35-7
managed device node 35-5
map background 35-7
map objects 35-7
selected nodes 35-6
VPN connection 35-6
device policies, managing 35-22
discovering device configurations 35-22
icons for elements 35-14
main page 35-2
menus, context 35-5
navigation window 35-4
performing basic policy management 35-22
previewing device configurations 35-22
sharing device policies 35-22
toolbar reference 35-4
VPNs
creating 35-21
displaying existing 35-21
editing or showing peers 35-22
editing policies 35-22
managing 35-20
Map view
Autolink Settings page 11-3
copying between devices 35-22
overview 1-17, 35-1
Map View command 1-31
master blocking sensor 43-6
Master Blocking Sensor dialog box 43-13
maximum receive reconstructed unit (MRRU) 61-81
maximum segment size (MSS) 61-17
MBoundary
PIX/ASA/FWSM
configuration 54-9
interface configuration 54-10
MD5 hash algorithm 26-7
memory-allocation lite 62-80
memory settings
Cisco IOS routers
defining 62-78
overview 62-78
Memory Policy page 62-79
menu reference
Activities 1-35
Configuration Manager overview 1-28
Edit (Configuration Manager) 1-30
File (Configuration Manager) 1-29
File (Event Viewer) 68-9
File (Report Manager) 69-8
Help (Configuration Manager) 1-37
Launch 1-36
Launch (Report Manager) 69-8
Manage 1-33
Map 1-32
Policy (Configuration Manager) 1-31
Tickets 1-35
Tools (Configuration Manager) 1-33
Tools (Report Manager) 69-8
View (Configuration Manager) 1-30
View (Event Viewer) 68-9
message
editing
PIX/ASA/FWSM 53-25
PIX/ASA/FWSM
limits 53-18
limits, add/edit 53-18
rate limits, add/edit 53-19
message classes and IDs
PIX/ASA/FWSM 53-9
metacharacters
URLF Glob parameter maps 21-46
Mobile application for CSM 71-18
Modify Access List dialog box (Allowed Hosts policy) 36-7
Modify Physical Interface Map dialog box 37-10
monitoring
CS-MARS
integrating with Security Manager 71-42
device managers, using 71-21
device status 71-1
network activities 71-1
PRSM, launching 71-27
monitoring widget for server 71-14
mount point
PIX/ASA
add/edit 48-17
mount point configuration
ASA 48-17
Move Row Down command 1-30
Move Row Up command 1-30
MPC
a.k.a. Modular Policy Framework 57-6
MRoute
PIX/ASA/FWSM
configuration 54-8
MRoute page
description 54-8
MSN Messenger class map objects
creating 21-16
match criteria 21-21
multicast
PIX/ASA/FWSM
Enable PIM and IGMP 54-1
IGMP Access Group parameters 54-5
IGMP Access Group tab 54-5
IGMP Join Group parameters 54-7
IGMP Join Group tab 54-7
IGMP parameters 54-4
IGMP Protocol tab 54-3
IGMP Static Group parameters 54-6
IGMP Static Group tab 54-6
MBoundary configuration 54-9
MBoundary interface configuration 54-10
MRoute configuration 54-8
Multicast Boundary Filter page 54-9
Multicast Group, add/edit 54-19, 54-21
Multicast Group rule 54-17
PIM Bidirectional Neighbor Filter 54-14
PIM Bidirectional Neighbor Filter tab 54-13
PIM Neighbor Filter 54-13
PIM Neighbor Filter tab 54-12
PIM page 54-11
PIM Protocol dialog box 54-12
PIM Protocol tab 54-11
PIM Rendezvous Point, add/edit 54-16
PIM Rendezvous Points tab 54-15
PIM Request Filter tab 54-18, 54-20
PIM Route Tree tab 54-17
Multicast Boundary Filter page
description 54-9
multicast rekey in GET VPN 29-6
multicast routing
PIX/ASA/FWSM
configuring on 54-1
IGMP 54-2
multicast boundary filters 54-9
multicast routes 54-8
PIM 54-11
Multiclass Multilink PPP (MCMP) 61-74
multilink PPP (MLP) 61-70
defining bundles 61-74
multiple users
activities 4-4
tickets 4-4
N
N2H2 (Smartfilter)
configuring for web filter rules policies 18-15, 18-19
configuring for zone based firewall rules policies 21-36, 21-39, 21-41
N2H2 class map objects
creating 21-36
match criteria 21-30
N2H2 parameter map objects
creating 21-36
properties 21-39
NAC
posture validation not occurring 9-15
NAT
VPN traffic sent unencrypted 9-14
NAT policies
Add/Edit Per-Session NAT rules dialog boxes 24-47
NBAR
enabling protocol discovery 61-19
Neighbor cache 47-6
Neighbor Filter
PIM
PIX/ASA/FWSM 54-13
Neighbor Filter tab
PIM 54-12
NetBIOS logout probe
configuring 13-15
requirements 13-5
NetBIOS policy map objects
creating 17-21
properties 17-78
NetFlow
Cisco IOS routers 64-1, 64-5
interface settings 64-15
configuring
on Cisco IOS routers 64-6
CS-MARS query 71-54
IOS routers 64-12
PIX/ASA/FWSM 53-1
add/edit collector 53-2
network/host objects
attributes 6-81
attributes, NAT 24-42
creating 6-80
naming when provisioned as object groups 6-99
network masks 6-79
optimizing when deploying firewall rules 12-35
understanding 6-78
unspecified value objects 6-84
using in Event Viewer filters 68-65
network access device (NAD) 63-9
Network Address Translation (NAT)
Add/Edit Per-Session NAT rules dialog boxes 24-47
ASA 8.3+
Add/Edit NAT rules dialog boxes 24-36
Translation Rules page 24-33
understanding 24-3
ASA 8.3 devices 24-33
Cisco IOS routers 24-5
Dynamic Rule dialog box 24-11
dynamic rules 24-10
Interface Specification 24-6
Static Rule dialog box 24-7
static rules 24-6
Static Rules tab 24-6
timeouts 24-13
configuring global options for VPNs 26-40
non-ASA 8.3 devices 24-18
No Proxy ARP 24-39, 24-45
PAT pool 24-41
Per-session NAT rules 24-46
PIX/ASA/FWSM
Address Pool dialog box 24-18
Address Pools page 24-18
Advanced NAT Options dialog box 24-29
clearing XLATE on deployment 59-1
configuring on 24-15
configuring translation rules 24-19
Dynamic Rules dialog box 24-23
Dynamic Rules tab 24-22
General tab 24-31
non ASA 8.3 24-18
Policy Dynamic Rules dialog box 24-25
Policy Dynamic Rules tab 24-24
Select Address Pool 24-23
Static Rules dialog box 24-27
Static Rules tab 24-26
Translation Exemptions (NAT 0 ACL) dialog box 24-21
Translation Exemptions (NAT 0 ACL) tab 24-20
Translation Options page 24-16, 24-17
Translation Rules page 24-19
translation types 24-3
transparent mode 24-16
understanding 24-2
round robin allocation 24-41
understanding NAT effects on firewall rules 12-3
understanding NAT settings for VPNs 26-39
understanding NAT traversal 26-39
Network Admission Control (NAC)
Cisco Trust Agent 63-9
components 63-9
defining identity parameters 63-13
defining interface parameters 63-11
defining setup parameters 63-10
Identities tab 63-18
Identity Action dialog box 63-19
Identity Profile dialog box 63-19
Interface Configuration dialog box 63-17
Interfaces tab 63-16
NAC Policy page 63-14
network access device (NAD) 63-9
on Cisco IOS routers 63-8
Setup tab 63-14
supported platforms 63-8
understanding system flow 63-9
Network Information page (IPS) 40-17
network masks
discontiguous 6-80
discovering 6-80
displaying 6-80
understanding 6-79
network participation, IPS
configuring 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-3
understanding global correlation 42-1
understanding reputation 42-2
network sensing
capturing network traffic 36-2
deployment topology 36-4
overview 36-1
tuning recommendations 36-4
Network Time Protocol (NTP)
Cisco IOS routers
creating NTP servers 62-97
NTP Policy page 62-98
NTP Server dialog box 62-99
overview 62-96
Never Block Host dialog box 43-17
Never Block Network dialog box 43-17
New Activity command 1-35
New Device command 1-29
New Device Groups command 1-30
New Device wizard
Choose Method page 3-6
Device Grouping page 3-48
Device Information page - Add Device from File 3-31
Device Information page - Configuration File 3-22
Device Information page - Network 3-14
Device Information page - New Device 3-26
New Map command 1-32
New or Edit CS-MARS Device dialog box 11-8
New Ticket command 1-36
NHRP
DMVPN spoke-to-spoke connections 27-11
Node Properties dialog box 35-17
Non-Workflow mode
viewing
device details 8-26
non-Workflow mode
changing modes 1-27
comparing with Workflow mode 1-21
configuration files
deploying 8-28
previewing 8-44
configurations
rolling back 8-68
creating tickets 4-14
deployment 8-3
deployment jobs
aborting 8-54
Deployment Status Details dialog box 8-32
opening tickets 4-15
taking over another user session 10-23
understanding 1-21
No Proxy ARP
NAT rule 24-39, 24-45
PIX/ASA/FWSM Platform 55-1
notifications, e-mail
configuring SMTP server 1-26
NS Lookup 71-32, 71-36
NT
settings in AAA server objects 6-42
NTP
PIX/ASA/FWSM 52-21
server configuration 52-21
NTP policy, IPS platform 36-23
NTP server
configuring for IPS devices 36-23
null0 55-120
O
object groups
policy discovery 5-14
object group search
ASA 8.3+ devices 16-25
PIX 6.3 devices 16-26
objects
AAA server
HTTP-FORM settings 6-44
Kerberos settings 6-38
LDAP settings 6-39
NT settings 6-42
RADIUS settings 6-35
SDI settings 6-43
TACACS+ settings 6-37
AAA server groups
attributes 6-49
creating 6-47
default server groups on IOS devices 6-31
predefined authentication groups 6-30
understanding 6-27
AAA servers
creating 6-32
supported additional types for ASA/PIX/FWSM 6-28
supported types 6-28
understanding 6-27
access control lists
creating 6-52
extended objects 6-53
standard objects 6-55
unified objects 6-57
web objects 6-56
ASA group policies
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
AS paths
properties 55-143
basic procedures 6-9
categories, using 6-13
changes in Security Manager 4.4 1-9
Cisco Secure Desktop configuration
creating 33-18
class map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
cloning (duplicating) 6-13
community lists
properties 55-145
configuring for ASA routing policies 55-124
configuring for remote access VPN 34-1
creating 6-9
credentials
attributes 28-9
DCE/RPC policy map
properties 17-28
deleting 6-16
DNS policy map
properties 17-31
editing 6-12
ESMTP policy map
properties 17-37
exporting 6-23
file objects
attributes 34-36
selecting 34-38
FlexConfig
creating text objects 7-32
properties 7-30
property selector 7-34
undefined variables 7-33
FlexConfigs
adding to policies 7-35
changing order in policies 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
creating 7-28
previewing CLI 7-35
removing from policies 7-35
system variables 7-7
understanding 7-2
variables 7-5, 7-6
FTP policy map
properties 17-40
generating usage reports 6-14
GTP policy map
properties 17-43
H.323 (ASA/PIX/FWSM) policy map
properties 17-48
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy map
properties 17-53
HTTP (ASA7.2+/PIX7.2+) policy map
properties 17-61
identity user group
creating 13-19
selecting 13-21
user identity acquisition 13-2
IKE proposals
v1 properties 26-10
v2 properties 26-13
IM (ASA7.2+/PIX7.2+) policy map
properties 17-67
IM (IOS) policy map
properties 17-70
importing 6-23
Inspect parameter map
properties 21-31
interface roles
creating 6-72
IP Options policy map
properties 17-71
IPsec Pass Through policy map
properties 17-77
IPSec transform sets
attributes 26-25
understanding 26-19
IPv6 policy map
properties 17-74, 17-88
LDAP attribute map objects
attributes 6-45
Local Web Filter parameter map
properties 21-38
locking
effects on activities 4-3
managing 6-1
maps
understanding 6-76
N2H2 parameter map
properties 21-39
NetBIOS policy map
properties 17-78
network/host
optimizing when deploying firewall rules 12-35
understanding 6-78
using in Event Viewer filters 68-65
network/host objects
naming when provisioned as object groups 6-99
networks/hosts
creating 6-80
unspecified value objects 6-84
object selectors 6-2
overrides
allowing 6-18
creating for multiple devices 6-19
creating for single device 6-19
deleting 6-21
managing 6-17
understanding 6-17
overview 1-19
parameter map
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
PKI enrollments
defining CA server properties 26-57
defining certificate attributes 26-63
defining enrollment parameters 26-61
defining trusted CA hierarchy 26-64
properties 26-55
policy lists
properties 55-135
policy map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
port forwarding lists
properties 34-39
port list objects
naming when provisioned as object groups 6-99
port lists
creating 6-92
properties 6-94
prefix lists
properties 55-138, 55-140
Protocol Info parameter map
properties 21-33
provisioning as object groups 6-98
regular expression group policy map
properties 17-100
regular expression objects
metacharacters 17-101
regular expression policy map
properties 17-100
route maps 55-128
creating 55-124
understanding 55-124
security group
creating 14-14
selecting for policies 6-2
service objects
naming when provisioned as object groups 6-99
provisioning as object groups 6-100
services
creating 6-92
single sign-on server
properties 34-41
SIP (ASA/PIX/FWSM) policy map
properties 17-80, 17-90, 17-98
Skinny policy map
properties 17-84
SLA monitors
attributes 51-10
configuring 51-9
understanding 51-8
SNMP policy map
properties 17-87
SSL VPN Bookmark
configuring 31-80
post URL method and macro substitutions 31-82
SSL VPN Customization
configuring 31-75
creating custom Logon page 31-79
localizing 31-78
SSL VPN gateway
properties 34-63
SSL VPN smart tunnel auto sign-on list
attributes 34-70
SSL VPN smart tunnel list
attributes 34-65, 34-68
configuring 31-83
TCP Map policy map
properties 57-21
text
creating 7-32
time ranges
attributes for recurring ranges 6-71
configuring 6-70
traffic flow
default inspection traffic 57-19
properties 57-17
Trend parameter map
properties 21-42
TrustSec security group
selecting 14-16
URLF Glob parameter map
properties 21-45
URLF Glob parameter maps
metacharacters 21-46
URL Filter parameter map
properties 21-43
user groups
advanced PIX 6.3 settings 34-81
browser proxy settings 34-86
clientless settings 34-82
client VPN software update (IOS) settings 34-80
DNS/WINS settings 34-76
general settings 34-74
IOS client settings 34-77
IOS Xauth settings 34-79
split tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN connection settings 34-87
SSL VPN full tunnel settings 34-83
SSL VPN split tunneling settings 34-85
technology settings 34-72
thin client settings 34-83
using global search to find specific objects 1-41
viewing details 6-14
Web Filter policy map
properties 21-47
Websense parameter map
properties 21-39
WINS server lists
attributes 34-89
creating 31-85
object selectors 6-2
Object Usage dialog box 6-14
Obsoletes dialog box 39-30
OOB (Out of Band) Changes dialog box 8-48
OOB (out of band changes)
avoiding 8-46
detecting and analyzing 8-45
understanding 8-12
Openable Activities dialog box 4-15
Openable Tickets dialog box 4-15
Open Activity command 1-35
Open command (Report Manager) 69-8
Open Map command 1-32
Open Map dialog box 35-10
Open Ticket command 1-36
OS Identifications tab, IPS Network Information policy 40-21
OS Map dialog box 40-22
OSPF
interaction with NAT 55-67
LSAs 55-67
OSPF interfaces
blocking LSA flooding 66-27
defining on Cisco IOS routers 66-25
disabling MTU mismatch detection 66-27
Interface dialog box 66-31
OSPF Interface Policy page 66-30
understanding
authentication 66-29
cost 66-26
network types 66-29
priority 66-26
timer settings 66-28
OSPF parameters
dead interval 55-92, 55-108
hello interval 55-91
hello multiplier 55-92
retransmit interval 55-92, 55-108
transmit delay 55-92, 55-108
OSPF redistribution
defining mappings 66-22
defining maximum prefix values 66-23
understanding 66-22
OSPF routing
Cisco IOS routers
Area dialog box 66-37
Area tab 66-36
defining area settings 66-21
defining interface settings 66-25
defining setup parameters 66-20
Edit Interfaces dialog box 66-36
Max Prefix Mapping dialog box 66-41
OSPF Process Policy page 66-34
overview 66-19
redistributing routes 66-22
Redistribution Mapping dialog box 66-39
Redistribution tab 66-38
Setup dialog box 66-35
Setup tab 66-35
PIX/ASA/FWSM
advanced settings 55-69
Area/Area networks 55-74
Area Range 55-76
Area tab 55-73
Filtering configuration 55-85
Filtering tab 55-84
Filter Rule configuration 55-86
Filter Rule tab 55-86
General tab 55-68
Interface configuration 55-90
Interface tab 55-88
Neighbors tab 55-77
policy 55-67
Range tab 55-76
Redistribution rule 55-79
Redistribution tab 55-78
static neighbor 55-77
Summary Address configuration 55-88
Summary Address tab 55-87
Virtual Link configuration 55-82
Virtual Link MD5 configuration 55-83
Virtual Link tab 55-81
OSPFv3
LSAs 55-93
OSPFv3 routing
PIX/ASA/FWSM
advanced settings 55-96
Area/Area networks 55-100
Area Range 55-102
Area tab 55-100
Interface configuration 55-106
Interface tab 55-106
policy 55-92
Process tab 55-95
Redistribution rule 55-104
static neighbor 55-110
Summary Prefix configuration 55-105
Virtual Link configuration 55-103
OS version mismatches
handling 8-13
other settings
configuring for SSL VPN (ASA) 31-49
out-of-band changes
avoiding 8-46
detecting and analyzing 8-45
understanding 8-12
overrides
allowing overrides 6-18
creating for multiple devices 6-19
creating for single device 6-19
deleting 6-21
managing 6-17
understanding 6-17
overview
activities 1-19
device monitoring 1-7
IPv6 support 1-8
policies 1-19
ticketing 1-19
user permissions 1-10
workflow 1-19
P
P2P applications
match conditions for zone-based firewalls 21-21
P2P policy map objects
creating 21-16
match conditions and actions 21-35
packageMonitorInterval 44-6
packet capture 71-36
Packet Capture Wizard command 1-34
packet tracer 71-30
Pair dialog box 45-10
PAM
zone-based firewall
configuring 21-69
parameter maps
understanding 6-76
partial_backup.pl command 10-30
partial mesh topologies 25-5
participation, network
configuring 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-3
understanding global correlation 42-1
understanding reputation 42-2
passive OS fingerprinting on IPS sensors
configuring 40-21
understanding 40-19
Password Requirements policy, IPS platform 36-20
passwords
admin, changing 10-24
configuring IPS requirements 36-20
configuring IPS user account 36-18
discovery and deployment of IPS 36-17
managing IPS requirements 36-15
understanding managed and unmanaged IPS passwords 36-16
Paste command 1-30, 12-9
PAT
pools 24-41
PDF file
export HPM data as 70-29
PDM
device manager 71-22
Peers page 25-33
performance settings
configuring for SSL VPN (ASA) 31-50
performance tuning 44-6
permanent virtual connections (PVC)
Define Mapping dialog box 61-64
PVC Advanced Settings dialog box 61-65
PVC dialog box 61-55
PVC Policy page 61-54
permanent virtual connections (PVCs)
defining ATM PVCs 61-50
defining OAM management 61-53
on Cisco IOS routers 61-46
understanding
ATM management protocols 61-48
ATM service classes 61-47
ILMI 61-49
Operation, Administration, and Maintenance (OAM) 61-50
virtual paths and channels 61-46
per-session NAT rules 24-46
Add/Edit Per-Session NAT rules dialog boxes 24-47
PIM
configuring on firewall devices 54-11
PIX/ASA/FWSM
Bidirectional Neighbor Filter 54-14
Bidirectional Neighbor Filter tab 54-13
enable 54-1
Multicast Group, add/edit 54-19, 54-21
Multicast Group rule 54-17
Neighbor Filter 54-13
Neighbor Filter tab 54-12
page 54-11
PIM Protocol dialog box 54-12
Protocol tab 54-11
Rendezvous Point, add/edit 54-16
Rendezvous Points tab 54-15
Request Filter tab 54-18, 54-20
Route Tree tab 54-17
ping 71-32, 71-33
Ping, TraceRoute and NSLookup command 1-34
PIX
PDM 71-22
PIX/ASA
boot image/configuration 48-9
add/edit 48-11
failover 50-17
settings 50-20
interfaces
Advanced tab 46-35
IP Type 46-46
MAC address 46-48
PPPoE Users 46-54
redundant 46-8
subinterfaces 46-7, 46-14
VPDN groups 46-55
mount point
add/edit 48-17
mount point configuration 48-17
security contexts
allocate interfaces 58-11
configuration 58-9
viewing allocated interfaces 58-11
PIX/ASA/FWSM
AAA 48-5
Authentication tab 48-5
about AAA 48-1
bridging 47-1
clock settings 48-13
configuring banners 48-9
configuring CLI prompt 48-12
credentials 48-15
Device Access
Server Access 52-1
device administration policies 48-1
Failover
bootstrap configuration 50-26
interface MAC address 50-22
failover
active/active 50-3
interface configuration 50-23
security context 50-25
understanding 50-1
interfaces
add/edit 46-26
Advanced settings 46-52
configuring 46-3
contexts 46-5
General tab 46-27
managing 46-21
operating modes 46-4
understanding 46-3
security contexts
about 58-1
Server Access
AUS, add/edit server 52-3
AUS page 52-1
DDNS interface rule 52-19
DDNS page 52-18
DDNS update methods 52-19
DDNS update methods, add/edit 52-20
DHCP Relay, add/edit agent 52-6
DHCP Relay, add/edit server 52-7
DHCP Relay page 52-5
DHCP Server, add/edit 52-12
DHCP Server, advanced configuration 52-13
DHCP Server, options 52-13
DHCP Server page 52-10
DHCPv6 Relay, add/edit agent 52-9
DHCPv6 Relay, add/edit server 52-9
DHCPv6 Relay page 52-7
DNS page 52-14
DNS server, add 52-17
DNS server group 52-16
NTP page 52-21
NTP server configuration 52-21
SMTP page 52-22
TFTP server page 52-23
stateful
stateful 50-4
PIX/ASA/FWSM Platform
AAA
Accounting tab 48-7
Authorization tab 48-6
anti-spoofing 56-2
ARP configuration 47-4
ARP Inspection 47-5
enable/disable 47-6
ARP Table 47-3
configuring DHCP servers 52-10
configuring multicast routing 54-1
configuring routing 55-1
Device Access 49-1
console timeout 49-1
host name 51-1
HTTP configuration 49-4
HTTP page 49-2
ICMP rules 49-4
ICMP rules, add/edit 49-5
Management Access interface 49-6
Secure Shell, add/edit host 49-8
Secure Shell (SSH) 49-7, 49-8
SNMP host access 49-20
SNMP page 49-15
SNMP Trap configuration 49-17
Telnet configuration 49-25
Telnet page 49-24
user accounts 51-7
user accounts, add/edit 51-7
failover 50-10
failover configuration 50-1
failover configuration basics 50-5
floodguard 56-2
identity-aware IPS, QoS, and Connection Rules 13-21
IPS, QoS, and Connection Rules
wizard 57-6, 57-8
logging 53-1
email notifications 53-8
email recipients 53-8
embedded event manager 53-3
embedded event manager, add/edit action configuration 53-7
embedded event manager, add/edit applet 53-4
embedded event manager, add/edit syslog configuration 53-6
event lists 53-9
event lists, add/edit 53-10
filters 53-12
filters, editing 53-13
levels 53-24
message classes and IDs 53-9
message editing 53-25
message limits 53-18
message limits, add/edit 53-18
NetFlow 53-1
NetFlow, add/edit collector 53-2
rate limits, add/edit 53-19
server 53-21
set-up 53-15
syslog class 53-11
syslog message ID 53-11
syslog servers 53-27
syslog servers, add/edit 53-28
MAC Address
add/edit 47-8
MAC Address Table 47-7
MAC learning 47-8
enable/disable 47-9
Management IP address 47-10
multicast
Enable PIM and IGMP 54-1
group, add/edit 54-19, 54-21
IGMP Access Group parameters 54-5
IGMP Access Group tab 54-5
IGMP Join Group parameters 54-7
IGMP Join Group tab 54-7
IGMP page 54-2
IGMP parameters 54-4
IGMP Protocol tab 54-3
IGMP Static Group parameters 54-6
IGMP Static Group tab 54-6
MBoundary configuration 54-9
MBoundary interface configuration 54-10
MRoute configuration 54-8
Multicast Boundary Filter page 54-9
Multicast Group rule 54-17
Multicast Routes page 54-8
PIM Bidirectional Neighbor Filter 54-14
PIM Bidirectional Neighbor Filter tab 54-13
PIM Neighbor Filter 54-13
PIM Neighbor Filter tab 54-12
PIM page 54-11
PIM Protocol dialog box 54-12
PIM Protocol tab 54-11
PIM Rendezvous Point, add/edit 54-16
PIM Rendezvous Points tab 54-15
PIM Request Filter tab 54-18, 54-20
PIM Route Tree tab 54-17
NAT policies 24-18
Address Pools dialog box 24-18
Address Pools page 24-18
Advanced NAT Options dialog box 24-29
Dynamic Rules dialog box 24-23
Dynamic Rules tab 24-22
General tab 24-31
Policy Dynamic Rules dialog box 24-25
Policy Dynamic Rules tab 24-24
Select Address Pool 24-23
Static Rules dialog box 24-27
Static Rules tab 24-26
Translation Exemptions (NAT 0 ACL) dialog box 24-21
Translation Exemptions (NAT 0 ACL) tab 24-20
Translation Options page 24-16, 24-17
Translation Rules page 24-19
policy configuration 46-1
priority queues 57-4
priority queues configuration 57-4
routing
BGP 55-2, 55-3
BGP - General tab 55-5
BGP - IPv4 Family - Aggregate Address configuration 55-9, 55-22
BGP - IPv4 Family - Filter configuration 55-10
BGP - IPv4 Family - General tab 55-7, 55-21
BGP - IPv4 Family - Neighbor configuration 55-11, 55-24
BGP - IPv4 Family - Network configuration 55-17, 55-29
BGP - IPv4 Family - Redistribution configuration 55-18, 55-30
BGP - IPv4 Family - Route Injection configuration 55-19, 55-31
BGP - IPv4 Family tab 55-6, 55-20
EIGRP 55-32
EIGRP - advanced settings 55-34
EIGRP - Filter Rule configuration 55-40
EIGRP - Filter Rules tab 55-39
EIGRP - Interface configuration 55-48
EIGRP - Interfaces tab 55-47
EIGRP - neighbor configuration 55-42
EIGRP - Neighbors tab 55-41
EIGRP - redistribution configuration 55-44
EIGRP - Redistribution tab 55-42
EIGRP - Setup tab 55-36
EIGRP - Summary Address configuration 55-46
EIGRP - Summary Address tab 55-45
IPv6 Static Route configuration 55-123
IPv6 Static Route page 55-123
No Proxy ARP 55-1
OSPF 55-67
OSPF - advanced settings 55-69
OSPF - Area/Area networks 55-74
OSPF - Area Range 55-76
OSPF - Area tab 55-73
OSPF - Filtering configuration 55-85
OSPF - Filtering tab 55-84
OSPF - Filter Rule configuration 55-86
OSPF - Filter Rule tab 55-86
OSPF - General tab 55-68
OSPF - Interface configuration 55-90
OSPF - Interface tab 55-88
OSPF - Neighbors tab 55-77
OSPF - Range tab 55-76
OSPF - Redistribution rule 55-79
OSPF - Redistribution tab 55-78
OSPF - static neighbor 55-77
OSPF - Summary Address configuration 55-88
OSPF - Summary Address tab 55-87
OSPFv3 55-92
OSPFv3 - advanced settings 55-96
OSPFv3 - Area/Area networks 55-100
OSPFv3 - Area Range 55-102
OSPFv3 - Area tab 55-100
OSPFv3 - Interface configuration 55-106
OSPFv3 - Interface tab 55-106
OSPFv3 - Process tab 55-95
OSPFv3 - Redistribution rule 55-104
OSPFv3 - static neighbor 55-110
OSPFv3 - Summary Prefix configuration 55-105
OSPFv3 - Virtual Link configuration 55-103
OSPF - Virtual Link configuration 55-82
OSPF - Virtual Link MD5 configuration 55-83
OSPF - Virtual Link tab 55-81
RIP (PIX/ASA 6.3–7.1, FWSM) 55-112
RIP (PIX/ASA 6.3–7.1, FWSM) configuration 55-113
RIP (PIX/ASA 7.2+) 55-114
RIP (PIX/ASA 7.2+) Filtering 55-118
RIP (PIX/ASA 7.2+) Filtering configuration 55-119
RIP (PIX/ASA 7.2+) Interface 55-119
RIP (PIX/ASA 7.2+) Interface configuration 55-120
RIP (PIX/ASA 7.2+) Redistribution 55-117
RIP (PIX/ASA 7.2+) Redistribution configuration 55-117
RIP (PIX/ASA 7.2+) Setup 55-115
RIP page 55-111
static null 0 routing 55-120
Static Route configuration 55-122
Static Route page 55-120, 55-122
security contexts
managing 58-7
security group aware IPS, QoS, and Connection Rules 14-17
security policies 56-1
General configuration 56-3
General page 56-1
timeouts 56-4
service policy
wizard 57-6
Service Policy Rules 57-5
service policy rules 57-1
SNMP configuration 49-12
SNMP Version 3 49-14
traffic class 57-7
Unicast Reverse Path Forwarding 56-2
user preferences 59-1
Deployment page 59-1
Transactional Commit page 59-2
PIX/ASA/FWSM Platform policies
bridging 47-1
configuring fragment settings 56-2
configuring NAT 24-15
transparent mode 24-16
PIX 6.3
Failover
interface configuration 50-11
failover 50-10
interface configuration
IP Type 46-25
interfaces
add/edit 46-23
PIX 7.x
Failover
Add Failover Group 50-24
PIX devices
AAA support 6-28
about 46-1
monitoring service level agreements 51-8
remote access VPNs
IPsec proposals 31-40
user group policies for PIX 6.3 33-13
selecting policy types to manage 5-11
PIX Firewall
setting up AUS or CNS 2-8
setting up SSL (HTTPS) 2-3
PIX Firewalls
configuring transparent firewall rules 23-1
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-64
rollback restrictions for multiple context mode 8-64
PIX firewalls
access controls
access list compilation 16-27
object group search 16-26
adding SSL thumbprints manually 9-4
FlexConfig object samples 7-23
packet capture, using 71-36
packet tracer, using 71-30
SSL certificate configuration 11-22
PKI (Public Key Infrastructure) policies
CA server authentication methods 26-49
defining multiple CA servers 26-52
enrollment requirements 26-49
understanding 26-48
using TFTP 26-50
PKI enrollment
prerequisites using TFTP 26-50
requirements 26-49
PKI enrollment objects
defining CA server properties 26-57
defining certificate attributes 26-63
defining enrollment parameters 26-61
defining trusted CA hierarchy 26-64
properties 26-55
plug ins
configuring browser 31-58
Point-to-Point Protocol (PPP)
defining connections 61-71
defining multilink PPP bundles 61-74
on Cisco IOS routers 61-70
understanding multilink PPP (MLP) 61-70
Point-to-Point protocol (PPP)
PPP/MLP Policy page 61-75
PPP dialog box 61-76
point-to-point topologies
description 25-3
policies
adding local rules to shared policies 5-45
assigning shared policies 5-44
basic concepts
inheritance vs. assignment 5-6
local vs. shared 5-3
managing 5-31
overview 5-1
rule inheritance 5-4
service vs. platform-specific 5-2
settings-based vs. rule-based 5-2
shared policies in Device view or Site-to-Site VPN Manager 5-37
signature inheritance 39-3
status icons 5-30
cloning shared policies 5-47
configuring IKE and IPsec for VPNs 26-1
copying between devices 5-33
creating shared 5-54
deleting shared 5-56
Device view
configuring local policies 5-31
managing 5-30
modifying assignments 5-49
modifying shared policies 5-48
discovering 5-12
discovering on existing devices 5-15
exporting 10-12
exporting with device inventory 10-6
FlexConfigs
adding objects 7-35
changing object order 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
editing 7-35
FlexConfig Policy page 7-36
previewing CLI 7-35
removing objects 7-35
understanding 7-2
importing 10-13
inheriting rules 5-46
locking 5-8
managing 5-1
object selectors 6-2
overview 1-19
performing basic policy management in Map view 35-22
PKI (Public Key Infrastructure) 26-48
policy banner 5-38
policy discovery FAQ 5-27
policy management and objects 5-7
Policy view
managing 5-50
modifying assignments 5-54
preshared keys 26-45
renaming 5-48
router platform policies 60-1
selecting policies to manage 5-11
sharing local 5-41
sharing multiple local policies 5-42
sharing with PRSM 71-29
Site-to-Site VPN Manager
managing 5-30
modifying assignments 5-49
site-to-site VPNs 25-8
specifying interfaces 6-74
specifying IP addresses 6-85
synchronizing among Security Manager servers 10-5
unassigning 5-36
unsharing 5-43
using global search to find specific policies 1-41
viewing discovery task status 5-22
VPN defaults 11-70
policy assignments
modifying in Device view 5-49
modifying in Policy view 5-54
modifying in Site-to-Site VPN Manager 5-49
overview 1-19
policy bundles
cloning 5-58
creating 5-57
managing 5-57
renaming 5-58, 5-59
Policy Bundle view
cloning policy bundles 5-58
creating policy bundles 5-57
renaming policy bundles 5-58, 5-59
Policy Bundle View command 1-31
policy discovery
AAA commands not displayed in AAA policy 5-29
ACL naming conventions 12-5
ACLs 5-14
Catalyst devices 5-13
Catalyst switches and 7600 Series routers 67-1
Cisco IOS routers 5-13, 60-3
frequently asked questions 5-27
IPS devices 5-14
network masks 6-80
object groups 5-14
on existing devices 5-15
overview 1-19
policy objects 5-14
preserving ACL names 12-4
resolving ACL naming conflicts 12-6
security contexts 5-13
understanding 5-12
viewing task status 5-22
VPNs 5-12
web VPN restrictions 3-8
Policy Discovery Status command 1-33
Policy Discovery Status page 5-25
Policy Dynamic Translation Rule
PIX/ASA/FWSM 24-24
add/edit 24-25
policy list objects
properties 55-135
policy management
Settings page 11-60
Policy Management page 11-60
policy maps
understanding 6-76
Policy menu
command reference 1-31
Policy Object Manager
field reference 6-4
shortcut menu 6-8
undocking and docking the window 6-8
Policy Object Manager window
creating overrides 6-19
deleting overrides 6-21
Policy Object Overrides window 6-20
policy objects
AAA server
HTTP-FORM settings 6-44
Kerberos settings 6-38
LDAP settings 6-39
NT settings 6-42
RADIUS settings 6-35
SDI settings 6-43
TACACS+ settings 6-37
AAA server groups
attributes 6-49
creating 6-47
default server groups on IOS devices 6-31
predefined authentication groups 6-30
understanding 6-27
AAA servers
creating 6-32
supported additional types for ASA/PIX/FWSM 6-28
supported types 6-28
understanding 6-27
access control lists
creating 6-52
extended objects 6-53
standard objects 6-55, 6-57
web objects 6-56
ASA group policies
client configuration settings 34-7
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-11
split tunneling settings 34-31
SSL VPN clientless settings 34-13
SSL VPN full client settings 34-19
SSL VPN settings 34-24
technology settings 34-1
AS paths
properties 55-143
basic procedures 6-9
categories, using 6-13
changes in Security Manager 4.4 1-9
Cisco Secure Desktop configuration
creating 33-18
class map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
cloning (duplicating) 6-13
community lists
properties 55-145
configuring for ASA routing policies 55-124
configuring for remote access VPN 34-1
connection with policy management 5-7
creating 6-9
credentials
attributes 28-9
DCE/RPC policy map
properties 17-28
deleting 6-16
DNS policy map
properties 17-31
editing 6-12
ESMTP policy map
properties 17-37
exporting 6-23
file objects
attributes 34-36
selecting 34-38
FlexConfig
creating text objects 7-32
properties 7-30
property selector 7-34
undefined variables 7-33
FlexConfigs
adding to policies 7-35
changing order in policies 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 62-84
creating 7-28
previewing CLI 7-35
removing from policies 7-35
system variables 7-7
understanding 7-2
variables 7-5, 7-6
FTP policy map
properties 17-40
generating usage reports 6-14
GTP policy map
properties 17-43
H.323 (ASA/PIX/FWSM) policy map
properties 17-48
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy map
properties 17-53
HTTP (ASA7.2+/PIX7.2+) policy map
properties 17-61
identity user group
creating 13-19
selecting 13-21
user identity acquisition 13-2
IKE proposals
v1 properties 26-10
v2 properties 26-13
IM (ASA7.2+/PIX7.2+) policy map
properties 17-67
IM (IOS) policy map
properties 17-70
importing 6-23
Inspect parameter map
properties 21-31
interface roles
creating 6-72
understanding 6-71
IP Options policy map
properties 17-71
IPsec Pass Through policy map
properties 17-77
IPSec transform sets
attributes 26-25
understanding 26-19
IPv6 policy map
properties 17-74, 17-88
LDAP attribute map objects
attributes 6-45
Local Web Filter parameter map
properties 21-38
managing 6-1
maps
understanding 6-76
N2H2 parameter map
properties 21-39
NetBIOS policy map
properties 17-78
network/host
optimizing when deploying firewall rules 12-35
understanding 6-78
using in Event Viewer filters 68-65
network/host objects
naming when provisioned as object groups 6-99
networks/hosts
creating 6-80
unspecified value objects 6-84
object selectors 6-2
overrides 3-50
allowing 6-18
creating for multiple devices 6-19
creating for single device 6-19
deleting 6-21
managing 6-17
understanding 6-17
overview 1-19
parameter map
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
PKI enrollments
defining CA server properties 26-57
defining certificate attributes 26-63
defining enrollment parameters 26-61
defining trusted CA hierarchy 26-64
properties 26-55
policy discovery 5-14
policy lists
properties 55-135
policy map
creating for inspection rules 17-21
creating for zone-based firewall content filtering 21-36
creating for zone-based firewall inspection 21-16
pools
understanding 6-87
port forwarding lists
properties 34-39
port list objects
naming when provisioned as object groups 6-99
port lists
creating 6-92
properties 6-94
prefix lists
properties 55-138, 55-140
Protocol Info parameter map
properties 21-33
provisioning as object groups 6-98
regular expression group policy map
properties 17-100
regular expression objects
metacharacters 17-101
regular expression policy map
properties 17-100
route maps 55-128
creating 55-124
understanding 55-124
security group
creating 14-14
selecting for policies 6-2
service objects
naming when provisioned as object groups 6-99
provisioning as object groups 6-100
services
creating 6-92
Settings page 11-62
sharing with PRSM 71-29
single sign-on server
properties 34-41
SIP (ASA/PIX/FWSM) policy map
properties 17-80, 17-90, 17-98
Skinny policy map
properties 17-84
SLA monitors
attributes 51-10
configuring 51-9
understanding 51-8
SNMP policy map
properties 17-87
SSL VPN bookmark
configuring 31-80
post URL method and macro substitutions 31-82
SSL VPN Customization
configuring 31-75
creating custom Logon page 31-79
localizing 31-78
SSL VPN gateway
properties 34-63
SSL VPN smart tunnel auto sign-on lists
attributes 34-70
SSL VPN smart tunnel lists
attributes 34-65, 34-68
configuring 31-83
TCP Map policy map
properties 57-21
text
creating 7-32
time ranges
attributes for recurring ranges 6-71
configuring 6-70
traffic flow
default inspection traffic 57-19
properties 57-17
Trend parameter map
properties 21-42
TrustSec security group
selecting 14-16
URLF Glob parameter map
properties 21-45
URLF Glob parameter maps
metacharacters 21-46
URL Filter parameter map
properties 21-43
user groups
advanced PIX 6.3 settings 34-81
browser proxy settings 34-86
clientless settings 34-82
client VPN software update (IOS) settings 34-80
DNS/WINS settings 34-76
general settings 34-74
IOS client settings 34-77
IOS Xauth settings 34-79
split tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN connection settings 34-87
SSL VPN full tunnel settings 34-83
SSL VPN split tunneling settings 34-85
technology settings 34-72
thin client settings 34-83
viewing details 6-14
Web Filter policy map
properties 21-47
Websense parameter map
properties 21-39
WINS server lists
attributes 34-89
creating 31-85
Policy Objects command 1-33
policy objects interface
Interface Role dialog box 6-73
SSL VPN Bookmark Entry dialog box 34-44
SSL VPN bookmarks
Add or Edit Bookmarks dialog boxes 34-43
Post Parameters dialog box 34-47
Policy Objects page 11-62
policy query
example report 12-34
generating reports 12-28
interpreting report results 12-32
Querying Device or Policy dialog box 12-29
Policy Query Results dialog box 12-32
Policy view
Assignments tab 5-54
creating shared policies 5-54
deleting shared policies 5-56
filtering shared policy selector 1-44
modifying assignments 5-54
overview 1-15
selectors 5-52
Shared Policy selector options 5-53
understanding 5-50
Policy View command 1-31
pool objects
understanding 6-87
POP3
configuring for inspection rules 17-20
POP3 class map objects
creating 21-16
match criteria 21-24
POP3 policy map objects
creating 21-16
match conditions and actions 21-35
port application mapping
see PAM 21-69
port forwarding list objects
properties 34-39
port list objects
creating 6-92
naming when provisioned as object groups 6-99
properties 6-94
ports
ASA 5505
configure 46-49
Posture ACL dialog box 36-29
PPP dialog box
MLP tab 61-79
PPP tab 61-77
PPPoE Users 46-54
preferences, user
PIX/ASA/FWSM 59-1
Deployment page 59-1
Transactional Commit page 59-2
prefix list objects
properties 55-138, 55-140
pre-provisioning devices 3-25
preshared keys
aggressive mode negotiation 26-46
compared to certificates 26-8
configuring policies for IKEv1 site-to-site VPNs 26-46
FQDN (fully qualified domain name) negotiation 26-45
main mode address negotiation 26-45
understanding 26-45
Preview Configuration command 1-34
Prime Security Manager
see PRSM 71-27
Prime Security Manager command 1-36
print
Report Manager reports 69-27
Print command 1-30
priority queues
PIX/ASA/FWSM
configuration 57-4
page 57-4
Product Authorization Key (PAK) 10-16
productivity categories for Trend class maps 21-20
prompt
configuring on firewall devices 48-12
properties
changes with policy effects 3-52
changing critical device 3-51
image version changes with no policy effects 3-51
understanding device 3-6
viewing or changing device 3-39
Property Selector dialog box 7-34
protected networks
defining in GET VPN topologies 25-59
defining in VPN topologies 25-33
Protected Networks tab 25-45
Protocol Independent Multicast 54-11
Protocol Info parameter map objects
properties 21-33
Protocol Info Parameters map object
creating 21-16
Protocol Map dialog box 41-12
protocols
selecting for inspection 17-3
Protocol tab
IGMP 54-3
proxies
defining HTTP/HTTPS for SSL VPN (ASA) 31-55
proxy ARP
enabling on IOS routers 61-19
proxy bypass rules
defining HTTP/HTTPS for SSL VPN (ASA) 31-55
proxy server
configuring HTTP for IPS global correlation 36-24
PRSM
sharing
devices 71-29
policy objects 71-29
starting from Security Manager 71-27
public key infrastructure (PKI) policies
compared to certificates 26-8
configuring for remote access VPNs 26-54
configuring for site-to-site VPNs 26-51
PVC Advanced Settings dialog box
OAM-PVC tab 61-68
OAM tab 61-66
PVC dialog box
Protocol tab 61-63
QoS tab 61-60
Settings tab 61-57
PVC policies
unable to deploy 9-15
Q
QoS
MPC rule wizard
tab 57-8
PIX/ASA/FWSM
identity-aware rules 13-21
rules 57-5
QoS Class dialog box 65-23
Edit ACLs dialog box 65-25
Marking tab 65-26
Matching tab 65-24
Policing tab 65-29
Queuing and Congestion Avoidance tab 65-27
Shaping tab 65-31
QoS queuing
default class 65-6
defining for classes 65-16
tail drop vs. WRED 65-4
understanding 65-4
understanding LLQ 65-5
quality of service (QoS)
CEF requirements 65-2
defining on control plane 65-12
defining on interfaces 65-10
defining policies 65-10
on Cisco IOS routers 65-1
QoS Class dialog box 65-23
QoS Policy dialog box 65-21
Quality of Service Policy page 65-19
understanding
Control Plane Policing 65-9
default class queuing 65-6
low-latency queuing 65-5
marking parameters 65-3
matching parameters 65-2
policing parameters 65-6
queuing parameters 65-4
shaping parameters 65-6
tail drop and WRED 65-4
token-bucket mechanism 65-8
quality of service (QoS) classes
defining marking parameters 65-15
defining matching parameters 65-13
defining policing parameters 65-17
defining queuing parameters 65-16
defining shaping parameters 65-18
query
CS-MARS
access rule events 71-49
IPS signature events 71-51
looking up policies based on related events 71-52
overview 71-48
troubleshooting 71-47
Event Viewer
access rule events 68-54
IPS signature events 68-55
looking up policies based on related events 68-52
overview 68-53
Querying Device or Policy dialog box 12-29
quick filter
searching for events 68-45
Quick Launch for IP Intelligence 71-41
R
RADIUS
description 6-28
settings in AAA server objects 6-35
RAM
Image Manager 72-17
rate limiting, IPS 43-4
Real-time Log Viewer 71-25
recovery
event data store 68-34
Recurring Ranges dialog box 6-71
Redeploy a Job dialog box 8-52
Redeploying Licenses dialog box 11-58
rediscovering
remote access VPNs 30-12
rediscovering site-to-site VPNs 25-26
Rediscover VPN Policies wizard 25-26
redundant interfaces 46-8
red X in device selector, troubleshooting 9-8
Refresh Map command 1-32
regular expression group objects
properties 17-100
regular expression objects
metacharacters 17-101
properties 17-100
regular IPsec
mandatory and optional policies 25-6
supported platforms 25-9
supported platforms for remote access VPNs 30-8
Reject Activity command 1-35
Reject Activity dialog box 4-21
Reject Deployment Job dialog box 8-20, 8-39
remote access
user
logging off 70-28
remote access VPN
system variables 7-19
Remote Access VPN Configuration wizard
IPsec VPN
Defaults page 30-29
IPsec Settings page (ASA) 30-28
IPsec VPN Connection Profile page (ASA) 30-27
User Groups page 30-35
IPsec VPNs
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
SSL VPN
Access page (ASA) 30-15
Connection Profile page (ASA) 30-16
Gateway and Context Page (IOS) 30-32
Portal Page Customization Page (IOS) 30-34
SSL VPNs
creating on ASA devices 30-14
creating on IOS devices 30-31
using 30-13
remote access VPNs
ASA devices
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
configuring using wizard 30-13
device support 30-8
discovering 30-12
IOS devices
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
IPsec 31-35
access policies for IKEv2 (ASA), configuring 31-48
access policies for IKEv2 (ASA), reference 31-43
access policies for IKEv2 (ASA), understanding 31-42
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1) 31-36
cluster load balancing 31-4, 31-5
configuring IKE and IPsec policies 26-1
connection profiles 31-6
connection profiles (ASA, PIX 7+) 31-8
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
Dynamic VTI/VRF Aware IPsec settings 33-7
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
high availability policies 33-11
IKE proposals 26-9
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
NAT settings 26-40
policy overview 30-9
policy overview (ASA, PIX 7.0+) 31-2
policy overview (IOS, PIX 6.3) 33-2
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
understanding 30-2
understanding IKE 26-5
understanding NAT settings 26-39
user group policies for IOS, PIX 6.3 33-13
VPNSM, VPN SPA, VSPA settings 33-6
IPsec proposals
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring for ASA and PIX 7.0+ devices 31-39
configuring for IOS and PIX 6.3 devices 33-3
managing 30-1
managing (ASA, PIX 7.0+) 31-1
managing (IOS, PIX 6.3) 33-1
rediscovering 30-12
SSL 31-42
access modes 30-4
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
advanced settings (ASA) 31-70
AnyConnect client image settings (ASA) 31-63
AnyConnect client settings (ASA) 31-60, 31-62
AnyConnect custom attributes(ASA) 31-68, 31-69
browser plug-ins (ASA) 31-58
cluster load balancing 31-4, 31-5
configuring HTTP/HTTPS proxies and proxy bypass(ASA) 31-55
connection profiles 31-6
connection profiles (ASA) 31-8
content rewrite rules (ASA) 31-51
Context Editor dialog box (IOS) 33-15, 33-16
creating on ASA 30-14
creating on IOS devices 30-31
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
encoding rules (ASA) 31-53
example 30-3
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
Kerberos Constrained Delegation (KCD on ASA) 31-64, 31-66
limitations 30-7
managing support files 30-5
NAT settings 26-40
other settings (ASA) 31-49
performance settings (ASA) 31-50
policies (IOS) 33-14
policy overview 30-9
policy overview (ASA, PIX 7.0+) 31-2
policy overview (IOS, PIX 6.3) 33-2
prerequisites 30-7
proxy bypass rules (ASA) 31-57
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
server certificate verification (ASA) 31-29, 31-31, 31-71
shared license (ASA) 31-72
shared license clients (ASA) 31-73
shared license servers (ASA) 31-74
understanding 30-2
understanding NAT settings 26-39
wizard 30-13
understanding 30-1
Remote Detection Indication (RDI) cells 61-50
Rename Policy Bundle dialog box 5-58, 5-59
Rename Policy command 1-31
Rename Policy dialog box 5-48
Rendezvous Point
PIX/ASA/FWSM
add/edit 54-16
Rendezvous Points
PIM 54-15
Report Manager
arranging window 69-29
closing 69-31
configuring default settings 69-28
configuring devices to provide reports 69-3
configuring Event Manager service 68-29
configuring schedules 69-33
creating custom reports 69-21
deleting another user’s custom reports 69-31
deleting reports 69-31
deleting schedules 69-35
disabling schedules 69-35
drill-down reports 69-26
editing report settings 69-22
enabling schedules 69-35
examples of analysis
monitoring botnet activity 68-61
exporting reports 69-28
generated report pane and toolbar 69-12
generating reports 69-20
managing custom reports 69-31
opening reports 69-20
overview 69-1, 69-6
printing reports 69-27
renaming reports 69-30
report list 69-9
report settings 69-10
saving reports 69-30
scheduling reports 69-32
settings page 11-36
troubleshooting 69-35
understanding 69-1
understanding access control 69-5
understanding data aggregation 69-4
understanding predefined reports
firewall summary botnet reports 69-15
firewall traffic reports 69-14
general IPS reports 69-18
general VPN reports 69-16
IPS top reports 69-17
overview 69-13
VPN top reports 69-16
using 69-19
viewing schedule results 69-34
viewing schedules 69-32
Report Manager command 1-37
Report Manager in Dashboard 71-2
reports
arranging windows 69-29
closing 69-31
configuring default settings for reports 69-28
configuring devices for Report Manager reporting 69-3
configuring schedules 69-33
creating custom 69-21
deleting 69-31
deleting another user’s in Report Manager 69-31
deleting schedules 69-35
deployment status 10-30
disabling schedules 69-35
discovery status 10-30
drilling down 69-26
editing settings 69-22
enabling schedules 69-35
example policy query 12-34
exporting 69-28
generating 69-20
generating access rule analysis 16-33
generating policy query 12-28
interpreting policy query 12-32
managing 69-1
managing custom 69-31
opening 69-20
overview of available types 69-2
predefined Report Manager
firewall summary botnet reports 69-15
firewall traffic reports 69-14
general IPS reports 69-18
general VPN reports 69-16
IPS top reports 69-17
overview 69-13
VPN top reports 69-16
printing 69-27
renaming 69-30
Report Manager
generated report pane and toolbar 69-12
overview 69-6
report list 69-9
report settings 69-10
saving 69-30
scheduling in Report Manager 69-32
understanding Report Manager 69-1
understanding Report Manager access control 69-5
understanding Report Manager data aggregation 69-4
using Report Manager 69-19
viewing schedule results 69-34
viewing schedules 69-32
reputation
configuring global correlation 42-5
understanding IPS global correlation 42-2
Request Filter
PIM 54-18, 54-20
Resources
FWSM 51-3
add/edit 51-3
managing 51-2
restorebackup.pl command 10-27
restore database 10-27
Resume Deployment Schedule dialog box 8-20, 8-58
retry count
device communication 11-22
reverse route injection 26-20
RIP
PIX/ASA/FWSM 55-111
(PIX/ASA 6.3–7.1, FWSM) 55-112
(PIX/ASA 6.3–7.1, FWSM) configuration 55-113
(PIX/ASA 7.2+) 55-114
(PIX/ASA 7.2+) Filtering 55-118
(PIX/ASA 7.2+) Filtering configuration 55-119
(PIX/ASA 7.2+) Interface 55-119
(PIX/ASA 7.2+) Interface configuration 55-120
(PIX/ASA 7.2+) Redistribution 55-117
(PIX/ASA 7.2+) Redistribution configuration 55-117
(PIX/ASA 7.2+) Setup 55-115
RIP routing
Cisco IOS routers
Authentication dialog box 66-47
Authentication tab 66-46
defining interface authentication 66-43
defining setup parameters 66-42
overview 66-42
redistributing routes 66-44
Redistribution Mapping dialog box 66-49
Redistribution tab 66-48
RIP Routing Policy page 66-45
Setup tab 66-45
roles, IPS user 36-15
rollback
archived configuration files 8-70
last deployed configuration 8-68
when deploying to file 8-71
Rollback a Job dialog box 8-68
round robin allocation
PAT 24-41
routed ports
Create and Edit Interface dialog boxes-Routed Port mode 67-12
understanding 67-5
route map objects
creating 55-124
properties 55-128
understanding 55-124
Router Block Interface dialog box 43-15
Router Device dialog box 43-14
router platform interface
802.1x Policy page 63-5
AAA policy
AAA Policy page 62-6
Accounting tab 62-10
Authentication tab 62-6
Authorization tab 62-7
Command Accounting dialog box 62-12
Command Authorization dialog box 62-9
accounts and credentials policy
Accounts and Credentials Policy page 62-15
User Accounts dialog box 62-17
ADSL policy
ADSL Policy page 61-36
ADSL Settings dialog box 61-37
advanced interface settings policy
Advanced Interface Settings dialog box 61-16
Advanced Interface Settings page 61-15
BGP policy
BGP Neighbors dialog box 66-6
BGP Redistribution tab 66-6
BGP Routing Policy page 66-4
BGP Setup tab 66-4
Redistribution Mapping dialog box 66-7
bridging policy
Bridge Group dialog box 62-21
Bridging Policy page 62-20
CEF interface policy 61-25
CEF Interface Settings dialog box 61-26
Clock Policy page 62-23
console policy
AAA tab 62-44
Accounting tab 62-47
Authentication tab 62-44
Authorization tab 62-45
Command Accounting dialog box 62-61
Command Authorization dialog box 62-60
Console Policy page 62-42
Setup tab 62-42
CPU Policy page 62-26
DHCP policy
DHCP Database dialog box 62-94
DHCP Policy page 62-92
IP Pool dialog box 62-94
dialer interface policy
Dialer Physical Interface dialog box 61-32
Dialer Policy page 61-30
Dialer Profile dialog box 61-31
DNS policy
IP Host dialog box 62-76
DNS Policy page 62-76
EIGRP policy
EIGRP Routing Policy page 66-13
Interface dialog box 66-16
Interfaces tab 66-15
Redistribution Mapping dialog box 66-18
Redistribution tab 66-17
Setup dialog box 66-14
Setup tab 66-13
Hostname Policy page 62-78
HTTP policy
AAA tab 62-32
Command Authorization Override dialog box 62-34
HTTP Policy page 62-31
Setup tab 62-31
interfaces policy
Create Router Interface dialog box 61-8
Interface Auto Name Generator dialog box 61-12
Router Interfaces page 61-7
IPS interface policy
IPS Monitoring Information dialog box 61-23
IPS Module interface policy
IPS Module Interface Policy Page 61-22
logging policy
Syslog Server dialog box 64-11
logging setup policy
Logging Setup Policy page 64-7
Memory Policy page 62-79
NAC policy
Identities tab 63-18
Identity Action dialog box 63-19
Identity Profile dialog box 63-19
Interface Configuration dialog box 63-17
Interfaces tab 63-16
NAC Policy page 63-14
Setup tab 63-14
NAT policy
Dynamic Rule dialog box 24-11
Interface Specification tab 24-6
Static Rule dialog box 24-7
Static Rules tab 24-6
NetFlow policy 64-5, 64-12
NTP policy
NTP Policy page 62-98
NTP Server dialog box 62-99
OSPF policy
Area dialog box 66-37
Area tab 66-36
Interface dialog box 66-31
Max Prefix Mapping dialog box 66-41
OSPF Interface Policy page 66-30
OSPF Process Policy page 66-34
Redistribution Mapping dialog box 66-39
Redistribution tab 66-38
Setup dialog box 66-35
Setup tab 66-35
PPP/MLP policy
PPP/MLP Policy page 61-75
PPP dialog box 61-76
PVC policy
Define Mapping dialog box 61-64
PVC Advanced Settings dialog box 61-65
PVC dialog box 61-55
PVC Policy page 61-54
QoS policy
QoS Class dialog box 65-23
QoS Policy dialog box 65-21
Quality of Service Policy page 65-19
RIP policy
Authentication dialog box 66-47
Authentication tab 66-46
Redistribution Mapping dialog box 66-49
Redistribution tab 66-48
RIP Routing Policy page 66-45
Setup tab 66-45
Secure Device Provisioning Policy page 62-85
Secure Shell Policy page 62-64
SHDSL policy
Controller Auto Name Generator dialog box 61-45
SHDSL Controller dialog box 61-42
SHDSL Policy page 61-41
SNMP policy
Permission dialog box 62-70
SNMP Policy page 62-69
SNMP Traps dialog box 62-72
Trap Receiver dialog box 62-71
static routing policy
Static Routing dialog box 66-52
Static Routing Policy page 66-51
syslog servers policy
Syslog Servers Policy page 64-10
VTY policy
Command Accounting dialog box 62-61
Command Authorization dialog box 62-60
VTY Line dialog box 62-51
VTY Policy page 62-50
router platform policies
Device Admin policies
AAA 62-2
accounts and credentials 62-13
CPU settings 62-25
DHCP 62-87
DNS 62-74
host and domain names 62-77
HTTP 62-28
line access 62-35
memory settings 62-78
optional SSH settings 62-63
Secure Device Provisioning (SDP) 62-81
SNMP 62-66
time zone settings 62-22
transparent bridging 62-18
Identity policies
802.1x 63-1
Network Admission Control (NAC) 63-8
Interface policies
ADSL 61-33
advanced settings 61-13
basic settings 61-1
dialer interfaces 61-27
PPP 61-70
PVC 61-46
SHDSL 61-40
Logging policies 64-1
NAT 24-5
dynamic rules 24-10
static rules 24-6
timeouts 24-13
NetFlow policies 64-1
Network Time Protocol (NTP) 62-96
quality of service (QoS) 65-1
Routing policies
BGP routing 66-1
EIGRP routing 66-8
OSPF routing 66-19
RIP routing 66-42
static routing 66-50
routers
adding SSL thumbprints manually 9-4
CEF interface settings policies 61-24
Cisco Discovery Protocol (CDP) settings 61-18
CNS call-home mode 2-9
CNS event-bus mode 2-8
communication requirements 2-1
configuring SSH 2-6
default transport protocol for 12.1 and 12.2 11-22
default transport protocol for 12.3 and above 11-22
deploying configurations using TMS 8-42
enabling directed broadcasts 61-20
enabling Maintenance Operation Protocol (MOP) 61-19
enabling NBAR protocol discovery 61-19
enabling proxy ARP 61-19
enabling unicast reverse path forwarding (RFP) 61-20
enabling virtual fragment reassembly (VFR) 61-19
FlexConfig object samples 7-24
generating interface names 61-4
ICMP message settings 61-18
IPS Module interface settings policies 61-22
licenses 2-12
mixing deployment methods 9-13
selecting policy types to manage 5-11
setting up SSL (HTTPS) 2-4
SSL certificate configuration 11-22
system variables 7-13
troubleshooting deployment 9-14
Route Tree
PIM 54-17
routing
PIX/ASA/FWSM
about EIGRP 55-33
about OSPF 55-67
about OSPFv3 55-93
authentication 55-67
BGP 55-2, 55-3
BGP - General tab 55-5
BGP - IPv4 Family - Aggregate Address configuration 55-9, 55-22
BGP - IPv4 Family - Filter configuration 55-10
BGP - IPv4 Family - General tab 55-7, 55-21
BGP - IPv4 Family - Neighbor configuration 55-11, 55-24
BGP - IPv4 Family - Network configuration 55-17, 55-29
BGP - IPv4 Family - Redistribution configuration 55-18, 55-30
BGP - IPv4 Family - Route Injection configuration 55-19, 55-31
BGP - IPv4 Family tab 55-6, 55-20
configuring on 55-1
configuring static routes 55-120
EIGRP 55-32
EIGRP - advanced settings 55-34
EIGRP - Filter Rule configuration 55-40
EIGRP - Filter Rules tab 55-39
EIGRP - Interface configuration 55-48
EIGRP - Interfaces tab 55-47
EIGRP - neighbor configuration 55-42
EIGRP - Neighbors tab 55-41
EIGRP - redistribution configuration 55-44
EIGRP - Redistribution tab 55-42
EIGRP - Setup tab 55-36
EIGRP - Summary Address configuration 55-46
EIGRP - Summary Address tab 55-45
IPv6 Static Route configuration 55-123
No Proxy ARP 55-1
OSPF 55-67
OSPF - advanced settings 55-69
OSPF - Area/Area networks 55-74
OSPF - Area Range 55-76
OSPF - Area tab 55-73
OSPF - Filtering configuration 55-85
OSPF - Filtering tab 55-84
OSPF - Filter Rule configuration 55-86
OSPF - Filter Rule tab 55-86
OSPF - General tab 55-68
OSPF - Interface configuration 55-90
OSPF - Interface tab 55-88
OSPF - Neighbors tab 55-77
OSPF - Range tab 55-76
OSPF - Redistribution rule 55-79
OSPF - Redistribution tab 55-78
OSPF - static neighbor 55-77
OSPF - Summary Address configuration 55-88
OSPF - Summary Address tab 55-87
OSPFv3 55-92, 55-93
OSPFv3 - advanced settings 55-96
OSPFv3 - Area/Area networks 55-100
OSPFv3 - Area Range 55-102
OSPFv3 - Area tab 55-100
OSPFv3 - Interface configuration 55-106
OSPFv3 - Interface tab 55-106
OSPFv3 - Process tab 55-95
OSPFv3 - Redistribution rule 55-104
OSPFv3 - static neighbor 55-110
OSPFv3 - Summary Prefix configuration 55-105
OSPFv3 - Virtual Link configuration 55-103
OSPF - Virtual Link configuration 55-82
OSPF - Virtual Link MD5 configuration 55-83
OSPF - Virtual Link tab 55-81
RIP (PIX/ASA 6.3–7.1, FWSM) 55-112
RIP (PIX/ASA 6.3–7.1, FWSM) configuration 55-113
RIP (PIX/ASA 7.2+) 55-114
RIP (PIX/ASA 7.2+) Filtering 55-118
RIP (PIX/ASA 7.2+) Filtering configuration 55-119
RIP (PIX/ASA 7.2+) Interface 55-119
RIP (PIX/ASA 7.2+) Interface configuration 55-120
RIP (PIX/ASA 7.2+) Redistribution 55-117
RIP (PIX/ASA 7.2+) Redistribution configuration 55-117
RIP (PIX/ASA 7.2+) Setup 55-115
RIP page 55-111
static null 0 routing 55-120
Static Route configuration 55-122
VPNs with routing processes 9-13
routing redistribution
BGP Redistribution Mapping dialog box 66-7
BGP Redistribution tab 66-6
EIGRP Redistribution Mapping dialog box 66-18
EIGRP Redistribution tab 66-17
into BGP 66-3
into EIGRP 66-12
into OSPF 66-22
into RIP 66-44
OSPF Max Prefix Mapping dialog box 66-41
OSPF Process Redistribution tab 66-38
OSPF Redistribution Mapping dialog box 66-39
RIP Redistribution Mapping dialog box 66-49
RIP Redistribution tab 66-48
RPC
configuring for inspection rules 17-20
RSA keys
generating, synchronizing for GET VPN 29-13
Rule Analysis Detail Report
generating 16-33
Rule Combiner Results dialog box 12-25
rule expiration
configuring for access rules 16-21
Rule Expiration page 11-65
rules
default 5-5
mandatory 5-5
rules tables
adding rules 12-9
columns and headings 1-48
commands, Edit menu 1-30
converting IPv4 rules 12-28
cut, copy, and paste rules 12-9
disabling rules 12-20
enabling rules 12-20
filtering 1-47
finding and replacing items 12-16
removing rules 12-9
sections 12-20
using 12-7
rule tables
moving rules 12-19
RX-Boot Mode Credentials dialog box 3-47
S
Save As command (Report Manager) 69-8
Save command 1-29
Save command (Report Manager) 69-8
Save Map As command 1-32
Save Map As dialog box 35-10
Save Map command 1-32
ScanSafe Web Security Settings 20-6
scenarios
creating FlexConfigs 7-25
SCEP (Simple Certificate Enrollment Protocol)
CA server authentication 26-49
Schedule dialog box 8-56
schedules
configuring in Report Manager 69-33
deleting in Report Manager 69-35
disabling in Report Manager 69-35
enabling in Report Manager 69-35
reports in Report Manager 69-32
viewing in Report Manager 69-32
viewing results in Report Manager 69-34
schedules, deployment
changes not deployed 8-55
creating or editing 8-55
including devices 8-8
suspending or resuming 8-58
viewing status and history 8-26
scripting language
examples
looping 7-3
looping with if/else statements 7-4
looping with two-dimensional arrays 7-3
FlexConfig objects 7-3
SDEE
subscriptions for IOS IPS 45-8
SDI
settings in AAA server objects 6-43
SDM
access rule look-up 71-26
device manager 71-23
searching for items 1-41
Secondary Interface Specific Authentication Server Groups dialog box 31-15
secure desktop manager policies
configuring 32-9
Secure Device Provisioning (SDP)
configuring AAA for administrative introducers 62-84
contents of bootstrap 62-82
defining policies 62-83
Secure Device Provisioning page 62-85
understanding
introducers 62-81
petitioners 62-81
registrars 62-81
TTI 62-81
workflow 62-82
SecureID servers (SDI)
description 6-29
Secure Shell
PIX/ASA/FWSM
add/edit SSH host 49-8
Secure Shell (SSH)
Cisco IOS routers
defining optional settings 62-63
optional settings overview 62-63
Secure Shell Policy page 62-64
PIX/ASA/FWSM 49-7, 49-8
security associations
GET VPN
using passive mode during migration 29-23
security certificate
invalid during discovery 9-6
security context
Failover page 50-25
security contexts
adding to failover group 2 50-7
admin context
overview 58-1
configuring multiple 58-2
configuring on firewall devices 58-1
deleting FWSM 58-7
discovering policies 5-13
FWSM 58-8
configuration 58-8
managing Resources 51-2
Resources 51-3
PIX/ASA
allocate interfaces 58-11
configuration 58-9
viewing allocated interfaces 58-11
PIX/ASA/FWSM
enabling multi-context mode 58-1
managing 58-7
restoring single-context mode 58-1
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions 8-64
rollback restrictions for failover devices 8-64
showing containment 3-54
security group aware firewall policies
configuring ISE settings 11-54
security group-aware firewall policies
configuring 14-7
managing 14-1
overview 14-1
security group objects
creating 14-14
security group tagging 46-38
Security Manager
access by CS-MARS 71-44
applications overview 1-6
archiving (backing up) the event data store 68-34
backing up and restoring database 10-24
Configuration Manager interface overview 1-13
configuring administrative settings 11-1
getting started 1-1
how permissions affect what you can do 1-10
initial configuration 1-24
installing client 1-11
integrating with Security Manager 71-42
integration with CS-MARS 71-43
logging into and exiting 1-11
managing the server 10-1
overview 1-1
recovering the event data store 68-34
reports overview 69-2
server cluster
managing 10-2
overview 10-2
splitting server 10-3
synchronizing shared policies 10-5
server management and administration 10-1
using 1-13
Security Manager Administration command 1-35
Security Manager Diagnostics command 1-35
Security Manager Online command 1-37
security policies
PIX/ASA/FWSM 56-1
General configuration 56-3
General page 56-1
timeouts 56-4
security ratings for Trend class maps 21-20
see LACP 46-11
Select Address Pool
PIX/ASA/FWSM Platform 24-23
Select Interfaces dialog box 35-20
selectors
filtering items 1-44
using 1-44
selector trees
selecting items 1-44
Select Policy Object dialog box 35-18
Select VPN to Configure dialog box 35-22
self near-end crosstalk (SNEXT) 61-45
Self zone 21-5
sensors, IPS
allowed hosts 36-7
anomaly detection
configuring 41-6
configuring histograms 41-11
configuring learning accept mode 41-8
configuring signatures 41-4
configuring thresholds 41-11
detection zones 41-3
managing 41-1
modes 41-2
understanding 41-1
understanding histograms 41-9
understanding thresholds 41-9
understanding worms 41-2
when to turn off 41-4
blocking
configuring 43-7
configuring ARC 43-1
configuring blocking devices 43-14
configuring master blocking sensors 43-13
configuring never block hosts and networks 43-17
configuring router blocking interfaces 43-15
configuring user profiles 43-12
configuring VLAN blocking interfaces 43-16
general options 43-10
master blocking sensor 43-6
policy 43-8
rate limiting 43-4
router and switch blocking devices 43-4
strategies 43-3
understanding 43-1
capturing network traffic 36-2
certificates 44-10
configuration overview 36-5
configuration overview for IOS IPS 45-4
configuring AAA 36-21
configuring Analysis Engine global variables 36-30
configuring DNS servers 36-24
configuring HTTP proxy server 36-24
configuring NTP 36-23
configuring OS maps 40-21
configuring SNMP 36-8
configuring target value ratings 40-17
configuring the external product interface 36-26
configuring user accounts 36-18
deployment of passwords 36-17
deployment topology 36-4
discovery of passwords 36-17
event actions
example filter rule 68-64
filter rule attributes 40-9
filter rules 40-4, 40-7
filter rules tips 40-6
network information 40-17
overrides 40-13
overview 40-1
possible actions 40-2
process overview 40-1
settings 40-23
getting started 36-1
global correlation
configuring 42-1
configuring inspection and reputation 42-5
configuring network participation 42-7
data collected 42-3
requirements and limitations 42-4
understanding 42-1
understanding network participation 42-3
understanding reputation 42-2
interfaces
configuring 37-6
configuring bypass mode 37-12
configuring CDP mode 37-12
configuring inline interface pairs 37-13
configuring inline VLAN pairs 37-14
configuring physical 37-9
configuring VLAN groups 37-15
deploying VLAN groups 37-5
inline interface mode 37-3
inline VLAN pair mode 37-3
interfaces policy 37-6
managing interface configurations 37-1
physical interface properties 37-10
promiscuous mode 37-2
roles 37-1
sensing modes overview 37-2
understanding 37-1
viewing summary 37-8
VLAN group mode 37-4
IPS modules for ASA 57-14
licenses
automating 44-3
managing 44-1
redeploying 44-2
updating 44-1
managing 44-1
managing user accounts and passwords 36-15
monitoring
removing false positive IPS events 68-64
passive OS fingerprinting 40-19
password requirements 36-20
rebooting 44-12
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
configuring settings 39-30
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
inheritance 39-3
parameters list 39-24
policy 39-4
shortcut menu 39-10
understanding 39-1
viewing update level 39-9, 39-13
traffic flow notifications 36-30
tuning recommendations 36-4
understanding managed and unmanaged passwords 36-16
understanding network sensing 36-1
understanding user roles 36-15
updates
automatically applying 44-6
checking for and downloading 44-5
configuring server 44-4
managing 44-4
manually applying 44-7
user account attributes 36-19
virtual sensors
advantages 38-3
assigning interfaces 38-4
attributes 38-7
configuring 38-1, 38-5
deleting 38-10
editing policies 38-9
identifying 38-5
inline TCP session tracking mode 38-3
Normalizer mode 38-4
renaming 38-8
restrictions 38-3
understanding 38-1
sensorupdate.properties 44-6
server
managing Security Manager 10-1
syslog
PIX/ASA/FWSM 53-21, 53-27
server, IPS update 44-4
server, Security Manager
configuring administrative settings 11-1
managing or administrating 10-1
Server Access
PIX/ASA/FWSM 52-1
AUS, add/edit server 52-3
AUS page 52-1
DDNS interface rule 52-19
DDNS page 52-18
DDNS update methods 52-19
DDNS update methods, add/edit 52-20
DHCP Relay, add/edit agent 52-6
DHCP Relay, add/edit server 52-7
DHCP Relay page 52-5
DHCP Server, add/edit 52-12
DHCP Server, advanced configuration 52-13
DHCP Server, options 52-13
DHCP Server page 52-10
DHCPv6 Relay, add/edit agent 52-9
DHCPv6 Relay, add/edit server 52-9
DHCPv6 Relay page 52-7
DNS page 52-14
DNS server, add 52-17
DNS server group 52-16
NTP page 52-21
NTP server configuration 52-21
SMTP page 52-22
TFTP server page 52-23
server cluster, Security Manager
managing 10-2
overview 10-2
splitting server 10-3
synchronizing shared policies 10-5
Server Load Balance page 27-17
server load balancing
configuring for large scale DMVPN 27-16, 27-17
server attributes in large scale DMVPN 27-17
Server Properties dialog box 3-36
Server Security page 10-2
Server Security Settings page 11-66
Service
ASA CX
Auth Proxy Configuration 57-16
PIX/ASA/FWSM
identity-aware IPS, QoS, and Connection Rules 13-21
IPS, QoS, and Connection Rules wizard 57-6, 57-8
policy wizard 57-6
priority queues 57-4
priority queues configuration 57-4
security group aware IPS, QoS, and Connection Rules 14-17
Service Policy Rules 57-5
traffic class 57-7
service, Event Manager
configuring 68-29
managing 68-29
monitoring event store disk space 68-33
monitoring status 68-30
selecting devices to monitor 68-32
starting or stopping 68-29
status icon colors 68-30
service agreement contracts 10-16
Service Contents dialog box 12-14
Service Device Provisioning (SDP)
on Cisco IOS routers 62-81
Service Module Credentials dialog box 3-18
Service Modules
Catalyst
firewalls 46-1
service objects
creating 6-92
naming when provisioned as object groups 6-99
provisioning as object groups 6-100
Services dialog box 6-95
understanding 6-92
service policy
configuring identity-aware rules 13-21
configuring security group aware rules 14-17
Service Policy (MPC) Rule Wizard 57-6
Connection Settings tab 57-8
CSC tab 57-8
CXSC tab 57-8
IPS tab 57-8
QoS tab 57-8
User Statistics tab 57-8
service policy rules
configuring on firewall devices 57-1
services
specifying 6-92
Set Linked Map dialog box 35-13
Settings
ScanSafe 20-6
settings
device communications 9-4
Settings, Event Actions policy 40-23
settings, report
editing 69-22
Settings pages
Autolink 11-3
CCO Settings 11-4
Configuration Archive 11-6
CS-MARS 11-7
CSM Mobile 11-9
Customize Desktop 11-10
Debug Options 11-11
Deployment 11-13
Device Communication 11-21
Device Groups 11-24
Discovery 11-25
Event Management 11-27, 11-33
CPU Throttling Policy 11-32
Health and Performance Monitor 11-35
Identity 11-36
Image Manager 11-38
IP Intelligence Settings 11-39
ISE 11-54
Licensing 11-54
Logs 11-59
Policy Management 11-60
Policy Objects 11-62
Report Manager 11-36
Rule Expiration 11-65
Server Security 11-66
Take Over User Session 11-67
Ticket Management 11-68
Token Management 11-69
VPN Policy Defaults 11-70
Workflow 11-71
SHA hash algorithm 26-6
Share Device Policies command 1-31
shared license clients
configuring 31-73
shared license servers
configuring 31-74
shared policies
cloning (copying) 5-47
Device view
adding local rules to selected device 5-45
assigning to selected device 5-44
modifying 5-48
modifying assignments 5-49
policy banner 5-38
sharing local 5-41
sharing multiple local policies 5-42
unsharing 5-43
working with 5-37
exporting 10-12
exporting with device inventory 10-6
importing 10-13
inheriting policies 5-46
Policy Bundle view
cloning 5-58
creating 5-57
renaming 5-58, 5-59
Policy view
creating 5-54
deleting 5-56
managing 5-50
modifying assignments 5-54
renaming 5-48
Site-to-Site VPN Manager
assigning to selected device 5-44
modifying assignments 5-49
sharing local 5-41
unsharing 5-43
working with 5-37
synchronizing among Security Manager servers 10-5
Shared Policy Assignments dialog box 5-49
Share Policies wizard 5-42
Share Policy command 1-31
Share Policy dialog box 5-41
SHDSL
Controller Auto Name Generator dialog box 61-45
defining controllers 61-40
on Cisco IOS routers 61-40
SHDSL Controller dialog box 61-42
SHDSL Policy page 61-41
shortcut menu commands
policies in Device view and Site-to-Site VPN Manager 5-40
Show Containment command 1-34
Show Devices On Map command 1-32
Show Devices on Map dialog box 35-16
Show Navigation Window command 1-32
Show VPN Peers dialog box 35-22
Show VPNs On Map command 1-32
Show VPNs on Map dialog box 35-21
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
configuring settings 39-30
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
finding from CS-MARS events 71-52
finding from Event Viewer events 68-52
inheritance 39-3
parameters list 39-24
policy 39-4
selecting category for Cisco IOS IPS 45-6
shortcut menu 39-10
tuning 68-64
tuning recommendations 36-4
understanding 39-1
updates
automatically applying 44-6
checking for and downloading 44-5
configuring server 44-4
managing 44-4
manually applying 44-7
viewing related CS-MARS events 71-51
viewing related events 68-55
viewing update level 39-9, 39-13
Signature Settings page 39-30
Signatures page
overview 39-4
shortcut menu 39-10
Simple Network Management Protocol
see SNMP 49-12
single sign on server (SSO) objects
properties 34-41
SIP (ASA, PIX) class map objects
creating 17-21
SIP (ASA/PIX/FWSM) policy map objects
creating 17-21
properties 17-80, 17-90, 17-98
SIP (IOS) class map objects
creating 21-16
match criteria 21-25
SIP (IOS) policy map objects
creating 21-16
match conditions and actions 21-35
SIP class map objects
match criteria 17-82, 17-92
SIP policy map objects
match conditions and actions 17-82, 17-92
Site-to-Site VPN Manager
assigning shared policies 5-44
copying shared policies 5-47
managing policies 5-30
modifying policy assignments 5-49
policy banner 5-38
policy shortcut menu 5-40
renaming policies 5-48
sharing local policies 5-41
unassigning policies 5-36
understanding shared policies 5-37
unsharing policies 5-43
Site-to-Site VPN Manager window 25-18
Site-to-Site VPN policy page (Device view) 25-19
site-to-site VPNs
accessing topologies and policies 25-17
configuring global settings
configuring fragmentation settings 26-30, 26-42
configuring IKEv2 settings 26-35
configuring ISAKMP/IPsec settings 26-31
configuring NAT settings 26-40
overview 26-29
understanding NAT settings 26-39
configuring IKE and IPsec policies 26-1
creating or editing Extranet VPN topologies 25-65
creating or editing VPN topologies 25-28
discovering 25-24
managing 25-1
rediscovering 25-26
repairing discovered VPNs with multiple spoke definitions 25-25
understanding discovery 25-19
understanding topologies 25-2
using device overrides to customize VPN policies 25-13
viewing summary of VPN configuration 25-61
Site-to-Site VPNs command 1-33
Skinny policy map objects
creating 17-21
match conditions and actions 17-86
properties 17-84
SLA monitor objects
attributes 51-10
configuring 51-9
understanding 51-8
Smartfilter (N2H2)
configuring for web filter rules policies 18-15, 18-19
configuring for zone based firewall rules policies 21-36, 21-39, 21-41
Smart Tunnel Auto Signon Entry dialog box 34-71
Smart Tunnel Auto Signon Lists dialog box 34-70
smart tunnels
configuring for ASA SSL VPNs 31-83
SMTP
configuring for inspection rules 17-19
preventing DoS attacks using zone based firewall 21-26
preventing spam using zone based firewall 21-26
SMTP class map objects
creating 21-16
match criteria 21-26
SMTP policy map objects
creating 21-16
match conditions and actions 21-35
SMTP server
configuring 1-26
PIX/ASA/FWSM 52-22
SNEXT 61-45
SNMP
about SNMP Version 3 49-14
Cisco IOS routers
defining agent properties 62-67
enabling traps 62-68
overview 62-66
Permission dialog box 62-70
SNMP Policy page 62-69
SNMP Traps dialog box 62-72
Trap Receiver dialog box 62-71
configuring for HPM S2S polling 70-37
configuring for IPS sensors 36-8
configuring on firewall devices 49-12
IPS general options 36-10
IPS trap options 36-11, 36-13
PIX/ASA/FWSM 49-15
groups 49-21
host access 49-20
MIBs 49-12
OIDs 49-12
SNMPv3 49-21, 49-22
Trap configuration 49-17
users 49-22
terminology 49-13
SNMP Credentials dialog box 3-47
SNMP policy map objects
creating 17-21
properties 17-87
SNMP Trap Communication dialog box 36-12, 36-14
SNMP Trap Communication tab, SNMP policy for IPS 36-11, 36-13
socket read timeout
device communication 11-22
Software Application Support contracts 10-16
Source Contents dialog box 12-14
spam
blocking spam using zone-based firewall rules 21-26
spoke-to-spoke connections, DMVPN 27-10
spoofing, preventing 56-1, 56-3
spoofing attacks, preventing 17-4
SSH
configuring on IOS routers, Catalyst switches, Catalyst 6500/7600 devices 2-6
line ending conventions 2-5
preventing non-SSH connections 2-7
setting up 2-5
testing authentication 2-5
troubleshooting connections 9-7
SSL
remote access SSL VPNs
advanced settings (ASA) 31-70
AnyConnect client settings (ASA) 31-60, 31-62
browser plug-ins 31-58
content rewrite rules (ASA) 31-51
encoding rules (ASA) 31-53
Kerberos Constrained Delegation (KCD on ASA) 31-64, 31-66
proxy bypass rules (ASA) 31-57
remote access VPNs 31-42
access modes 30-4
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
AnyConnect client image settings (ASA) 31-63
AnyConnect custom attributes (ASA) 31-68, 31-69
cluster load balancing 31-4, 31-5
configuring HTTP/HTTPS proxies and proxy bypass(ASA) 31-55
connection profiles 31-6
connection profiles (ASA) 31-8
Context Editor dialog box (IOS) 33-15, 33-16
creating on ASA 30-14
creating on IOS devices 30-31
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
example 30-3
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
limitations 30-7
managing support files 30-5
NAT settings 26-40
other settings (ASA) 31-49
performance settings (ASA) 31-50
policies (IOS) 33-14
prerequisites 30-7
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
server certificate verification (ASA) 31-29, 31-31, 31-71
shared license clients (ASA) 31-73
shared licenses (ASA) 31-72
shared license servers (ASA) 31-74
understanding 30-2
understanding NAT settings 26-39
wizard 30-13
setting up 2-3
troubleshooting certificate errors 9-4
VPN
sharing connection profiles on ASAs 30-8
SSL authentication certificates
adding thumbprints manually 9-4
configuring default settings for how handled 11-22
SSL VPN
policy discovery restriction 3-8
SSL VPN Access page (ASA) 31-43
SSL VPN bookmark objects
configuring 31-80
post URL method and macro substitutions 31-82
SSL VPN Bookmarks objects
SSL VPN Bookmarks dialog box 34-44
SSL VPN Configuration wizard
Access page (ASA) 30-15
Connection Profile page (ASA) 30-16
Gateway and Context Page (IOS) 30-32
Portal Page Customization Page (IOS) 30-34
SSL VPN Customization objects
configuring 31-75
creating custom Logon page 31-79
localizing 31-78
SSL VPN gateway objects
properties 34-63
SSL VPN Other Settings page (ASA)
Advanced tab 31-70
Client Settings tab 31-62
Content Rewrite tab 31-51
Encoding tab 31-53
Microsoft KCD Server tab 31-64, 31-66
overview 31-49
Performance tab 31-50
Proxy tab 31-55
SSL Server Verification tab 31-29, 31-31, 31-71
SSL VPN Policy page (IOS) 33-14
SSL VPNs
ASA devices
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
IOS devices
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
SSL VPN Shared License page (ASA) 31-72
SSL VPN smart tunnel auto sign-on list objects
attributes 34-70
SSL VPN smart tunnel list objects
attributes 34-65, 34-68
configuring 31-83
stateful failover 50-3, 50-4
site-to-site VPN 25-52
stateless failover 50-3
states
activity 4-4
ticket 4-4
static crypto maps 26-18
Static Group tab (IGMP) 54-6
static NAT
Cisco IOS routers
disable automatic aliasing 24-7
disable payload 24-9
on Cisco IOS routers 24-6
static null 0 routing 55-120
static routes
configuring on firewall devices 55-120
PIX/ASA/FWSM
configuration 55-122
static routing
Cisco IOS routers
defining on 66-50
overview 66-50
Static Routing dialog box 66-52
Static Routing Policy page 66-51
Static Rule
PIX/ASA/FWSM 24-26
add/edit 24-27
status
activity 4-4
ticket 4-4
subinterfaces 46-7, 46-14
specifying during policy definition 6-74
Submit Activity command 1-35
Submit Activity dialog box 4-20
Submit and Deploy command 1-29
Submit command 1-29
Submit Deployment Job dialog box 8-38
Submitted activity state 4-5
Submit Ticket command 1-36
Sun RPC class map objects
creating 21-16
match criteria 21-29
Sun RPC policy map objects
creating 21-16
match conditions and actions 21-35
support, technical
creating diagnostic file 10-28
generating data 10-28
generating deployment or discovery status reports 10-30
generating partial database backup 10-30
Suspend Deployment Schedule dialog box 8-20, 8-58
switches
communication requirements 2-1
SYN flooding attacks, preventing 17-4
syslog
access rule look-up 71-24
deeply parsed for Event Viewer 68-6
logging
PIX/ASA/FWSM 53-1
message properties 68-17
syslog messages supported for policy lookup 71-53
syslog relay
CPU throttling policy 11-32
syslogs
Cisco IOS routers 64-1
system variables
devices 7-7
firewall 7-9
FlexConfigs 7-7
remote access VPN 7-19
routers 7-13
VPN 7-14
T
tables
using 1-47
tables, rules
adding rules 12-9
columns and headings 1-48
commands, Edit menu 1-30
converting IPv4 rules 12-28
cut, copy, and paste rules 12-9
disabling rules 12-20
enabling rules 12-20
filtering 1-47
finding and replacing items 12-16
removing rules 12-9
sections 12-20
using 12-7
TACACS+
description 6-28
settings in AAA server objects 6-37
Take Over User Session page 11-67
Target Value Rating dialog box 40-19
Target Value Ratings, IPS Network Information policy 40-17
target value ratings (IPS) 40-17
task flow
deployment
non-Workflow mode 8-3
Workflow mode 8-5
taskflow 1-18
TCP Map objects
properties 57-21
TCP State Bypass
ASA/FWSM 57-3
Telnet
PIX/ASA/FWSM 49-24
configuration 49-25
text fields
ASCII limitations 1-49
finding text in multiple-line 1-49
navigating 1-49
using 1-48
text objects
creating 7-32
TFTP servers
PIX/ASA/FWSM 52-23
thin client access mode 30-4
thresholds
configuring anomaly detection 41-11
understanding anomaly detection 41-9
throughput
VPN user reports 69-16
ticketing
overview 1-19
Ticket Management
settings 11-68
ticket management
comparing workflow modes 1-21
Ticket Manager window 4-10
tickets
closing 4-16
creating 4-14
discarding 4-22
multiple users 4-4
opening 4-15
states 4-4
Ticket Manager window 4-10
understanding 4-1
using global search to find specific tickets 1-41
validating 4-18
viewing change reports 4-16
viewing status and history 4-23
working with 4-7
Tickets menu 1-35
tiered hub-and-spoke topologies 25-5
time
changing range for reports 69-22
timeouts
on firewall devices 56-4
timeouts (NAT)
Cisco IOS routers 24-13
Timeout Value
Firewall AAA 15-30
time range objects
attributes for recurring ranges 6-71
configuring 6-70
time slider (Event Viewer)
filtering with 68-42
using 68-24
time synchronization
on IOS routers 62-96
time zone settings
certificate errors 9-6
Cisco IOS routers
Clock Policy page 62-23
defining time zone and DST 62-22
overview 62-22
TMS
deploying configurations 8-42
deployment method 8-10
Token Management page 11-69
Token Management System (TMS)
settings 11-69
toolbar
activities 4-8, 4-9
toolbar reference
Configuration Manager 1-38
event table in Event Viewer 68-15
toolbars
Report Manager generated report 69-12
Report Manager report settings 69-10
Tools menu
Configuration Manager 1-33
Report Manager 69-8
Trace Route 71-32
TraceRoute 71-35
traffic class
PIX/ASA/FWSM
rules wizard 57-7
Traffic Classification dialog box 19-12
Traffic Classification tab 19-11
traffic encryption key (KEK), GET VPN 29-4
traffic flow notifications
configuring for IPS 36-30
traffic flow objects
default inspection traffic 57-19
properties 57-17
traffic match criteria 57-2
traffic zones 22-1
asymmetric routing 22-1
benefits 22-1
clustering 22-8
configuring 22-9
Equal-Cost Multi-Path (ECMP) 22-4
failover 22-8
firewall mode 22-8
guidelines 22-8
load balancing 22-1
lost route 22-1
prerequisites 22-7
security levels 22-6
supported services 22-6
understanding 22-6
transactional commit model 59-2
Transactional Commit page
PIX/ASA/FWSM Platform 59-2
transcripts
viewing 8-59
Transcript Viewer window 8-61
transform sets
attributes 26-25
understanding 26-19
Translation Exemption (NAT-0 ACL) Rule
PIX/ASA/FWSM 24-20
add/edit 24-21
Translation Options
PIX/ASA/FWSM 24-16, 24-17
Translation Rules
Add/Edit Per-Session NAT rules dialog boxes 24-47
ASA 8.3+ 24-33
Add/Edit NAT rules dialog boxes 24-36
per-session NAT rules 24-46
PIX/ASA/FWSM 24-19
translation table
clearing on deployment 59-1
transparent bridging
Cisco IOS routers
BVI interfaces 62-19
overview 62-18
defining bridge groups 62-20
transparent firewall
configuring on PIX/ASA/FWSM 47-1
NAT 24-16
transparent rules
adding or editing a rule 23-5
configuring 23-1
configuring DHCP passthrough for IOS devices 23-3
configuring in Map view 35-23
deleting 12-9
disabling 12-20
editing 12-10
editing the EtherType 23-6
editing the mask 23-7
enabling 12-20
managing 23-1
moving 12-19
Transparent Rules page 23-3
understanding processing order 12-2
Transparent Rules page 23-3
transport protocols
device defaults 11-22
overview of device requirements 2-1
transport settings
AUS 2-7
Configuration Engine 2-7
SSH 2-5
SSL (HTTPS) 2-3
traps, SNMP
configuring for IPS sensors 36-8
IPS options 36-11, 36-13
trees
selecting items 1-44
Trend class map objects
creating 21-36
Trend parameter map objects
creating 21-36
properties 21-42
troubleshooting
AUS deployment 9-18
Catalyst switch and module deployment 9-15
Configuration Engine deployment 9-18
creating diagnostics file 10-28
CS-MARS queries 71-47
deleted FWSM contexts do not remove configuration files 58-7
deployment 9-9
device communication and deployment 9-1
device discovery failures 3-7
device managers 71-23
device managers, using 71-21
devices marked with red X in device selector 9-8
error attempting to remove unreferenced object 9-12
Event Manager service status 68-30
Event Viewer Unavailable message 11-27, 11-35, 68-29
FlexConfigs 7-38
FWSM multiple-context deployment failures 9-17
generating data for TAC 10-28
generating deployment or discovery status reports 10-30
GET VPN registration failure 29-9
global correlation (IPS) configuration 42-4
ignoring device errors during deployment 9-10
invalid certificate error 9-6
minimum memory errors for ASA 8.3+ 9-11
mixing deployment methods 9-13
Not able to connect to server message, Report Manager 69-35
online help, problems accessing 1-51
packet capture, using 71-36
packet tracer, using 71-30
policy objects not available in Event Viewer 68-65
preshared key policies in VPN not discovered 25-23
Report Manager 69-35
router connection failures 2-2
router deployment 9-14
Security Manager cannot contact device after deployment 9-12
SSL certificate errors 9-4, 9-6
user interface problems 1-50
VPN crypto traffic unexpectedly dropped on GET VPN interfaces 29-9
VPNs with routing processes 9-13
VRF-aware IPsec deployment failures on Catalyst 6500/7600 devices 25-17
trunk ports
Create and Edit Interface dialog boxes-Trunk Port mode 67-14
understanding 67-5
Trusted Transitive Introduction (TTI)
use in SDP policies 62-81
TrustSec
Add/Edit Connection Peer dialog box 14-13
configuring connection peers 14-13
configuring ISE settings 11-54
configuring SXP 14-8
configuring SXP connection peers 14-12
security group objects
creating 14-14
SGT role mapping 14-11
TrustSec firewall policies
configuring 14-7
configuring rules 14-17
managing 14-1
TrustSec policies
monitoring 14-17
TrustSec security group objects
selecting 14-16
U
Unassign Policy command 1-31
Undock Map View command 1-32
unicast rekey in GET VPN 29-6
Unicast Reverse Path Forwarding 56-1, 56-3
unicast reverse path forwarding
enabling on routers 61-20
Unshare Policy command 1-31
Unspecified Bit Rate (UBR) 61-48
Unspecified Bit Rate Plus (UBR+) 61-48
Update Level dialog box 39-9, 39-13
updating images on devices 72-20
Updating Licenses from File dialog box 11-58
Updating Licenses via CCO dialog box 11-58
URLF Glob parameter map objects
metacharacters 21-46
properties 21-45
URL Filter parameter map objects
creating 21-36
properties 21-43
usage reports
generating 6-14
user accounts
configuring IPS 36-18
configuring IPS password requirements 36-20
discovery and deployment of IPS 36-17
IPS account attributes 36-19
managing IPS device 36-15
PIX/ASA/FWSM 51-7
add/edit 51-7
rolling back configurations 8-63
understanding IPS user roles 36-15
understanding managed and unmanaged passwords 36-16
User Accounts policy, IPS devices 36-18
user group objects
advanced PIX 6.3 settings 34-81
browser proxy settings 34-86
clientless settings 34-82
client VPN software update (IOS) settings 34-80
DNS/WINS settings 34-76
general settings 34-74
IOS client settings 34-77
IOS Xauth settings 34-79
split tunneling settings (Easy VPN/remote access IPSec VPN) 34-76
SSL VPN connection settings 34-87
SSL VPN full tunnel settings 34-83
SSL VPN split tunneling settings 34-85
technology settings 34-72
thin client settings 34-83
user group policies
configuring for Easy VPN 28-14
configuring for remote access IPsec VPNs on IOS/PIX 6.3 33-13
User Group Policy page 33-13
user identity acquisition 13-2
user interface
applications overview 1-6
basic features 1-28
dialog box too big for screen 1-51
freezing 1-50
how permissions affect what you can do 1-10
Java errors 1-51
maps toolbar reference 35-4
map view 35-1
menu reference for Configuration Manager 1-28
missing text 1-51
overview of Configuration Manager 1-13
rules tables 12-7
searching for items 1-41
selecting items in a tree 1-44
selecting or specifying files 1-49
table
columns and headings 1-48
sections 12-20
tables 1-47
text fields
ASCII limitations 1-49
finding text in multiple-line 1-49
navigating 1-49
using 1-48
toolbars
Configuration Manager 1-38
event table in Event Viewer 68-15
troubleshooting 1-50
wizards 1-46
user login credentials for device access 3-4
user passwords
changing 10-24
user preferences
PIX/ASA/FWSM 59-1
Deployment page 59-1
Transactional Commit page 59-2
user roles, IPS 36-15
users
how permissions affect what you can do 1-10
taking over configuration session 10-23
User Statistics
MPC rule wizard
tab 57-8
user statistics, collecting 13-25
user taskflow 1-18
V
Validate Activity command 1-35
Validate command 1-29
Validate Ticket command 1-36
Validation dialog box 4-18
validation error messages 4-18
Values Assignment dialog box 7-37
Variable Bit Rate-Non-Real Time (VBR-nrt) 61-48
Variable Bit Rate-Real Time (VBR-rt) 61-48
variables
deleting FlexConfig 7-28
FlexConfig objects 7-5, 7-6
changing variable values 7-35
VDI servers 34-16
Velocity Engine error message 7-38
Velocity Template Engine
scripting language 7-3
View Changes command 1-29, 1-35, 1-36
viewing interface allocations 58-11
View menu
Configuration Manager 1-30
Event Viewer 68-9
views
Device 1-14
Event Viewer
clearing filters 68-46
column based filters 68-43
event based filters 68-45
filtering overview 68-41
refreshing event table 68-42
selecting time range 68-41
switching between real-time and historical 68-40
text searches (quick filter) 68-45
using time slider with filtering 68-42
HPM 70-21
column-based filters 70-17
Map 1-17
overview 1-13
Policy 1-15
views (Event Viewer)
arranging 68-36
configuring color rules 68-38
creating custom 68-39
customizing event table appearance 68-37
deleting custom 68-41
editing description 68-39
editing name 68-39
Event Monitoring window overview 68-13
Event Viewer overview 68-7
floating 68-36
list 68-11
opening 68-36
overview 68-3
saving 68-40
using 68-35
virtual ASA
about 46-1
virtual channel identifier (VCI) 61-46
virtual firewalls
See security contexts
virtual fragment reassembly (VFR) 61-19
virtual path identifier (VPI) 61-46
Virtual Routing Forwarding (VRF)
VRF-Aware IPsec 25-14
virtual sensors
advantages 38-3
assigning interfaces 38-4
attributes 38-7
configuring 38-1, 38-5
deleting 38-10
discovering policies 5-14
editing policies 38-9
identifying 38-5
inline TCP session tracking mode 38-3
Normalizer mode 38-4
renaming 38-8
restrictions 38-3
showing containment 3-54
understanding 38-1
Virtual Sensors page 38-5
virtual terminal (VTY)
Cisco IOS routers
defining AAA settings 62-40
defining line groups 62-38
defining line setup parameters 62-38
virtual terminal (VTY) lines
Cisco IOS routers
VTY Line dialog box 62-51
VTY Policy page 62-50
VLAN
configuring IPS groups 37-15
configuring IPS inline pairs 37-14
VLAN ACLs (VACLs)
defining 67-37
deleting 67-38
understanding 67-36
VLAN access maps 67-37
VLANs
Catalyst switches and 7600 Series routers
Create and Edit VLAN ACL Content dialog boxes 67-41
Create and Edit VLAN ACL dialog boxes 67-41
Create and Edit VLAN dialog boxes 67-28
defining 67-26
defining Data Port for IDSM 67-46
defining EtherChannel for IDSM 67-44
defining groups 67-32
defining VACLs 67-37
deleting 67-27
deleting Data Port for IDSM 67-47
deleting EtherChannel for IDSM 67-45
deleting groups 67-33
deleting VACLs 67-38
Interfaces/VLANs page-VLANs tab 67-27
understanding 67-25
understanding VACLs 67-36
understanding VLAN groups 67-31
VLAN Access Lists page 67-39
VPDN groups 46-55
VPN
configuring policy defaults 11-70, 25-12
mixing deployment methods 9-13
policy discovery restriction for web VPNs 3-8
Report Manager reports
general VPN reports 69-16
VPN top reports 69-16
system variables 7-14
traffic sent unencrypted 9-14
updating routing processes 9-13
using device overrides to customize VPN policies 25-13
zone-based firewall 21-6
VPN default policies
configuring 25-12
factory defaults 25-12
understanding 25-12
VPN discovery
prerequisites 25-21
procedure 25-24
rules 25-21
supported and unsupported technologies and topologies 25-20
understanding 25-19
VPN global settings
GET VPN
VPN Global Settings for GET page 29-16
VPN Global Settings policy
General Settings tab 26-30, 26-42
IKEv2 tab 26-35
ISAKMP/IPsec tab 26-31
NAT Settings tab 26-40
VPN Peers dialog box 35-22
VPN Policy Defaults page 11-70
VPN rediscovery 25-26
VPNs
AAA services 48-4
ASA devices
configuring bookmarks 31-80
configuring portal appearance 31-75
configuring WINS servers for file system access 31-85
customizing 31-75
post URL method and macro substitutions in bookmarks 31-82
smart tunnels 31-83
configuring remote access using wizard 30-13
creating in Map view 35-21
Easy VPN
connection profiles 28-13
connection profiles (ASA, PIX 7+) 31-8
IOS devices
configuring bookmarks 31-80
configuring WINS servers for file system access 31-85
IPsec
access policies for IKEv2 (ASA), configuring 31-48
access policies for IKEv2 (ASA), reference 31-43
access policies for IKEv2 (ASA), understanding 31-42
certificate to connection profile map policy (IKEv1) 31-35
certificate to connection profile map rules (IKEv1) 31-36
cluster load balancing 31-4, 31-5
configuring IKE and IPsec policies 26-1
connection profiles 31-6
connection profiles (ASA, PIX 7+) 31-8
creating on ASA/PIX 7.0+ 30-24
creating on IOS/PIX 6.3+ 30-35
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
Dynamic VTI/VRF Aware IPsec settings 33-7
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
high availability policies 33-11
IKE proposals 26-9
IKEv2 authentication 26-65, 26-66, 26-69
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
NAT settings 26-40
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
understanding IKE 26-5
understanding NAT settings 26-39
user group policies for IOS, PIX 6.3 33-13
VPNSM, VPN SPA, VSPA settings 33-6
IPsec proposals
attributes for ASA and PIX 7.0+ devices 31-40
attributes for IOS and PIX 6.3 devices 33-4
configuring for ASA and PIX 7.0+ devices 31-39
configuring for IOS and PIX 6.3 devices 33-3
Map view 35-20
policy discovery 5-12
remote access
access modes 30-4
device support 30-8
discovering 30-12
managing 30-1
managing (ASA, PIX 7.0+) 31-1
managing (IOS, PIX 6.3) 33-1
SSL 31-42
remote access IPSec
understanding 30-2
remote access SSL
example 30-3
limitations 30-7
managing support files 30-5
prerequisites 30-7
understanding 30-2
shared policies 5-4
site-to-site
configuring IKE and IPsec policies 26-1
policies overview 25-8
site-to-site VPNs 25-1
SSL
access policies (ASA), configuring 31-48
access policies (ASA), reference 31-43
access policies (ASA), understanding 31-42
advanced settings (ASA) 31-70
AnyConnect client image settings (ASA) 31-63
AnyConnect client settings (ASA) 31-60, 31-62
AnyConnect custom attributes (ASA) 31-68, 31-69
browser plug-ins (ASA) 31-58
cluster load balancing 31-4, 31-5
configuring HTTP/HTTPS proxies and proxy bypass(ASA) 31-55
connection profiles 31-6
connection profiles (ASA) 31-8
content rewrite rules (ASA) 31-51
Context Editor dialog box (IOS) 33-15, 33-16
creating on ASA 30-14
creating on IOS devices 30-31
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
encoding rules (ASA) 31-53
fragmentation settings 26-30, 26-42
global settings 26-29
group policies, configuring 31-25
group policies, creating 31-27
group policies, understanding 31-26
IKEv2 settings 26-35
ISAKMP/IPsec settings 26-31
Kerberos Constrained Delegation (KCD on ASA) 31-64, 31-66
NAT settings 26-40
other settings (ASA) 31-49
performance settings (ASA) 31-50
policies (IOS) 33-14
proxy bypass rules (ASA) 31-57
public key infrastructure (PKI) policies 26-54
secure desktop manager policies 32-9
server certificate verification (ASA) 31-29, 31-31, 31-71
shared license (ASA) 31-72
shared license clients (ASA) 31-73
shared license servers (ASA) 31-74
understanding NAT settings 26-39
wizard 30-13
understanding 30-1
VPN Service Port Adapters (VSPAs)
configuring 25-41
VPN Services Module (VPNSM)
configuring 25-41
VPN Shared Port Adapter (VPN SPA)
configuring 25-41
VPNSM/VPN SPA/VSPA Settings dialog box 33-6
VPN Summary page 25-61
VPN topologies
accessing 25-17
assigning initial policies to new 25-60
assigning shared policies 5-44
cloning device VPN assignments 3-55
cloning shared policies 5-47
configuring dial backup 25-39
configuring GET VPN peers 25-59
configuring in Device view 25-19
creating or editing 25-28
creating or editing Extranet 25-65
defining endpoints and protected networks 25-33
defining GET VPN group encryption 25-53
deleting 25-69
discovering 25-19, 25-24
full mesh 25-4
hub-and-spoke 25-2
including unmanaged or non-Cisco devices 25-11
joined hub-and-spoke 25-5
locking 5-10
naming 25-30
partial mesh 25-5
point-to-point 25-3
rediscovering 25-26
removing devices 25-32
renaming policies 5-48
repairing discovered VPNs with multiple spoke definitions 25-25
selecting devices 25-32
tiered hub-and-spoke 25-5
unassigning policies 5-36
understanding 25-2
unsharing policies 5-43
using device overrides to customize VPN policies 25-13
viewing summary of VPN configuration 25-61
VRF-Aware IPsec
changing on Catalyst switches and 7600 routers 25-17
configuring 25-47
one-box solution 25-14
two-box solution 25-15
understanding 25-14
VRF-Aware IPsec tab (site-to-site VPN) 25-47
VTP modes, for Catalyst switches 67-1
VTY Line dialog box 62-51
Accounting tab 62-57
Authentication tab 62-55
Authorization tab 62-56
Setup tab 62-52
W
WAN interface card (WIC) 61-35
Warning - Partial VPN Deployment dialog box 8-31
warnings
significance of iii-lxiii
Web Filter policy map objects
creating 21-36
match conditions and actions 21-35
properties 21-47
web filter rules
ACL naming conventions 12-5
ASA/FWSM/PIX
converting IPv4 12-28
deleting 12-9
editing 12-10
moving 12-19
attributes (IOS) 18-13
configuring exclusive domains for IOS devices 18-10
configuring for ASA, PIX, FWSM devices 18-2
configuring for IOS devices 18-10
configuring in Map view 35-23
disabling 12-20
enabling 12-20
exclusive domain names (IOS) 18-14
managing 18-1
preserving ACL names 12-4
understanding 18-1
understanding NAT effects 12-3
understanding processing order 12-2
Web Filter Rules page (ASA/FWSM/PIX) 18-3
Web Filter Rules page (IOS) 18-11
web filter server properties 18-19
Web Filter Rules page (ASA/FWSM/PIX) 18-3
Web Filter Rules page (IOS) 18-11
Web Filter Server Configuration dialog box 18-19
web filter servers
attributes 18-19
configuring settings 18-15
configuring settings in Map view 35-24
configuring zone-based firewall settings in Map view 35-24
Web Filter settings page 18-16
Websense
configuring for web filter rules policies 18-15, 18-19
configuring for zone based firewall rules policies 21-36, 21-39, 21-41
Websense class map objects
creating 21-36
match criteria 21-30
Websense parameter map objects
creating 21-36
properties 21-39
web VPN
policy discovery restriction 3-8
Weighted Random Early Detection (WRED) 65-4
Whitelist/Blacklist tab 19-14
windows
arranging report 69-29
arranging views 68-36
closing report 69-31
undocking maps 35-2
Windows Messenger class map objects
creating 21-16
match criteria 21-21
Windows NT servers
use by ASA, PIX, and FWSM devices 6-28
Windows Server 2012 security settings 10-2
WINS Server Lists objects
attributes 34-89
creating 31-85
wizard
installation manager 72-25
wizards
configuring remote access SSL VPNs on ASA devices 30-14
configuring remote access SSL VPNs on IOS devices 30-31
configuring remote access VPNs 30-13
Copy Policies 5-33
Create Extranet VPN Topology 25-65
Create VPN Topology 25-28
creating remote access IPsec VPNs on ASA/PIX 7.0+ devices 30-24
creating remote access IPsec VPNs on IOS/PIX 6.3 devices 30-35
creating user group policies 30-19
Discover VPN policies 25-24
New Device 3-6
Rediscover VPN policies 25-26
Share Policies 5-42
wizards, using 1-46
workflow
overview 1-19
Workflow mode
changing modes 1-27
comparing with non-Workflow mode 1-21
configuration files
deploying 8-34, 8-39
previewing 8-44
configurations
rolling back 8-68
creating activities 4-14
deployment
viewing device details 8-26
viewing job history 8-26
jobs
aborting 8-54
approving 8-39
discarding 8-40
rejecting 8-39
states 8-6
submitting 8-38
opening activities 4-15
understanding 1-20
workflow modes
changing 1-27
comparing 1-21
Workflow Settings page 11-71
working with 3-57
worms
configuring IPS anomaly detection signatures 41-4
understanding 41-2
understanding IPS anomaly detection 41-1
understanding when to turn off anomaly detection 41-4
X
xdm-launcher.exe
device manager 71-23
XLATE table
clearing on deployment 59-1
Y
Yahoo Messenger class map objects
creating 21-16
match criteria 21-21
Z
zone-based firewall
add/edit zones 21-53
advanced options 21-67
changing the default drop rule 21-48
configuring PAM 21-69
configuring rules 21-13, 21-62
configuring settings 21-49
configuring settings in Map view 35-24
Content Filter tab 21-52
designing network zones 21-1
development overview 21-12
general recommendations 21-12
Global Parameters tab 21-50
IPSec VPN 21-6
logging 21-1
overview 21-1
page 21-50
preserving ACL names 12-4
protocol selection 21-68
restrictions 21-3
rules table 21-58
Self zone 21-5
tabs 21-49
troubleshooting 21-54
understanding 21-3
understanding NAT effects 12-3
understanding permit/deny and action 21-8
understanding processing order 12-2
understanding services and protocols 21-11
VPN tab 21-50
VRF 21-7
WAAS tab 21-50
Zones tab 21-50
zone-based firewall rules
configuring in Map view 35-23
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
moving 12-19
zone-based firewall rules policies
blocking spam using zone-based firewall rules 21-26
configuring map objects for content filtering rules 21-36
configuring map objects for inspection rules 21-16
creating zones 6-72
inspection parameters 21-31
match conditions for IM applications 21-21
match conditions for P2P applications 21-21
preventing SMTP DoS attacks 21-26
protocol information for IM application inspection 21-33
understanding interface role objects 6-71
Zone Contents dialog box 12-14
zones
creating 6-72
understanding interface role objects 6-71
zones, anomaly detection 41-3
Zoom In command 1-32
Zoom Out command 1-32