Contents
A - B - C - D - E - F - H - I - K - L - M - N - O - P - R - S - T - U - V - W -Index
A
AAA server
LDAP/AD directory properties (CX) 1
LDAP/AD directory search base (CX) 1
supported (CX) 1
abandoning changes 1
About page 1
access policies, ASA
about 1
configuring 1
managing 1
properties 1
access policies, context-aware
application filtering
compared to URL filtering 1
configuring updates 1
controlling 1
decryption requirements 1
overview 1
tips 1
troubleshooting updates 1
applying rate limits 1
configuring 1
configuring IPS filtering 1
configuring IPS settings 1
controlling network access 1
default behavior 1
enforcing Safe Search 1
Next Generation IPS filtering
configuring updates 1
troubleshooting updates 1
notifying end users of blocks
customizing 1
editing message 1
importing message 1
overview 1
reference 1
variables 1
when sent 1
overview 1
properties 1
URL filtering
category descriptions 1
compared to application filtering 1
configuring updates 1
controlling URL access 1
determining URL Category 1
overview 1
troubleshooting updates 1
warning policies 1
active authentication
enabling 1
Active Directory (AD)
properties (CX) 1
search base 1
Active Directory (AD) agent
configuring passive authentication 1
identifying 1
active MAC address 1 2 3 4
add
interface 1
address translation 1
admin user
characteristics 1
resetting password 1
alerts
icons 1
responding to 1
AnyConnect
monitoring and controlling clients 1
application objects
reference 1
application service objects
reference 1
Application Visibility and Control (AVC)
compared to URL filtering 1
configuring updates 1
controlling applications 1 2
controlling applications for Secure Mobility clients 1
decryption requirements 1
filtering overview 1
license 1
tips on application filtering 1
troubleshooting updates 1
viewing application details 1
applications
filtering
compared to URL filtering 1
configuring updates 1
controlling 1
controlling 1 2
decryption requirements 1
overview 1
tips 1
troubleshooting updates 1
viewing details 1
applications with malicious transactions
dashboard 1
ASA
access policies
about 1
configuring 1
managing 1
properties 1
altering access rules for ASA CX 1
altering configuration for ASA CX 1
altering inspection rules for ASA CX 1
configuration restrictions for ASA CX 1
ASA CX
altering ASA configuration 1
ASA configuration restrictions 1
configuring ASA access rules 1
configuring ASA inspection rules 1
configuring monitor-only mode 1
features 1
initial setup 1
installation
boot image (5585-X 1
boot image (software modules) 1
overview of packages 1
installing upgrades
CLI 1
troubleshooting 1
web interface 1
introduction 1
logging in
CLI console 1
monitoring mode 1
overview 1
preparing for management 1
redirecting traffic to
configuring monitor-only mode 1
overview 1
troubleshooting PRSM 1
using ASA CLI 1
using PRSM 1
setting up software 1
transparent mode 1
use cases 1
ASA devices
actions requiring delete, re-import 1
adding HA to inventory 1
adding to inventory 1 2
converting to full management 1
discovery 1 2
logging 1
configuration 1
logging properties 1
managing 1
preparing for management 1
redirecting traffic to ASA CX
configuring monitor-only mode 1
overview 1
troubleshooting PRSM 1
using ASA CLI 1
using PRSM 1
troubleshooting discovery 1
troubleshooting import and discovery 1
authentication services (ASA CX)
configuring passive authentication 1
controlling access by user group 1
authentication services (CX)
configuring 1
configuring directory realms 1
configuring identity policies 1
configuring settings 1
deleting directories 1
deleting directory realms 1
directory properties 1
directory realm overview 1
directory search base 1
enabling active authentication 1
enabling transparent authentication 1
enabling transparent authentication (Firefox) 1
enabling transparent authentication (Internet Explorer) 1
identity policy properties 1
identity types 1
managing 1
overview 1
supported servers and methods 1
transparent authentication requirements 1
what to tell users 1B
backup
database 1
PRSM virtual machine 1
scheduling database 1
basic authentication 1
Bidirectional NAT 1
blacklist blocking
enabling 1
bootstrapping
ASA CX 1
ASA devices, for management 1
bridge group
properties 1
browser
requirements 1C
CA certificates
ASA CX
downloading, installing the CA certificate 1
category (URL)
configuring updates 1
descriptions 1
determining 1
filtering 1
troubleshooting updates 1
certificates
configuring decryption certificate 1
configuring supplemental trusted 1
converting certificate formats 1
installing server 1
obtaining server 1
refreshing device 1
change history
viewing 1
when changes become active 1
Cisco Technical Assistance Center
creating diagnostic file 1
columns
dashboard and report 1
Commit and Deploy Changes page
committing changes 1
discarding changes 1
managing jobs 1
overview 1
viewing change history 1
when changes become active 1
configuration
re-importing 1
configurations
troubleshooting discovery 1
connectivity (system)
checking 1
console
logging into ASA CX 1
logging into PRSM 1
Context Directory Agent
configuring passive authentication 1
identifying 1
context-aware access policies
application filtering
compared to URL filtering 1
configuring updates 1
controlling 1
decryption requirements 1
overview 1
tips 1
troubleshooting updates 1
applying rate limits 1
configuring 1
configuring IPS filtering 1
configuring IPS settings 1
controlling network access 1
default behavior 1
enforcing Safe Search 1
Next Generation IPS filtering
configuring updates 1
troubleshooting updates 1
notifying end users of blocks
customizing 1
editing message 1
importing message 1
overview 1
reference 1
variables 1
when sent 1
overview 1
properties 1
URL filtering
category descriptions 1
compared to application filtering 1
configuring updates 1
controlling URL access 1
determining URL Category 1
overview 1
troubleshooting updates 1
warning policies 1
Context-Aware Security
getting started 1
overview 1
CX devices
actions requiring delete, re-import 1
adding HA to inventory 1
adding to inventory 1
backing up database 1
capturing packets 1
checking connectivity 1
committing changes 1
discarding changes 1
discovery 1 2
installing upgrades
overview 1
overview of packages 1
uploading packages 1
introduction 1
licenses
applying 1
assigning 1
implications of expiration 1
overview 1
renewing 1
revoking 1
uploading 1
using evaluation 1
logging in
overview 1
web interface 1
maintaining 1
managing 1
managing in multiple device mode 1
managing licenses 1
open management ports 1
pruning database 1
resetting admin password 1
resetting to factory defaults 1
restoring database 1
scheduling database backups 1
supported AAA servers and methods 1
troubleshooting 1
troubleshooting import and discovery 1D
dashboards
ASA traffic 1
changing time range 1
columns 1
controlling data 1
data collection and quality 1
descriptions 1
drilling into 1
malware traffic 1
monitoring health and performance 1
network overview 1
NG Intrusion Prevention 1
overview 1
responding to alerts 1
using 1
viewing 1
database
pruning 1
resetting to factory defaults 1
VMware snapshots 1
decryption policies
3DES/AES K9 license 1
bypassing 1
configuration overview 1
configuring 1
configuring decryption certificate 1
configuring settings 1
configuring supplemental trusted certificates 1
converting certificate formats 1
decrypted traffic flow 1
do not decrypt traffic flow 1
downloading, installing the CA certificate 1
managing 1
overview 1
properties 1
purpose of decryption 1
tips, limitations 1
troubleshooting 1
deployment jobs
Commit and Deploy Changes page 1
committing changes 1
discarding changes 1
managing 1
status 1
viewing history 1
when changes become active 1
Deployment Manager
Commit and Deploy Changes page 1
committing changes 1
discarding changes 1
managing jobs 1
viewing change history 1
when changes become active 1
destination object groups
reference 1
devices
actions requiring delete, reimport 1
adding HA to inventory 1
adding to inventory 1 2 3
changing management IP 1
configuring policies 1
converting to full management 1
deleting from inventory 1
deployment status 1
managing 1
managing CX 1
object name conflicts 1
out-of-band changes 1
policy and setting overview 1
refreshing certificate 1
restrictions 1
troubleshooting discovery 1
troubleshooting import and discovery 1
understanding discovery 1
updating credentials 1
viewing inventory 1
viewing licenses 1
diagnostics file
creating 1
logging properties 1
directory
configuring realms 1
configuring SSO for CSM 1
configuring SSO realms 1
deleting 1
overview 1
properties 1
search base 1
directory realm
configuring 1
configuring SSO 1
configuring SSO for CSM 1
deleting 1
overview 1
directory realms
configuring global for user management 1
discovery
ASA 1
CX 1
troubleshooting 1
understanding 1
disk
reclaiming space 1
disk space (PRSM VM)
managing 1
documentation overview 1
Dynamic NAT 1 2E
edit
interface 1
end user notifications
customizing 1
editing notification page 1
importing notification page 1
overview 1
reference 1
variables 1
when sent 1
Enforce EUI-64 1 2
EtherChannel
about 1
load balancing 1
properties 1
EUI-64 1 2
Event Viewer
filtering events 1
filter rules 1
message reference
columns 1
Context-Aware Security traffic events 1
CX, PRSM system events 1
overview 1
overview 1
views
configuring custom 1
deleting custom 1
switching between real time and historical 1
using 1
working with events 1
events
filtering 1
filter rules 1
managing PRSM storage space 1
reference
columns 1
Context-Aware Security traffic events 1
CX, PRSM system events 1
overview 1
viewing 1
views 1
working with individual 1F
failover
about 1
configuring 1 2
devices 1
managing 1
feature licenses
applying licenses 1
assigning licenses 1
deleting 1
implications of expiration 1
overview 1
renewing licenses 1
revoking licenses 1
uploading licenses 1
using evaluation 1
file filtering profile objects
reference 1
file transfers
controlling 1
filters
configuring event 1
event rules 1H
health and performance monitoring 1
help, getting 1
high availability
about 1
configuring 1
devices 1
managing 1
HTTPS
decryption (ASA CX)
bypassing 1
configuration overview 1
configuring decryption certificate 1
configuring policies 1
configuring settings 1
configuring supplemental trusted certificates 1
converting certificate formats 1
decrypted traffic flow 1
decryption policy properties 1
do not decrypt traffic flow 1
downloading, installing the CA certificate 1
managing traffic flows 1
overview 1
purpose 1
tips, limitations 1
troubleshooting 1
installing server certificate 1
obtaining server certificate 1
preparing ASA devices for management 1I
icons, policy and alert 1
Identity NAT 1
identity objects
ASA reference 1
controlling access by user group 1
CX, reference 1
identity policies
configuring 1
enabling active authentication 1
enabling transparent authentication 1
properties 1
transparent authentication requirements 1
identity services (ASA CX)
configuring passive authentication 1
controlling access by user group 1
identity services (CX)
configuring 1
configuring authentication settings 1
configuring directory realms 1
configuring identity policies 1
deleting directories 1
deleting directory realms 1
directory properties 1
directory realm overview 1
directory search base 1
enabling active authentication 1
enabling transparent authentication 1
enabling transparent authentication (Firefox) 1
enabling transparent authentication (Internet Explorer) 1
identity policy properties 1
identity types 1
managing 1
overview 1
supported servers and methods 1
transparent authentication requirements 1
what to tell users 1
integrated Windows authentication 1
interface
add/edit 1
bridge group
properties 1
enable 1 2 3 4
EtherChannel
about 1
load balancing 1
properties 1
EUI-64 1 2
ID 1
link-local address 1 2
MAC address
active 1 2 3 4
standby 1 2 3 4
management 1
MTU 1 2 3 4
name 1 2 3 4
physical
properties 1
properties
IPv4 1
IPv6 1
redundant interface
properties 1
security level 1 2 3 4
subinterface
properties 1
interface role objects
reference 1
interfaces
configuring 1
managing 1
understanding 1
inventory
actions requiring delete, re-import 1
adding devices 1 2 3
adding HA devices 1
converting device to full management 1
deleting from inventory 1
device restrictions 1
managing CX 1
object name conflicts 1
out-of-band changes 1
refreshing device certificate 1
troubleshooting discovery 1
troubleshooting import and discovery 1
understanding discovery 1
updating device credentials 1
viewing 1
viewing licenses 1
IPS
configuring filtering 1
configuring settings 1
filtering 1
NG Intrusion Prevention dashboard 1
scanning for threats 1
viewing threats 1
IPS, Next Generation
configuring updates 1
troubleshooting updates 1
IPv4
interface properties 1
IPv6
interface properties 1K
Kerberos authentication 1
Known Users CX identity object 1L
language, changing web interface 1
LDAP server
properties (CX) 1
search base 1
licenses
3DES/AES K9 1
applying 1
assigning 1
CX feature
implications of expiration 1
overview 1
deleting 1
licenses page 1
managing CX and PRSM 1
PRSM
overview 1
renewing 1
revoking 1
uploading 1
using evaluation 1
viewing assignments 1
link-local address 1 2
local policies
analyzing assignments 1
changing sharing status 1
configuring device 1
configuring policy sets 1
configuring rule-based 1
deleting policy sets 1
editing rule-based 1
enabling, disabling 1
making exceptions in shared policies 1
moving rule-based 1
logging configuration (ASA) 1
device settings 1
managing 1
syslog server
properties 1
logging configuration (CX, PRSM)
downloading diagnostics file 1
properties 1
setting log levels 1M
MAC address
interface
active 1 2 3 4
standby 1 2 3 4
malware protection
configuring settings 1
configuring web reputation filtering 1
management interface 1
menus, web interface 1
monitor-only mode, configuring 1
MTU 1 2 3 4N
Name
interface 1 2 3 4
NAT
Bidirectional 1
Dynamic 1 2
Identity 1
Object 1 2
properties 1
overview 1
Policy Dynamic 1
rules
managing 1
Static 1 2
Twice 1 2
properties 1
network
overview dashboard 1
responding to alerts 1
Network Address Translation
see NAT 1
network group objects
CX groups reference 1
groups reference 1
object reference 1
overview 1
network participation 1
Next Generation IPS
configuring updates 1
license 1
troubleshooting updates 1
NG IPS profile objects
reference 1
scanning for threats 1
NTLM authentication 1O
Object NAT 1 2
properties 1
Object PAT 1
objects (policy)
configuring 1
customizing per device 1
deleting 1
descriptions 1
importing 1
managing 1
name conflicts 1
overview 1
reference 1
application objects 1
application service objects 1
ASA identity objects 1
common properties 1
CX identity objects 1
CX network groups 1
destination object groups 1
file filtering profile objects 1
interface roles 1
network 1
network groups 1
network overview 1
NG IPS profile objects 1
Secure Mobility objects 1
service groups 1
source object groups 1
TCP/UDP port keywords 1
time range 1
URL objects 1
user agent objects 1
web reputation profile objects 1
out-of-band changes
dealing with 1P
packets
capturing 1
PAT
Dynamic 1 2
Object
properties 1
overview 1
Static 1 2
physical interface
properties 1
policies
abandoning changes 1
analyzing assignments 1
committing changes 1
concepts 1
configuring device 1
configuring rule-based 1
deleting 1
descriptions 1
editing rule-based 1
enabling, disabling 1
icons 1
license implications 1
making exceptions in shared policies 1
moving rule-based 1
sharing 1
policing traffic 1
Policy NAT 1
policy objects
configuring 1
customizing per device 1
deleting 1
descriptions 1
importing 1
managing 1
name conflicts 1
overview 1
reference 1
application objects 1
application service objects 1
ASA identity objects 1
common properties 1
CX identity objects 1
CX network groups 1
destination object groups 1
file filtering profile objects 1
interface roles 1
network 1
network groups 1
network overview 1
NG IPS profile objects 1
Secure Mobility objects 1
service groups 1
source object groups 1
TCP/UDP port keywords 1
time range 1
URL objects 1
user agent objects 1
web reputation profile objects 1
policy sets
configuring 1
copying 1
deleting 1
license implications 1
universal 1
Port Address Translation
see PAT 1
ports
open management 1
processes (system)
managing 1
PRSM
backing up database 1
backing up VM 1
changing management IP 1
checking connectivity 1
committing changes 1
discarding changes 1
features 1
getting started 1
installation
overview 1
overview of packages 1
preparing server 1
virtual machine 1
installing upgrades
CLI 1
overview 1
troubleshooting 1
uploading packages 1
web interface 1
introduction 1
licenses
applying 1
assigning 1
overview 1
renewing 1
revoking 1
uploading 1
using evaluation 1
logging in
CLI console 1
overview 1
web interface 1
maintaining 1
managing disk space 1
managing licenses 1
open management ports 1
overview 1 2
pruning database 1
resetting admin password 1
resetting to factory defaults 1
restoring database 1
restoring VM 1
scheduling database backups 1
troubleshooting 1R
rate limits, applying 1
recovery user account 1
redundant interface
properties 1
remote access VPN
monitoring and controlling clients 1
reports
columns 1
creating 1
data collection and quality 1
generating 1
managing PRSM storage space 1
overview 1
properties 1
types 1
viewing 1
reputation
dashboard, malware traffic 1
reputation (web) profile objects
reference 1
restarting system processes 1
restore
database 1
PRSM virtual machine 1
route tracking 1
routing
static routes 1
tracking with SLAs 1S
Safe Search
enforcing 1
Secure Mobility objects
monitoring and controlling VPN clients 1
reference 1
security level
interface 1 2 3 4
server requirements
PRSM installation 1
service group objects
reference 1
TCP/UDP port keywords 1
shared policies
analyzing assignments 1
changing sharing status 1
configuring device 1
configuring policy sets 1
configuring rule-based 1
deleting policy sets 1
editing rule-based 1
enabling, disabling 1
making exceptions 1
moving rule-based 1
single sign-on
Cisco Security Manager 1
generic 1
SLA
route tracking 1
snapshots
PRSM virtual machine 1
software installation
overview of packages 1
upgrades
CLI 1
overview 1
troubleshooting 1
uploading packages 1
web interface 1
source object groups
reference 1
SSL
decryption (ASA CX)
bypassing 1
configuration overview 1
configuring decryption certificate 1
configuring policies 1
configuring settings 1
configuring supplemental trusted certificates 1
converting certificate formats 1
decrypted traffic flow 1
decryption policy properties 1
do not decrypt traffic flow 1
downloading, installing the CA certificate 1
managing traffic flows 1
overview 1
purpose 1
tips, limitations 1
troubleshooting 1
installing server certificate 1
obtaining server certificate 1
preparing ASA devices for management 1
refreshing device certificates 1
standby MAC address 1 2 3 4
Static NAT 1 2
static route
about 1
status
deployment jobs and devices 1
storage space
managing PRSM 1
subinterface
properties 1
support, technical
creating diagnostic file 1
syslog
logging configuration 1
properties for ASA 1
servers
properties 1
system events (CX, PRSM) 1T
telemetry, sending to Cisco 1
threats
malware traffic dashboard 1
scanning 1
time range
changing dashboard 1
time range objects
reference 1
TLS
decryption (ASA CX)
bypassing 1
configuration overview 1
configuring decryption certificate 1
configuring policies 1
configuring settings 1
configuring supplemental trusted certificates 1
converting certificate formats 1
decrypted traffic flow 1
decryption policy properties 1
do not decrypt traffic flow 1
downloading, installing the CA certificate 1
managing traffic flows 1
overview 1
purpose 1
tips, limitations 1
troubleshooting 1
installing server certificate 1
obtaining server certificate 1
traffic events (CX) 1
transparent authentication
enabling 1
enabling in Firefox 1
enabling in Internet Explorer 1
requirements 1
transparent mode
configuring for ASA CX 1
troubleshooting
checking system 1
configuring logging properties 1
creating diagnostics file 1
deployment status 1
discovery 1
import and discovery 1
managing system processes 1
PRSM traffic redirection 1
resetting system to factory defaults 1
responding to alerts 1
signature and engine updates 1
TLS/SSL decryption 1
unknown CA or bad certificate errors 1
web interface problems 1
when configuration changes become active 1
trusted certificates
configuring supplemental 1
installing server 1
obtaining server 1
Twice NAT 1 2
properties 1U
undoing changes 1
Unknown Users CX identity object 1
Updater Connection events 1
updates
configuring signature and engine 1
troubleshooting signature and engine 1
Upgrade Manager
installing upgrades 1
overview 1
overview of packages 1
system upgrades 1
troubleshooting 1
uploading packages 1
upgrade packages
installation overview 1
installing from CLI 1
installing from web interface 1
overview 1
troubleshooting 1
uploading 1
URL filtering
acceptable use policies 1
category descriptions 1
compared to application filtering 1
configuring updates 1
configuring URL objects 1
configuring web reputation filtering 1
controlling URL access 1
determining URL Category 1
filtering by web reputation 1 2
overview 1
troubleshooting updates 1
URL objects
acceptable use policies 1
reference 1
use cases
acceptable use policies (URL filtering) 1
configuring high availability 1
configuring passive authentication 1
controlling access by user group 1
controlling application use 1
controlling Secure Mobility devices 1
filtering by web reputation 1
gaining insight into traffic 1
overview 1
scanning for IPS threats 1
transparent mode 1
user account
effect on web interface 1
user agent objects
reference 1
user groups
controlling access by user group 1
user identity
configuring authentication settings 1
users
admin 1
changing password 1
configuring 1
configuring global directory realm 1
configuring SSO 1
configuring SSO for CSM 1
conflicts when editing policies 1
deleting 1
managing 1
page reference 1
properties 1
roles and privileges 1V
views
configuring custom 1
deleting custom 1
filtering events 1
filter rules 1
switching between real time and historical 1
using event 1
working with individual 1
virtual machine (VM)
installing PRSM 1
managing disk space 1W
web interface
about PRSM 1
basics 1
changing languages 1
getting help 1
icons 1
lists and tables 1
menus 1
mousing over items 1
selecting items 1
troubleshooting 1
user conflicts 1
user role affect on 1
web reputation
configuring filtering 1
configuring malware protection settings 1
dashboard, malware traffic 1
filtering by 1 2
scores 1
web reputation profile objects
filtering by web reputation 1
reference 1
Web Security Essentials
license 1