Index
Numerics
12.1 and 12.2
managing routers 61-3
3DES encryption algorithm
in IKE proposals 26-6
802.1x
802.1x Policy page 64-5
defining policies 64-4
interface authorization states 64-2
on Cisco IOS routers 64-1
supported topologies 64-3
understanding device roles 64-2
A
AAA
about 48-1
Cisco IOS routers
AAA Policy page 63-6
Accounting tab 63-10
Authentication tab 63-6
Authorization tab 63-8
Command Accounting dialog box 63-13
Command Authorization dialog box 63-10
defining services 63-4
overview 63-2
supported accounting types 63-3
supported authorization types 63-2
understanding method lists 63-3
configuring access control for IPS 36-21
configuring on firewall devices 48-1
credentials for device access 3-4
device administration 48-4
local fallback 48-3
network access 48-4
PIX/ASA/FWSM 48-5
Accounting tab 48-8
Authentication tab 48-5
Authorization tab 48-7
support 48-2
VPN access 48-4
AAA authentication groups
predefined 6-30
AAA firewall
MAC exempt lists 15-26
AAA Firewall page
Advanced Setting tab 15-20
AAA firewall policy
advanced settings 15-20
configuring 15-6
AAA page 15-28
AAA rules
ACL naming conventions 12-5
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring AAA firewall settings (PIX/ASA/FWSM) 15-6
configuring AuthProxy settings (IOS) 15-9
configuring cut-through proxy (ASA) 13-23
configuring for ASA/PIX/FWSM devices 15-4
configuring for IOS devices 15-7
configuring identity aware 13-21
configuring in Map view 35-23
configuring security group aware 14-17
configuring settings
for IOS devices in Map view 35-24
for PIX/ASA/FWSM in Map view 35-24
converting IPv4 12-28
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
managing 15-1
moving 12-19
preserving ACL names 12-4
properties 15-13
understanding 15-1
understanding how users authenticate 15-2
understanding NAT effects 12-3
understanding processing order 12-2
AAA Rules page 15-10
AAA server group objects
attributes 6-49
creating 6-48
default server groups on IOS devices 6-31
predefined authentication groups 6-30
understanding 6-27
AAA server objects
creating 6-32
HTTP-FORM settings 6-44
Kerberos settings 6-39
LDAP settings 6-40
NT settings 6-43
RADIUS settings 6-35
SDI settings 6-43
supported additional types for ASA/PIX/FWSM 6-28
supported types 6-28
TACACS+ settings 6-38
understanding 6-27
AAA servers
supported types on ASA, PIX, FWSM devices 6-28
Abort the Job dialog box 8-55
About Configuration Manager command 1-39
ABR
definition 56-75
access control list objects
creating 6-53
extended objects 6-54
standard objects 6-56
unified objects 6-58
web objects 6-57
access control lists
GET VPN security policies 29-10
policy discovery 5-14
access control lists (ACLs)
names preserved during discovery 12-4
naming conventions 12-5
resolving naming conflicts 12-7
access controls
configuring ACL names 16-23
configuring settings 16-23
configuring settings in Map view 35-24
Access Control Settings page 16-24
Access Group tab (IGMP) 55-5
Access Interface Configuration dialog box (ASA) 31-48
access permissions
Event Viewer 69-4
Health and Performance Monitor 71-3
maps 35-8
Report Manager 70-5
access policies
configuring 31-50
reference 31-45
understanding 31-44
access ports
Create and Edit Interface dialog boxes-Access Port mode 68-9
understanding 68-5
access rule
look up
from device managers 72-17
access rules
access control settings 16-24, 16-26
Access Rules page 16-10
ACL naming conventions 12-5
address requirements 16-5
Advanced dialog box 16-17
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring 16-7
configuring access control settings 16-23
configuring identity aware 13-21
configuring in Map view 35-23
configuring security group aware 14-17
controlling non-IP layer-2 traffic 23-1
deleting 12-9
detecting conflicts 16-28
disabling 12-20
editing 12-10
enabling 12-20
examples of event analysis
user access to server blocked 69-59
expiration dates 16-22
finding from CS-MARS events 72-47
finding from Event Viewer events 69-54
generating analysis reports 16-34
hit counts
details 16-36
how deployed 16-5
identity-aware rules
requirements 13-3
import examples 16-44
importing 16-40
IPS blocking, affect of 43-4
managing 16-1
moving 12-19
optimizing during deployment 16-46
packet tracer, analyzing with 72-23
preserving ACL names 12-4
Report Manager reports
firewall traffic reports 70-14
resolving conflicts 16-34
rule attributes 16-14
sharing ACLs among interfaces 11-18
syslog messages supported for look-up 72-48
understanding 16-1
understanding device-specific behavior 16-4
understanding global 16-3
understanding NAT effects 12-3
understanding processing order 12-2
understanding requirements when using inspection 17-4
understanding the automatic conflict detection user interface 16-30
viewing related CS-MARS events 72-44
viewing related events in Event Viewer 69-56
Accounting
Cisco IOS routers
settings 63-10
accounts and credentials
Cisco IOS routers
overview 63-14
PIX/ASA/FWSM
user accounts 51-7
user accounts, add/edit 51-7
accounts and credentials policies
Accounts and Credentials Policy page 63-16
User Accounts dialog box 63-17
ACLs
configuring names 16-23
ACS user authorization
configuring notifications when unavailable 1-27
Event Viewer 69-4
Health and Performance Monitor 71-3
how permissions affect what you can do 1-11
Report Manager 70-5
Active/Active failover
about 50-2
command replication 50-4
configuration synchronization 50-3
Active/Standby failover 50-2
Active Directory (AD)
collecting user statistics 13-25
configuring agent communication options 13-15
enabling for identity-aware firewall 13-8
identifying AD servers and agents 11-38, 13-8
requirements for identity-aware firewall 13-3
activities
accessing functions 4-8, 4-9
Activity Manager window 4-10
Approved state 4-5
approving 4-3, 4-21
benefits of 4-2
closing 4-16
creating 4-14
discarding 4-22
Edit state 4-4
locking 4-3
managing 4-1
multiple users 4-4
opening 4-15
overview 1-20
rejecting 4-21
responding to the Activity Required dialog box 4-14
states 4-4
Submitted state 4-5
submitting for approval 4-20
understanding 4-1
validating 4-18
viewing change reports 4-16
viewing status and history 4-23
working with 4-7
Activities command 1-34
Activities menu 1-36
Activity Manager window 4-10
Activity Required dialog box 4-14
Add/Edit Action Configuration dialog box 54-7
Add/Edit AnyConnect Client Image dialog box (ASA) 31-66
Add/Edit AnyConnect Custom Attributes dialog box (ASA) 31-70, 31-71
Add/Edit Applet dialog box 54-5
Add/Edit Collector dialog box 54-2
Add/Edit Content Rewrite dialog box (ASA) 31-54
Add/Edit DAP Entry Dialog Box > Device 32-30
Add/Edit File Encoding dialog box 31-55
Add/Edit Multicast Route dialog box 55-8, 55-10
description 55-9
Add/Edit PIM Neighbor Filter dialog box 55-13
Add/Edit Proxy Bypass dialog box 31-59
Add/Edit Syslog Configuration dialog box 54-7
Add AAA Rule dialog box 15-13
Add AAA Server dialog box 6-33
Add AAA Server Group dialog box 6-49
Add Access List dialog box (Allowed Hosts policy) 36-7
Add Access Rule dialog box 16-14
Add an Entry dialog box 39-30
Add AOL Class Map dialog box 17-28, 21-19
Add A Port Forwarding Entry dialog box 34-41
Add ASA Group Policies dialog box
client configuration settings 34-6
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-10
overview 34-1
split tunneling settings 34-31
SSL VPN clientless settings 34-12
SSL VPN full client settings 34-19
SSL VPN settings 34-25
Technology settings 34-1
Add A Smart Tunnel Entry dialog box 34-67, 34-70
Add AS Path Entry dialog box 56-155
Add AS Path Object dialog box 56-154
Add Auto Signon Rules dialog box 34-27
Add Cat6k Block Vlan dialog box 43-16
Add Certificate dialog box 11-24
Add Certificate Filter dialog box 25-58
Add Cisco Secure Desktop Configuration dialog box 34-35
Add Client Access Rules dialog box 34-12
Add Client Update dialog box 34-81
Add Column dialog box 34-61
Add Community List Entry dialog box 56-157, 56-158
Add Community List Object dialog box 56-156
Add Custom Pane dialog box 34-62
Add Custom Signature dialog box 39-15
Add DCE/RPC Map dialog box 17-29
Add Destinations dialog box 12-11
Add Device from Network wizard
Device Credentials page 3-45
Add Devices to Group command 1-31
Add Devices to Group dialog box 3-63
Add DNS Class Map dialog box 17-28
Add DNS Map dialog box
Filtering tab 17-34, 17-35
overview 17-32
Protocol Conformance tab 17-33
Add eDonkey Class Map dialog box 17-28, 21-19
Add ESMTP Map dialog box 17-39
Add Extended Access Control Entry dialog box 6-61
Add Extended Access List dialog box 6-59
Add External Filter dialog box 21-41
Add FastTrack Class Map dialog box 17-28, 21-19
Add File Object dialog box 34-37
Add FlexConfig dialog box 7-30
Add FTP Class Map dialog box 17-28
Add FTP Map dialog box 17-42
Add Gnutella Class Map dialog box 17-28, 21-19
Add Group dialog box 3-62
Add Group Member dialog box 29-19
Add GTP Map dialog box 17-45
Add H.323 Class Map dialog box 17-28, 21-19
Add H.323 Map dialog box 17-51, 21-34
Add HSI Endpoint IP Address dialog box 17-54
Add HSI Group dialog box 17-53
Add HTTP Class Map dialog box 17-28, 21-19
Add HTTP Map dialog box 21-34
ASA 7.1.x, PIX 7.1.x, FWSM 3.x, IOS devices
Entity Length tab 17-58
Extension Request Method tab 17-61
General tab 17-57
overview 17-56
Port Misuse tab 17-62
RFC Request Method tab 17-60
Transfer Encoding tab 17-63
ASA 7.2+ and PIX 7.2+ devices 17-64
Add ICQ Class Map dialog box 17-28, 21-19
Add IKEv1 Proposal dialog box 26-10
Add IKEv2 Proposal dialog box 26-14
Add IMAP Class Map dialog box 17-28, 21-19
Add IMAP Map dialog box 21-34
Add IM Class Map dialog box 17-28
Add IM Map dialog box 21-34
ASA and PIX device 17-70
IOS device 17-73
Add Inspect/Application FW Rule wizard
Address and Port page 17-13
Inspected Protocol page 17-17
Match Traffic page 17-11
Add Inspect Parameter Map dialog box 21-31
Add Interfaces dialog box 12-13
Add IP Options Map dialog box 17-75
Add IPsec Pass Through Map dialog box 17-80
Add IPSec Transform Set dialog box 26-27
Add IPv4 Pool Object dialog box 6-92
Add IPv6 Map dialog box 17-77, 17-91
Add IPv6 Pool Object dialog box 6-93
Add Kazaa2 Class Map dialog box 17-28, 21-19
Add Key Server dialog box 29-19
Add Language dialog box 34-56
Add LDAP Attribute Map dialog box 6-46
Add LDAP Attribute Map Value dialog box 6-47
Add Link command 1-33
Add Link dialog box 35-20
Add Local Rules command 1-32
Add Local Web Filter Class Map dialog box 17-28, 21-19
Add Local Web Filter Parameter Map dialog box 21-38
Add MAC Address Pool Object dialog box 6-94
Add Map Object command 1-33
Add Map Object dialog box 35-18
Add Map Value dialog box 6-47
Add Match Condition and Action dialog box
DNS policy maps 17-36
ESMTP policy maps 17-40
FTP policy maps 17-43
GTP policy maps 17-49
H.323 (IOS) policy maps 21-35
H.323 policy maps 17-54
HTTP (Zone Based IOS) policy maps 21-35
HTTP policy maps 17-66
IM (Zone Based IOS) policy maps 21-35
IMAP policy maps 21-35
IM policy maps 17-71
IPv6 policy maps 17-78, 17-92
P2P policy maps 21-35
POP3 policy maps 21-35
SIP (IOS) policy maps 21-35
SIP policy maps 17-85, 17-95
Skinny policy maps 17-89
SMTP policy maps 21-35
Sun RPC policy maps 21-35
Web Filter policy maps 21-35
Add Match Criterion dialog box
AOL class maps 21-21
DNS class maps 17-36
eDonkey class maps 21-21
FastTrack class maps 21-21
FTP class maps 17-43
Gnutella class maps 21-21
H.323 (IOS) class maps 21-22
H.323 class maps 17-54
HTTP (IOS) class maps 21-22
HTTP class maps 17-66
ICQ class maps 21-21
IMAP class maps 21-25
IM class maps 17-71
Kazaa2 class maps 21-21
Local Web Filter class maps 21-29
MSN Messenger class maps 21-21
N2H2 class maps 21-30
POP3 class maps 21-25
SIP (IOS) class maps 21-25
SIP class maps 17-85, 17-95
SMTP class maps 21-27
Sun RPC class maps 21-29
Websense class maps 21-30
Windows Messenger class maps 21-21
Yahoo Messenger class maps 21-21
Add MSN Messenger Class Map dialog box 17-28, 21-19
Add N2H2 Parameter Map dialog box 21-39
Add N2H2 Web Filter Class Map dialog box 17-28, 21-19
Add NAT Rule dialog box
ASA 8.3+ 24-37
Add NetBIOS Map dialog box 17-81
Add Network/Host dialog box
General tab 6-83
NAT tab 24-43
Add New Device wizard
Device Credentials page 3-45
Add New Security Association dialog box 25-58
Add or Edit Plug-in Entry dialog box (ASA) 31-60
Add Other Devices dialog box 8-58
Add P2P Map dialog box 21-34
Add Permit Response dialog box 17-48
Add Per-Session NAT Rule dialog box 24-48
Add PIX/ASA/FWSM Web Filter Rule dialog box 18-5
Add PKI Enrollment dialog box
CA Information tab 26-60
Certificate Subject Name tab 26-66
Enrollment Parameters tab 26-63
overview 26-58
Trusted CA Hierarchy tab 26-67
Add Policy List Object dialog box 56-146
Add POP3 Class Map dialog box 17-28, 21-19
Add Port Forwarding List dialog box 34-40
Add Port List dialog box 6-102
Add Prefix List Entry dialog box 56-151, 56-153
Add Prefix List Object dialog box 56-149, 56-151
Add Protocol Info Parameter Map dialog box 21-33
Add Regular Expression dialog box 17-108
Add Regular Expression Group dialog box 17-108
Address Pools
PIX/ASA/FWSM 24-19
add/edit 24-19
address pools
overriding in connection profiles 30-8
Add Route Map Entry dialog box 56-140
Add Route Map Object dialog box 56-139
Add Row command 1-31
Add Rule Section dialog box 12-22
Add Server dialog box
Protocol Info Parameter maps 21-34
Add Service dialog box 6-103
Add Services dialog box 12-13
Add Single Sign On Server dialog boxes 34-42
Add SIP Class Map dialog box 17-28, 21-19
Add SIP Map dialog box 17-83, 17-93, 21-34
Add Skinny Map dialog box 17-87
Add SLA Monitor dialog box 51-10
Add Smart Tunnel Auto Signon Entry dialog box 34-72
Add Smart Tunnel Auto Signon Lists dialog box 34-71
Add Smart Tunnel Lists dialog box 34-66, 34-69
Add SMTP Class Map dialog box 17-28, 21-19
Add SMTP Map dialog box 21-34
Add SNMP Map dialog box 17-90
Add Sources dialog box 12-11
Add SSL VPN Customization dialog box 34-51
Applications 34-60
Copyright Panel 34-58
Custom Panes 34-61
Full Customization 34-59
Home Page 34-62
Informational Panel 34-57
Language 34-54
Logon Form 34-56
Logout Page 34-63
Title Panel 34-53
Toolbar 34-59
Add SSL VPN Gateway dialog box 34-64
Add Standard Access Control Entry dialog box 6-64
Add Standard Access List dialog box 6-59
Add Sun RPC Class Map dialog box 17-28, 21-19
Add Sun RPC Map dialog box 21-34
Add TCP Map dialog box 58-22
Add TCP Option Range Dialog Box 58-25
Add Text Object dialog box 7-32
Add Time Range dialog box 6-71
Add Traffic Flow dialog box 58-18
Add Transparent Firewall Rule dialog box 23-5
Add Trend Content Filter Class Map dialog box 17-28, 21-19
Add Trend Parameter Map dialog box 21-42
Add Unified Access Control Entry dialog box 6-67
Add URL Domain Name dialog box 21-45
Add URLF Glob Parameter Map dialog box 21-45
Add URL Filter Parameter Map dialog box 21-43
Add User dialog box 12-12, 36-19
Add User Group dialog box
Advanced PIX 6.3 settings 34-82
Browser Proxy settings 34-87
Client (IOS) settings 34-78
Clientless settings 34-83
Client VPN Software Update (IOS) settings 34-81
DNS/WINS settings 34-77
General settings 34-75
IOS Xauth Options settings 34-80
overview 34-73
Split Tunneling settings (Easy VPN/remote access IPSec VPN) 34-77
SSL VPN Connection settings 34-88
SSL VPN Full Tunnel settings 34-84
SSL VPN Split Tunneling settings 34-86
Technology settings 34-73
Thin Client settings 34-84
Add User Profile dialog box 43-12
Add VDI Server dialog box 34-15
Add Virtual Sensor dialog box 38-7, 38-8
Add Web Access Control Entry dialog box 6-65
Add Web Filter Map dialog box 21-47
Add WebSense Parameter Map dialog box 21-39
Add Websense Web Filter Class Map dialog box 17-28, 21-19
Add Web Type Access List dialog box 6-59
Add Windows Messenger Class Map dialog box 17-28, 21-19
Add WINS Server dialog box 34-90
Add WINS Server List dialog box 34-89
Add Yahoo Messenger Class Map dialog box 17-28, 21-19
Add Zones dialog box 12-13
admin context 59-1
administration
selecting policies to manage 5-11
administrative settings, configuring 11-1
admin password, changing 10-24
ADSL
ADSL Policy page 62-37
ADSL Settings dialog box 62-38
defining settings 62-36
supported operating modes 62-35
ADSL policies
unable to deploy 9-15
Advanced dialog box
access rules 16-17
Advanced NAT Options
PIX/ASA/FWSM
add/edit 24-30
Advanced settings
interface configuration
PIX/ASA/FWSM 46-68
AES encryption algorithm
in IKE proposals 26-6
AIM-IPS interfaces
IPS Module Interface Settings page 62-23
AIP-SSM/SSC
ASA 58-15
Alarm Indication Signal (AIS) cells 62-51
allowed hosts, configuring for IPS 36-7
Allowed Hosts policy 36-7
Analysis Engine global variables
configuring 36-30
analysis reports
generating 16-34
anomaly detection
configuring 41-6
configuring histograms 41-11
configuring learning accept mode 41-8
configuring signatures 41-4
configuring thresholds 41-11
managing 41-1
modes 41-2
understanding 41-1
understanding histograms 41-9
understanding thresholds 41-9
understanding worms 41-2
when to turn off 41-4
zones
overview 41-3
anti-spoofing 57-2
AnyConnect
client images 31-62, 31-64
profiles 31-62, 31-64
editing 31-63
AnyConnect Client Image dialog box (ASA) 31-64
AnyConnect custom attributes 31-70, 31-71
AnyConnect Profile Editor 31-63
AOL class map objects
creating 21-16
match criteria 21-21
applet
embedded event manager 54-3
Apply IPS Update command 1-35
Apply IPS Update wizard 44-7
Approve Activity command 1-36
Approve Activity dialog box 4-21
Approved activity state 4-5
Approve Deployment Job dialog box 8-20, 8-39
Area Border Router
See ABR 56-75
ARP
PIX/ASA/FWSM
configuration 47-5
inspection 47-5
inspection, enable/disable 47-6
table 47-3
ARP table
static entry 47-3, 47-5
ASA
ASDM 72-16
CX 58-17
Auth Proxy Configuration 58-17
CX module
detecting 72-21
Failover
Add Failover Group 50-25
edit bridge group 50-17
FirePOWER module
detecting 72-21
IPS, QoS, and Connection Rules
ASA CX Auth Proxy Configuration 58-17
IPS modules 58-15
policy discovery 5-13
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-65
rollback restrictions for multiple context mode 8-64
security contexts
allocate interfaces 59-12
configuration 59-9
viewing allocated interfaces 59-12
setting up AUS or CNS 2-8
setting up SSL (HTTPS) 2-3
TCP State Bypass 58-3
ASA 5505
Management IPv6 47-11
ports and interfaces 46-6
ASA 8.3+
NAT policies
Add/Edit NAT rules dialog boxes 24-37
Translation Rules page 24-35
ASA Cluster Load Balance page 31-5
ASA CX
CX
about 58-17
ASA devices
5505
hardware port configuration 46-61
AAA support 6-28
about 46-1
adding or changing modules 3-40
adding SSL thumbprints manually 9-5
Bridge Groups
add/edit 46-62
Catalyst Service Module 46-1
changing those selected for reports 70-22
configuring for event management 69-28
configuring for report management 70-3
configuring IKE and IPsec policies 26-1
configuring IKEv2 authentication 26-68
configuring transparent firewall rules 23-1
Easy VPNs
connection profiles 28-13
Event Viewer support 69-4
FlexConfig object samples 7-20
global access rules 16-3
identity-aware services
configuring to provide 13-7, 14-8
interfaces 46-26
add/edit 46-31
Advanced tab 46-41
configuring 46-3
edit EtherChannel-assigned interface 46-12
EtherChannels 46-9, 46-13
General tab 46-33
IP Type 46-58
IPv6 46-47, 46-73
IPv6, add/edit 46-52
IPv6, add/edit prefixes 46-54, 46-56
LACP 46-12
MAC address 46-60
PPPoE Users 46-71
VPDN groups 46-72
licenses 2-9
monitoring service level agreements 51-8
object group search 16-25
packet capture, using 72-31
packet tracer, using 72-23
remote access SSL VPNs
advanced settings 31-72
Anyconnect client settings 31-62, 31-64
browser plug-ins 31-60
configuring HTTP/HTTPS proxies and proxy bypass 31-57
content rewrite rules 31-53
encoding rules 31-55
Kerberos Constrained Delegation (KCD) 31-67, 31-69
other settings 31-51
performance settings 31-52
server certificate verification settings 31-30, 31-31, 31-32, 31-74
shared license 31-74
shared license clients (ASA) 31-76
shared license servers (ASA) 31-77
remote access VPNs
access policies (ASA), configuring 31-50
access policies (ASA), reference 31-45
access policies (ASA), understanding 31-44
AnyConnect client image settings (ASA) 31-66
AnyConnect custom attributes (ASA) 31-70, 31-71
certificate to connection profile map policy (IKEv1) 31-36
certificate to connection profile map rules (IKEv1 IPSec) 31-37
cluster load balancing 31-5
configuring bookmarks 31-83
configuring portal appearance 31-78
configuring WINS servers for file system access 31-88
connection profiles 31-7, 31-8
creating IPSec 30-25
creating SSL 30-14
customizing 31-77
device support 30-8
dynamic access policies 32-1, 32-2
dynamic access policy (DAP) attributes 32-4, 32-7
Dynamic Access policy page (ASA) 32-11
fragmentation settings 26-31, 26-44
group policies, configuring 31-26
group policies, creating 31-28
group policies, understanding 31-27
IKE proposals 26-9
IKEv2 settings 26-37
IPsec proposals 31-41
ISAKMP/IPsec settings 26-33
managing 31-1
NAT settings 26-42
policy overview 31-2
post URL method and macro substitutions in bookmarks 31-84
proxy bypass rules (ASA) 31-59
Public Key Infrastructure (PKI) 26-56
secure desktop manager policies 32-9
smart tunnels 31-85
understanding IKE 26-5
understanding NAT settings 26-41
wizard 30-13
Report Manager reports
firewall summary botnet reports 70-15
firewall traffic reports 70-14
general VPN reports 70-16
VPN top reports 70-16
selecting for Event Viewer 69-34
selecting policy types to manage 5-11
SSL certificate configuration 11-22
ASA group policies objects
client configuration settings 34-6
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-10
split tunneling settings 34-31
SSL VPN clientless settings 34-12
SSL VPN full client settings 34-19
SSL VPN settings 34-25
technology settings 34-1
ASA Image Management 73-16, 73-32
ASAv
about 46-1
ASBR
definition 56-75
ASCII limitations for text 1-50
ASDM
access rule look-up 72-18
device manager 72-16
AS path objects
properties 56-154
ASR
zone-based firewall
global parameters 21-50
restrictions 21-3
assignment overview 1-20
Assignments tab, Policy view 5-54
Assign Shared Policy command 1-32
Assign Shared Policy dialog box 5-44
Asymmetric Digital Subscriber Line (ADSL)
on Cisco IOS routers 62-34
Asymmetric Routing Groups 46-6
Asynchronous Transfer Mode (ATM) 62-47
ATM 62-47
virtual channel connections (VCCs) 62-47
virtual channel identifier (VCI) 62-47
virtual path connections (VPCs) 62-47
virtual path identifier (VPI) 62-47
Attack Response Controller 43-1
attacks
broadcast 17-4
Denial of Service (DoS) 17-5
spoofing 17-4
SYN flooding 17-5
audit logs
configuring default settings 11-62
purging entries 10-23
understanding 10-19
working with 10-19
Audit Message Detail dialog box 10-21
Audit Report command 1-34
audit reports
generating and viewing 10-20
understanding 10-19
working with 10-19
Audit Report window 10-21
AUS
deploying configurations 8-41
deployment method 8-10
setting up 2-8
setting up on PIX Firewall and ASA devices 2-8
Authentication
Cisco IOS routers
settings 63-6
authentication
routing protocols 56-75
Authentication-Authorization-Accounting
see AAA 48-1
Authentication Header (AH) encryption algorithm 26-30
authentication methods
certificates (RSA signatures) 26-8
in IKE proposals 26-8
preshared keys 26-8
authentication testing
SSH 2-6
Authorization
Cisco IOS routers
settings 63-8
authorization proxy (AuthProxy)
configuring AAA rules 15-7
AuthProxy
configuring settings in Map view 35-24
Auth Proxy Configuration
ASA CX 58-17
AuthProxy dialog box 15-19
AuthProxy settings policy
configuring 15-9
autolink
omitting reserved networks from maps 11-3
automatic conflict detection
resolving conflicts 16-34
understanding 16-28
understanding the user interface 16-30
using 16-28
autonomous system paths
See AS paths
auto signon rules
ASA group policy objects 34-27
Auto Update Server (AUS)
adding 3-36
licensing 10-17
PIX/ASA/FWSM 52-1
add/edit server 52-3, 53-2, 53-3, 53-4
troubleshooting deployment 9-18
Auto Update Server Properties dialog box 3-38
Available Bit Rate (ABR) 62-48
Available Servers dialog box 3-39
B
background image, map
deleting 35-13
importing 35-13
scale and position 35-13
setting 35-13
backup
event data store 69-36
backup.pl command 10-25
Backup command 1-35
backups, Security Manager database 10-25
bandwidth
VPN user reports 70-16
banners
configuring on firewall devices 48-9
benefits of product 1-2
BGP routing
BGP Routing Policy page 67-4
defining routes 67-2
Neighbors dialog box 67-6
on Cisco IOS routers 67-1
PIX/ASA/FWSM 56-2, 56-3
General tab 56-5
IPv4 Family - Aggregate Address configuration 56-9, 56-22
IPv4 Family - Filter configuration 56-10
IPv4 Family - General tab 56-7, 56-21
IPv4 Family - Neighbor configuration 56-11, 56-24
IPv4 Family - Network configuration 56-17, 56-29
IPv4 Family - Redistribution configuration 56-18, 56-30
IPv4 Family - Route Injection configuration 56-19, 56-31
IPv4 Family tab 56-6, 56-20
redistributing routes 67-3
Redistribution Mapping dialog box 67-7
Redistribution tab 67-7
Setup tab 67-5
Bidirectional Neighbor Filter 55-14
Bidirectional Neighbor Filter tab
PIM 55-13
blocking, IPS
configuring 43-7
configuring ARC 43-1
configuring blocking devices 43-14
configuring master blocking sensors 43-13
configuring never block hosts and networks 43-17
configuring router blocking interfaces 43-15
configuring user profiles 43-12
configuring VLAN blocking interfaces 43-16
general options 43-10
master blocking sensor 43-6
policy 43-8
rate limiting 43-4
router and switch blocking devices 43-4
strategies 43-3
understanding 43-1
Blocking page 43-8
Boot image/configuration
PIX/ASA 48-10
add/edit 48-12
bootstrap configuration
Failover 50-26
Botnet Traffic Filter Drop Rules Editor 19-13
botnet traffic filter rules
adding static entries 19-5
blocking blacklisted traffic 19-6
configuring DNS snooping 17-19
configuring in Map view 35-23
configuring the dynamic database 19-4
configuring with IPS global correlation 42-1
databases 19-1
Device Blacklist dialog box 19-15
Device Whitelist dialog box 19-15
Drop Rules Editor 19-13
Dynamic Blacklist Configuration tab 19-10
enabling DNS snooping 19-6
field definitions 19-9
illustrations 19-1
mitigating botnet activity 69-65
monitoring
activity using ASDM 69-64
activity using Event Viewer 69-62, 69-64
overview 69-61
understanding botnet syslog events 69-61
overview 19-1
preserving ACL names 12-4
Report Manager reports
firewall summary botnet reports 70-15
task flow 19-2
traffic classification 19-6
Traffic Classification dialog box 19-12
Traffic Classification tab 19-11
understanding 19-1
understanding NAT effects 12-3
understanding processing order 12-2
Whitelist/Blacklist tab 19-14
bridge group
failover
editing 50-17
Bridge Groups
ASA/FWSM
add/edit 46-62
bridge groups
defining 63-20
FWSM 3.1 47-3
Bridging
ASA 5505
Management IPv6 47-11
PIX/ASA/FWSM
ARP configuration 47-5
ARP Inspection 47-5
ARP Inspection, enable/disable 47-6
ARP Table 47-3
MAC Address, add/edit 47-8
MAC Address Table 47-8
MAC Learning 47-9
MAC Learning, enable/disable 47-9
Management IP address 47-10
bridging
Cisco IOS routers
Bridge Group dialog box 63-21
Bridging Policy page 63-21
BVI interfaces 63-19
overview 63-18
configuring transparent firewall rules 23-1
PIX/ASA/FWSM
about 47-1
configuring on 47-1
broadcast attacks, preventing 17-4
broadcasts
enabling directed on routers 62-20
browser plug-ins
configuring 31-60
Bundles 73-13
bypass mode
configuring for IPS 37-12
C
CA server authentication methods
SCEP (Simple Certificate Enrollment Protocol) 26-51
Cat6k Device dialog box 43-14
Catalyst 6500/7600 devices
configuring FWSM in site-to-site VPNs 25-47
configuring SSH 2-6
default transport protocol 11-22
deployment 8-28
FlexConfig object samples 7-22
IPS blocking devices 43-4
policy discovery for FWSM 5-13
rollback restrictions 8-65
Service Modules 46-1
Catalyst 6500/7600 switches
including in deployment jobs 8-28
Catalyst devices
policy discovery 5-13
remote access VPNs
Dynamic VTI/VRF Aware IPsec settings 33-7
high availability 33-11
IPsec proposals 33-4
user group policies 33-13
VPNSM/VPN SPA/VSPA settings 33-6
Catalyst platform policies
IDSM settings policy
Create and Edit IDSM Data Port VLANs dialog boxes 68-49
Create and Edit IDSM EtherChannel VLANs dialog boxes 68-49
IDSM Settings page 68-47
IDSM Slot-Port Selector dialog box 68-50
interfaces/VLANs policy
Access Port Selector dialog box 68-30
Create and Edit Interface dialog boxes-Access Port mode 68-9
Create and Edit Interface dialog boxes-Dynamic Port mode 68-18
Create and Edit Interface dialog boxes-Other mode 68-24
Create and Edit Interface dialog boxes-Routed Port mode 68-12
Create and Edit Interface dialog boxes-subinterfaces 68-22
Create and Edit Interface dialog boxes-Trunk Port mode 68-14
Create and Edit VLAN dialog boxes 68-28
Create and Edit VLAN Group dialog boxes 68-34
Interfaces tab 68-8
Service Module Slot Selector dialog box 68-35
Summary tab 68-3
Trunk Port Selector dialog box 68-31
VLAN Groups tab 68-33
VLAN Selector dialog box 68-35
VLANs tab 68-27
VLAN access lists policy
Create and Edit VLAN ACL Content dialog boxes 68-41
Create and Edit VLAN ACL dialog boxes 68-41
VLAN Access Lists page 68-39
Catalyst Summary Info command 1-35
Catalyst switches
configuring SSH 2-6
default transport protocol 11-22
showing modules, security contexts, and virtual sensors 3-56
Catalyst switches/7600 routers
troubleshooting deployment 9-16
Catalyst switches and 7600 devices
IDSM mode support 68-43
interface deployment failure 9-16
internal VLAN deployment failure 9-17
supported VTP modes 68-1
Catalyst switches and 7600 Series routers
access ports 68-5
Catalyst Summary Info page 68-2
defining IDSM Data Port VLANs 68-46
defining IDSM EtherChannel VLANs 68-44
defining ports 68-6
defining VACLs 68-37
defining VLAN groups 68-32
defining VLANs 68-26
deleting IDSM Data Port VLANs 68-47
deleting IDSM EtherChannel VLANs 68-45
deleting ports 68-7
deleting VACLs 68-38
deleting VLAN groups 68-33
deleting VLANs 68-27
discovering policies 68-1
generating interface names 68-6
IDSM settings 68-43
IDSM Settings page 68-47
interfaces 68-5
managing 68-1
routed ports 68-5
trunk ports 68-5
viewing interface and VLAN summary 68-3
VLAN Access Lists page 68-39
VLAN ACLs (VACLs) 68-36
VLAN groups 68-31
VLANs 68-25
Catalyst VPN Service Port Adapters (VSPAs)
configuring 25-42
Catalyst VPN Services Module (VPNSM)
configuring 25-42
configuring in remote access VPNs 33-6
Catalyst VPN Shared Port Adapter (VPN SPA)
configuring 25-42
configuring in remote access VPNs 33-6
categories
using 6-13
cautions
significance of 2-lxiii
CCO settings 11-4
CDP
configuring mode for IPS 37-12
CEF Interface Settings dialog box 62-27
CEF interface settings policies 62-25
certificates
accepting 11-4, 11-52
retrieving 11-4, 11-52
viewing 11-4, 11-52
certificates, SSL
adding thumbprints manually 9-5
configuring default settings for how handled 11-22
managing IPS 44-10
certificates for ASA image downloads 11-4
certificates for IPS package downloads 11-52
certificate to connection profile map policies
configuring policy 31-36
configuring rules 31-37
certificate trust management 11-4, 11-52
Change Report dialog box 4-18
change reports
selecting session in non-Workflow mode 4-18
viewing 4-16
Change Reports command 1-34
Checkpoint migration
configuring object group search on ASA 8.3+ devices 16-25
Choose a file dialog box 34-39
Cisco 7600 Series routers
managing 68-1
Cisco AnyConnect Profile Editor 31-63
Cisco Configuration Engine
troubleshooting device setup and deployment 9-19
Cisco Discovery Protocol (CDP)
enabling CDP on router interfaces 62-18
Cisco Express Forwarding (CEF)
CEF Interface Settings policy 62-26
CEF router interface settings policies 62-25
importance for QoS 66-2
Cisco IOS IPS
affect of load balancing 45-8
configuration files 45-3
configuration overview 45-4
configuring 45-1
configuring general settings 45-7
configuring interface rules 45-9
getting started 36-1
initial preparation of router 45-5
lightweight signature engines 45-2
limitations and restrictions 45-3
selecting signature category 45-6
understanding 45-1
understanding subsystems and revisions 45-2
Cisco IOS Routers
configuring IOS IPS 45-1
IPS blocking devices 43-4
Cisco IOS routers
802.1x 64-1
AAA 63-2
accounts and credentials 63-14
ADSL 62-34
advanced interface settings 62-13
available interface types 62-2
basic interface settings 62-1
BGP routing 67-1
configuring SSH 2-6
CPU settings 63-25
default AAA server groups 6-31
deploying configurations using TMS 8-43
dialer interfaces 62-28
discovering policies 61-3
Domain Name System (DNS) 63-74
Dynamic Host Configuration Protocol (DHCP) 63-87
EIGRP routing 67-8
host and domain names 63-77
HTTP 63-28
interface deployment failure 9-15
IOS 12.1 and 12.2 61-3
licenses 2-10
line access 63-35
managing 61-1
memory settings 63-78
NAT 24-5
designating interfaces 24-6
dynamic rules 24-10
static rules 24-6
timeouts 24-13
NetFlow 65-1, 65-5, 65-12
Network Admission Control (NAC) 64-8
Network Time Protocol (NTP) 63-96
optional SSH settings 63-63
OSPF routing 67-19
permanent virtual connections (PVCs) 62-47
platform policies 61-1
Point-to-Point Protocol (PPP) 62-71
policy discovery 5-13
quality of service (QoS) 66-1
RIP routing 67-42
Secure Device Provisioning (SDP) 63-81
setting up SSL (HTTPS) 2-4
SHDSL 62-41
SNMP 63-66
static routing 67-50
syslog logging 65-1
time zone settings 63-22
transparent bridging 63-18
Cisco IOS Software
FlexConfig object samples 7-22
selecting policy types to manage 5-11
Cisco Prime Security Manager
see PRSM 72-20, 72-21
Cisco Secure Desktop configuration objects
creating 33-18
Cisco Security Management Suite server
logging into or exiting 1-12
Cisco Technical Assistance Center
creating diagnostic file 10-28
generating data 10-28
generating deployment or discovery status reports 10-30
generating partial database backup 10-30
Cisco Trust Agent (CTA) 64-9
CiscoWorks Common Services
backing up and restoring Security Manager 10-24
logging into or exiting 1-12
CiscoWorks user authorization, affect on what you can do 1-11
Class-Based Policing 66-6
class maps
understanding 6-78
Clear Connection Configuration dialog box 15-25
clear xlate
PIX/ASA/FWSM platform 60-1
CLI commands
FlexConfig objects 7-2
client applications 72-2
client connection characteristics
configuration modes 28-3
configuring policies for Easy VPN 28-7
extended authentication (xauth) 28-4
clientless access mode 30-4
client settings
configuring AnyConnect 31-64
understanding AnyConnect 31-62
client-side file browsing 1-50
enabling or disabling 11-10
CLI prompt
configuring on firewall devices 48-12
Clock
PIX/ASA/FWSM 48-14
clock
Cisco IOS routers
overview 63-22
clock settings
Cisco IOS routers
Clock Policy page 63-23
Clone Device command 1-30
Clone Policy Bundle dialog box 5-58
Clone Policy command 1-32
Clone Policy dialog box 5-47
Close Activity command 1-36
Close All Reports command (Report Manager) 70-8
Close Report command (Report Manager) 70-8
Close Ticket command 1-37
cluster, server
managing 10-2
overview 10-2
splitting server 10-3
synchronizing shared policies 10-5
Cluster Information page, device properties 3-50
clustering 3-9
cluster load balancing
configuring 31-5
understanding 31-5
understanding FQDN redirection 31-5
CNS
deploying configurations 8-41
deployment method 8-10
setting up on PIX Firewall and ASA devices 2-8
color rules, configuring in Event Viewer 69-40
Combine Rules Selection Summary dialog box 12-24
commands
Activities menu 1-36
Edit menu (Configuration Manager) 1-31
Event Viewer File menu 69-9
Event Viewer View menu 69-10
File menu (Configuration Manager) 1-30
Help menu (Configuration Manager) 1-38
Launch menu 1-37
Manage menu 1-34
Map menu 1-33
Policy menu (Configuration Manager) 1-32
Report Manager menus 70-8
Tickets menu 1-36
Tools menu (Configuration Manager) 1-34
View menu (Configuration Manager) 1-31
Common Services
licensing 10-17
communication, device
troubleshooting 9-8
community list objects
properties 56-156
configurable dashboard for IPS and FW 72-1
configuration
initial Security Manager 1-25
understanding rollback 8-63
Configuration Archive
adding configurations from devices 8-59
overview 8-15
rolling back to archived configuration files 8-70
rolling back when deploying to file 8-71
settings 11-6
version viewer 8-60
viewing and comparing configuration versions 8-59
viewing transcripts 8-62
window 8-23
Configuration Archive command 1-34
Configuration Archive page 11-6
Configuration Engine
adding 3-36
setting up 2-8
Configuration Engine Properties dialog box 3-38
configuration files
deploying in non-Workflow mode 8-28
deploying in Workflow mode 8-34, 8-39
deploying to 8-11
deploying to an AUS or CNS 8-41
deploying to a TMS 8-43
deployment process overview 8-1
factory-default configurations 46-2
previewing 8-44
redeploying to devices 8-53
rolling back after deploying to file 8-71
rolling back to archived configurations 8-70
rolling back to devices 8-69
selecting 1-50
web VPN policy discovery restrictions 3-8
configuration location, configuring for IOS IPS 45-7
Configuration Manager
overview 1-14
using 1-14
configurations
adding to the Configuration Archive 8-59
avoiding out-of-band changes 8-47
detecting out-of-band changes 8-45
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rolling back 8-63
rolling back Catalyst 6500/7600 8-65
rolling back failover devices 8-65
rolling back IPS and IOS IPS 8-66
rolling back multiple context mode 8-64
understanding out-of-band changes 8-12
viewing and comparing 8-59
configuration session
selecting session for change reports 4-18
viewing change reports 4-16
configuration sessions
discarding 4-22
configuration views 1-14
Configure dialog box 17-22
Configure DNS dialog box 17-19
Configure ESMTP dialog box 17-20
Configure Fragments dialog box 17-20
Configure Hardware Ports
ASA 5505 46-61
Configure IMAP dialog box 17-21
Configure POP3 dialog box 17-21
Configure RPC dialog box 17-21
Configure SMTP dialog box 17-20
Config Version Viewer (Preview Configuration) dialog box 8-44
conflict analysis reports
generating 16-34
conflict detection
resolving conflicts 16-34
understanding 16-28
understanding the user interface 16-30
using 16-28
connection
PIX/ASA/FWSM
identity-aware rules 13-21
rules 58-5
Connection Alias dialog box 31-25, 31-34
Connection Profile dialog box
AAA tab 31-13
General tab 31-10
IPSec tab 31-19
Secondary AAA tab 31-17
SSL tab 31-22
connection profiles
configuring 31-7
configuring for Easy VPN 28-13
properties
AAA 31-13
general 31-10
IPSec 31-19
policy overview 31-8
secondary AAA 31-17
SSL 31-22
sharing among multiple ASAs 30-8
Connection Profiles page 31-8
Connection Settings
MPC rule wizard
tab 58-8
connection timeout
device communication settings 11-22
Connection URL dialog box 31-26
connectivity, testing device 9-1
console
Cisco IOS routers
AAA tab 63-44
Accounting tab 63-47
Authentication tab 63-44
Authorization tab 63-45
Console Policy page 63-42
Setup tab 63-42
console port
Cisco IOS routers
defining AAA settings 63-37
defining setup parameters 63-35
Console timeout
PIX/ASA/FWSM 49-1
Constant Bit Rate (CBR) 62-48
contained modules
showing 3-56
content rewrite rules
defining for SSL VPN on ASA 31-53
Context-Based Access Control
choosing interfaces 17-2
configuring 17-5
configuring identity aware 13-21
preventing DoS attacks on IOS devices 17-5
selecting protocols 17-3
understanding 17-2
understanding access rule requirements 17-4
Context Editor dialog box (IOS) 33-15
contexts
see “security contexts” 59-1
continuity check (CC) cells 62-51
control plane (CP)
defining QoS on 66-12
policing on 66-9
Control Plane Policing 66-9
conventions 2-lxiii
cookie challenges 26-37
Copy command 1-31, 12-9
Copy Policies Between Devices command 1-32
Copy Policies wizard 5-33
CPU settings
defining utilization settings 63-25
overview 63-25
CPU Throttling Policy 11-33
CPU utilization
CPU Policy page 63-26
Create a Clone of Device dialog box 3-56
Create Activity dialog box 4-14
Create a Policy dialog box 5-54
Create Discovery Task dialog box 5-18
Create Extranet VPN Topology wizard
overview 25-66
Create Filter dialog box 1-46
Create Group Policy wizard
Clientless and Thin Client Access Modes page 30-24
Full Tunnel page 30-21
Group Policy page 30-20
using 30-20
Create Overrides for Device dialog box 6-20
Create Policy Bundle dialog box 5-57
Create Text Object dialog box 7-32
Create Ticket dialog box 4-14
Create VPN Topology wizard
Device Selection page 25-32
Edit Endpoints dialog box 25-34
Endpoints page 25-34
GET VPN Group Encryption page 25-54
GET VPN Peers page 25-60
High Availability page 25-52
Name and Technology page 25-30
overview 25-28
VPN Defaults page 25-62
credential objects
attributes 28-9
credentials
configuring on firewall devices 48-17
device manager validation 72-14
IPS module 3-20
service module 3-19
testing 9-1
understanding device 3-4
Credentials page
HTTPS port number
overriding with HTTP policy 3-47
Credentials page, device properties 3-45
crypto maps
understanding 26-19
CSC
MPC rule wizard
tab 58-8
CSDM Policy Editor dialog box 32-46
CS-MARS
access to Security Manager 72-39
configuring servers 11-7
discovering or changing controller used by device 72-41
events
historical and real-time lookup 72-43
looking up 72-43
integrating with Security Manager 72-37
integration with Security Manager 72-38
looking up Security Manager policies based on events 72-47
NetFlow 72-49
query
troubleshooting 72-42
registering in Security Manager 72-40
supported log messages 72-48
viewing access rule events 72-44
viewing IPS signature events 72-46
CS-MARS page 11-7
CSMDiagnostics.zip
setting debug options 11-11
CSMDiagnostics.zip file, creating 10-28
CSM Mobile 72-11
settings page 11-9
CSM Monitor widget 72-7
CSM tab, Licensing page 11-57
CSV (comma-separated values) files
supported formats for device inventory 10-9
CSV file
export HPM data as 71-31
Customize Desktop Settings page 11-10
Customized Toolbar command 1-32
Custom Protocol dialog box 17-22
Custom Report List command (Report Manager) 70-9
Cut command 1-31, 12-9
cut-through proxy, configuring 13-23
CX
ASA module
detecting 72-21
CXSC
MPC rule wizard
tab 58-8
D
Dashboard
CSM Mobile settings page 11-9
Dashboard tabs
default view 72-8
re-arranging 72-8
Dashboard widgets for device heath trends 72-2
database
backing up 10-25
backing up and restoring 10-24
generating partial backups for TAC 10-30
restoring 10-27
DCE/RPC policy map objects
creating 17-22
properties 17-29
DCS.properties file
DCS.doSerialAccessForFWSMVCs property 9-17
DCS.FWSM.checkThreshold property 9-17
SSH settings 9-7
warning message expression properties 9-10
DDNS
PIX/ASA/FWSM 52-18
add interface rules 52-19
update methods 52-19
update methods, add/edit 52-20
dead-peer detection (DPD) 26-33
debugging
configuring debug levels 11-11
Debug Options page 11-11
Default Report Settings command (Report Manager) 70-9
defaults, configuring 11-1
Delete Device command 1-30
Delete Map command 1-33
Delete Map dialog box 35-10
Delete Row command 1-31
Denial of Service (DoS)
preventing in SMTP using zone based firewall 21-27
denial of service (DoS)
preventing using unicast reverse path forwarding (RFP) 62-20
Denial of Service (DoS) attacks
configuring inspection settings to mitigate 17-111
preventing on IOS devices using inspection 17-5
denial of service (DoS) attacks
preventing using IKEv2 cookie challenge 26-37
deny
inspection
rules 17-5
Deploy command 1-31
Deploy Job dialog box 8-39
deployment
Add Other Devices dialog box 8-58
Auto Update Server 8-41
Catalyst 6500/7600 devices 8-28
changes not deployed when using schedules 8-55
changing device message severity level to ignore errors 9-10
changing FWSM multiple-context deployment to serial 9-17
Cisco Networking Services configuration engine 8-41
clearing XLATE on 60-1
configuration files, to 8-11
configurations 8-28
creating jobs in Workflow mode 8-35
creating or editing schedules 8-55
Deployment Manager window 8-16
device communication settings 9-4
devices, directly to 8-9
devices, through intermediate server 8-10
Edit Deploy Method dialog box 8-30
Edit Selected Deployment Method dialog box 8-30
error attempting to remove unreferenced object 9-12
errors
OS version mismatches 8-13
generating status report 10-30
handling OS version mismatches 8-13
managing 8-1
methods 8-8
minimum memory errors for ASA 8.3+ 9-12
non-Workflow mode 8-3
optimizing access rules 16-46
out-of-band changes
avoiding 8-47
detecting and analyzing 8-45
understanding 8-12
process overview 8-1
rolling back archived configurations 8-70
rolling back configurations 8-63
rolling back configurations, Catalyst 6500/7600 8-65
rolling back configurations, command conflicts 8-67
rolling back configurations, commands to recover from failover misconfiguration 8-68
rolling back configurations, failover devices 8-65
rolling back configurations, IPS and IOS IPS devices 8-66
rolling back configurations, multiple context mode 8-64
rolling back configuration when deploying to file 8-71
rolling back to last deployed configuration 8-69
setting debug options 11-11
suspending or resuming schedules 8-58
system settings 11-13
task flow
non-Workflow mode 8-3
Workflow mode 8-5
tips for successful jobs 8-27
TMS server 8-43
troubleshooting 9-1, 9-9
ADSL or PVC deployment failures 9-15
AUS problems 9-18
Catalyst interface settings 9-16
Catalyst internal VLANs 9-17
Catalyst switch and modules 9-16
Configuration Engine problems 9-19
Error Writing to Server messages 9-16
HTTP Response Code 500 messages 9-16
layer 2 interfaces 9-15
mixing deployment methods with routers and VPNs 9-14
router interface settings 9-15
routers 9-15
Security Manager cannot contact device 9-12
VPNs with routing processes 9-13
troubleshooting device communication 9-8
troubleshooting router connection failures 2-2
troubleshooting SSL certificate errors 9-5
troubleshooting VRF-aware IPsec on Catalyst 6500/7600 devices 25-17
understanding 8-1
understanding configuration rollback 8-63
using a Cisco Networking Services (CNS) server 8-41
viewing device details 8-26
viewing job summary 8-26
viewing status and history for jobs and schedules 8-26
viewing transcripts 8-62
Warning - Partial VPN Deployment dialog box 8-31
Workflow mode 8-5, 8-34, 8-39
working with 8-25
Deployment—Create or Edit a Job dialog box 8-35
deployment jobs
aborting 8-55
approval 8-7
approving 8-39
creating and editing in non-Workflow mode 8-28
creating and editing in Workflow mode 8-35
Deployment Manager 8-16
discarding 8-41
including devices in 8-8
multiple users 8-8
redeploying 8-53
rejecting 8-39
states
non-Workflow mode 8-4
Workflow mode 8-6
submitting 8-38
viewing history 8-26
Deployment Manager
overview 8-15, 8-16
Deployment Manager window 8-16
Deployment Schedules tab 8-21
Deployment page
PIX/ASA/FWSM Platform
clear xlate 60-1
Deployment Schedules tab 8-21
Deployments command 1-34
Deployment Settings page 11-13
Deployment Status Details dialog box 8-32
Deployment Workflow Commentary dialog boxes 8-20
Deploy Saved Changes dialog box 8-28
DES encryption algorithm
in IKE proposals 26-6
Designated Router
PIX/ASA/FWSM 55-12
Destination Contents dialog box 12-14
Dest Port Map dialog box 41-12
Detect Out of Band Changes command 1-35
device
AAA administration 48-4
firewall types 46-1
viewing inventory status 72-12
Device Access
FWSM
Resources, add/edit 51-4
PIX/ASA/FWSM 49-1
console timeout 49-1
host name 51-1
HTTP configuration 49-3
HTTP page 49-2
ICMP rules 49-4
ICMP rules, add/edit 49-5
Management Access interface 49-6
Secure Shell, add/edit host 49-8
Secure Shell (SSH) 49-7, 49-9
Server Access 52-1, 53-1
SNMP host access 49-22
SNMP page 49-17
SNMP Trap configuration 49-19
Telnet configuration 49-29
Telnet page 49-29
user accounts 51-7
user accounts, add/edit 51-7
device access policies
defining 63-14
Device Admin
FWSM
Resources 51-3
device administration policies
configuring on firewall devices 48-1
device authentication
adding SSL thumbprints manually 9-5
SSL certificate default configuration 11-22
Device Blacklist dialog box 19-15
device clusters 3-9
device communication
changing device message severity level 9-10
managing settings 9-4
routers without K8/K9 crypto image 9-8
Security Manager cannot contact device after deployment 9-12
troubleshooting failures 9-8
Device Communication page 11-21
device communications
troubleshooting 9-1
device communication settings
connection timeout 11-22
retry count 11-22
socket read timeout 11-22
Device Connectivity Test dialog box 9-3
device credentials
understanding 3-4
Device Credentials page 3-45
Device Delete Validation dialog box 3-59
device groups 3-59, 3-62
adding or removing devices 3-63
creating group types 3-62
deleting groups or types 3-63
understanding 3-60
Device Groups page 3-49, 11-24
device health trends in Dashboard 72-2
Device Information page - Add Device from File 3-33
Device Information page - Configuration File 3-23
Device Information page - Network 3-14
Device Information page- New Device 3-27
device inventory
exporting
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
using command line utility 10-10
importing
device with policies 10-13
importing with policies 10-13
managing 3-1
sharing with PRSM 72-23
testing device connectivity 9-1
understanding 3-1
understanding contents 3-3
understanding device clusters 3-9
understanding generic devices 3-8
working with 3-36
device manager
access rule look up 72-17
ASDM 72-16
access rule look-up 72-18
credentials 72-14
IDM 72-15
PDM 72-15
prerequisites 72-16
SDM 72-16
access rule look-up 72-19
starting from HPM 71-3, 71-27
starting from Security Manager 72-14
troubleshooting 72-16
xdm-launcher.exe 72-17
Device Manager command 1-37
Device Properties
Cluster Information page 3-50
Credentials page 3-45
Device Groups page 3-49
General page 3-41
Policy Object Override pages
general reference 3-52
device properties
changes with policy effects 3-54
changing critical 3-52
image version changes with no policy effects 3-53
understanding 3-6
viewing or changing 3-40
Device Properties command 1-35
Device Properties page
creating object overrides 6-19
deleting overrides 6-21
overview 3-40
device response
to appear as an error message 9-10
devices
adding 3-6
adding configurations to the Configuration Archive 8-59
adding from configuration files 3-22
adding from inventory file 3-31
adding from network 3-12
adding local rules to shared policies 5-45
adding manually 3-26
adding or changing modules 3-40
assigning shared policies 5-44
avoiding out-of-band changes 8-47
changing critical properties 3-52
changing those selected for reports 70-22
cloning or duplicating 3-56
cloning shared policies 5-47
communication requirements 2-1
communication settings and certificates 9-4
configuring ASA licenses 2-9
configuring IOS licenses 2-10
configuring local policies 5-31
copying policies between 5-33
creating policy object overrides 6-19
deleting from inventory 3-58
deleting policy object overrides 6-21
deployment through intermediate server 8-10
deployment to 8-9
detecting out-of-band changes 8-45
discovering or changing CS-MARS controller 72-41
discovering policies 5-12
discovering policies on existing devices 5-15
dynamic IP addresses 3-36
image version changes with no policy effects 3-53
including in deployment jobs or schedules 8-8
including unmanaged or non-Cisco in a VPN 25-11
inheriting policy rules 5-47
maps
adding existing managed 35-16
adding new managed 35-16
displaying devices from Device View 35-16
displaying managed 35-16
removing managed 35-16
showing containment for Catalyst switches, ASA, PIX, IPS devices 35-16
modifying policy assignment 5-49
modifying shared policies 5-49
naming conventions 3-3
overview of monitoring 1-7
policy status icons 5-30
preparing for management 2-1
property changes with policy effects 3-54
redeploying configuration files to 8-53
redeploying configurations to replaced hardware 8-53
renaming policies 5-48
replacing policies 5-44
rolling back configurations 8-69, 8-70, 8-71
selecting in site-to-site VPNs 25-32
selecting multiple 1-45
sharing multiple policies 5-42
sharing with PRSM 72-23
showing contained modules 3-56
system variables 7-7
testing connectivity 9-1
troubleshooting communication 9-8
troubleshooting communication and deployment 9-1
troubleshooting device discovery failures 3-7
unassigning policies 5-36
understanding out-of-band changes 8-12
unsharing policies 5-43
using global search to find specific devices 1-42
what counts as a device 3-3
device selector
filtering 1-45
Device Selector dialog box 1-45
Device Server Assignment dialog box 9-9
device status view
working with 3-64
Device Status View command 1-32
Device view
adding local rules to shared policies 5-45
assigning shared policies 5-44
cloning shared policies 5-47
configuring local policies 5-31
configuring VPN topologies 25-19
copying policies between devices 5-33
inheriting policies 5-47
managing policies 5-30
modifying policy assignments 5-49
modifying shared policies 5-49
overview 1-15
policy banner 5-38
policy shortcut menu 5-40
policy status icons 5-30
renaming policies 5-48
sharing local policies 5-41
sharing multiple policies 5-42
unassigning policies 5-36
understanding basic policy management 5-31
understanding shared policies 5-37
unsharing policies 5-43
device view
understanding 3-1
Device View command 1-32
Device Whitelist dialog box 19-15
DHCP
Cisco IOS routers
defining address pools 63-91
defining policies 63-90
DHCP Database dialog box 63-94
DHCP Policy page 63-92
IP Pool dialog box 63-94
overview 63-87
understanding database agents 63-88
understanding option 82 63-89
understanding relay agents 63-88
understanding secured ARP 63-89
configuring passthrough for IOS devices 23-3
PIX/ASA/FWSM 52-10
add/edit servers 52-12
advanced configuration 52-13
configuring DHCP servers 52-10
server options 52-13
traffic blocked 9-15
DHCP relay
interface-specific 46-41
Option 82 46-41, 52-5
PIX/ASA/FWSM 52-5, 52-7
add/edit agent 52-6
add/edit server 52-7
Trusted Interface (Option 82) 46-41, 52-5
DHCPv6 relay
PIX/ASA/FWSM
add/edit agent 52-9
add/edit server 52-9
diagnostics
setting debug options 11-11
diagnostics file, creating 10-28
dial backup
configuring in Easy VPN 28-2
configuring in VPN 25-40
configuring VPN advanced settings 25-41
Dial Backup Settings dialog box 25-41
dialer interfaces
defining BRI properties 62-30
defining profiles 62-28
Dialer Physical Interface dialog box 62-33
Dialer Policy page 62-31
Dialer Profile dialog box 62-32
on Cisco IOS routers 62-28
Diffie-Hellman groups
in IKE proposals 26-7
Digital Subscriber Line (DSL) 62-34
digital subscriber line-access multiplexer (DSLAM) 62-35
directed broadcasts
enabling 62-20
Disable/enable NAT rules 24-35, 24-47
Discard Activity command 1-36
Discard Activity dialog box 4-22
Discard command 1-31
Discard Deployment Job dialog box 8-20
Discard Ticket command 1-37
Discard Ticket dialog box 4-22
discovering
remote access VPNs 30-12
site-to-site VPNs 25-24
Discover Policies on Device command 1-32
Discover VPN Policies command 1-32
Discover VPN Policies wizard 25-24
discovery
default behavior settings 11-25
generating status report 10-30
invalid certificate error 9-7
overview 1-20
security certificate error 9-5, 9-6
setting debug options 11-11
Discovery Settings page 11-25
Discovery Status dialog box 5-23
discovery task
frequently asked questions 5-27
starting 5-15
viewing status 5-22
disk space, monitoring event data store 69-35
Display Actual Size command 1-33
Distributed Traffic Shaping (DTS) 66-7
DMVPN (Dynamic Multipoint VPN)
advantages of using with GRE 27-11
configuring 27-12
configuring GRE modes 27-12
large scale DMVPNs
configuring 27-16
configuring server load balancing 27-17
overview 27-1, 27-9
spoke-to-spoke connections 27-10
supported platforms 25-9
understanding 27-10
DNS
configuring for inspection rules 17-19
PIX/ASA/FWSM
add/edit server group 52-16
add server 52-17
servers page 52-14
DNS class map objects
creating 17-22
match criteria 17-36
DNS policy map objects
creating 17-22
match conditions and actions 17-36
properties 17-32
DNS servers
configuring for IPS global correlation 36-24
DNS snooping 19-6
dock
report windows 70-30
view windows 69-38
Dock Map View command 1-33
documentation
conventions 2-lxiii
Domain AD Server dialog box 13-10
Domain Name System (DNS)
Cisco IOS routers
defining policies 63-75
DNS Policy page 63-76
IP Host dialog box 63-76
overview 63-74
do not ask warnings, resetting 11-10
drill-down reports 70-26
DSLAM 62-35
duration
VPN user reports 70-16
dynamic access policies
attributes 32-4, 32-7
configuring 32-2
managing 32-1
understanding 32-1
dynamic access policies (DAP) 32-30
Dynamic Access Policy page
Add/Edit Dynamic Access Policy dialog box
Add/Edit DAP Entry dialog box 32-21
Add/Edit DAP Entry dialog box > AAA Attributes Cisco 32-22
Add/Edit DAP Entry dialog box > AAA Attributes LDAP 32-24
Add/Edit DAP Entry dialog box > AAA Attributes RADIUS 32-25
Add/Edit DAP Entry dialog box > Anti-Spyware 32-26
Add/Edit DAP Entry dialog box > Anti-Virus 32-27
Add/Edit DAP Entry dialog box > AnyConnect Identity 32-28
Add/Edit DAP Entry dialog box > Application 32-29
Add/Edit DAP Entry dialog box > File 32-31
Add/Edit DAP Entry dialog box > NAC 32-32
Add/Edit DAP Entry dialog box > Operating System 32-33
Add/Edit DAP Entry dialog box > Personal Firewall 32-34
Add/Edit DAP Entry dialog box > Policy 32-35
Add/Edit DAP Entry dialog box > Process 32-36
Add/Edit DAP Entry dialog box > Registry 32-37
Advanced Expressions tab 32-44
Logical Operations tab 32-42
Main tab 32-14
Dynamic Access Policy page (ASA) 32-11
Cisco Secure Desktop Manager Policy Editor dialog box 32-46
Dynamic Access policy page (ASA) > Add/Edit Dynamic Access Policy dialog box 32-12
Dynamic Blacklist Configuration tab 19-10
dynamic crypto maps 26-19
dynamic filter snooping (DNS)
enabling 17-19
Dynamic Multipoint VPN (DMVPN)
mandatory and optional policies 25-6
dynamic NAT
Cisco IOS routers 24-10
Dynamic Translation Rule
PIX/ASA/FWSM 24-23
add/edit 24-23
dynamic VTI
configuring in Easy VPN 28-12
in remote access VPNs 33-7
understanding use in Easy VPN 28-3
E
Easy VPN
configuration modes 28-3
configuration overview 28-5
configuring client connection characteristics 28-7
configuring dial backup 28-2
configuring dynamic VTI 28-12
configuring high availability 28-2
connection profile policies 28-13
connection profiles (ASA, PIX 7+) 31-8
extended authentication (xauth) 28-4
important configuration notes 28-6
IPsec proposals 28-10
mandatory and optional policies 25-6
overview 28-1
supported platforms 25-9
understanding 28-1
understanding dynamic VTI 28-3
user group policies 28-14
ECMP 22-4
Edit AAA Option dialog box 15-19
Edit AAA Rule dialog box 15-13
Edit AAA Server dialog box 6-33
Edit AAA Server Group dialog box 6-49
Edit Access Rule dialog box 16-14
Edit Actions dialog box 39-12
Edit activity state 4-4
Edit AOL Class Map dialog box 17-28, 21-19
Edit A Port Forwarding Entry dialog box 34-41
Edit ASA Group Policies dialog box
client configuration settings 34-6
client firewall attributes 34-7
connection settings 34-33
DNS/WINS settings 34-29, 34-30
hardware client attributes 34-9
IPSec settings 34-10
overview 34-1
split tunneling settings 34-31
SSL VPN clientless settings 34-12
SSL VPN full client settings 34-19
SSL VPN settings 34-25
technology settings 34-1
Edit A Smart Tunnel Entry dialog box 34-67, 34-70
Edit AS Path Entry dialog box 56-155
Edit AS Path Object dialog box 56-154
Edit Auto Signon Rules dialog box 34-27
Edit Auto Update Settings dialog box 11-54
Edit Category dialog box 12-14
Edit Cisco Secure Desktop Configuration dialog box 34-35
Edit Client Access Rules dialog box 34-12
Edit Client Update dialog box 34-81
Edit Column dialog box 34-61
Edit Community List Entry dialog box 56-157, 56-158
Edit Community List Object dialog box 56-156
Edit Custom Pane dialog box 34-62
Edit DCE/RPC Map dialog box 17-29
Edit Deploy Method dialog box 8-30
Edit Description dialog box 12-14
Edit Destinations dialog box 12-11
Edit Device Groups command 1-31
Edit Device Groups dialog box 3-61
Edit DNS Class Map dialog box 17-28
Edit DNS Map dialog box
Filtering tab 17-34, 17-35
overview 17-32
Protocol Conformance tab 17-33
Edit eDonkey Class Map dialog box 17-28, 21-19
Edit Endpoints dialog box
FWSM tab 25-47
overview 25-34
Protected Networks tab 25-46
VPN Interface tab 25-36, 25-50
VPNSM/VPN SPA/VSPA settings, VPN Interface tab 25-42
VRF Aware IPsec tab 25-48
Edit ESMTP Map dialog box 17-39
Edit Extended Access Control Entry dialog box 6-61
Edit Extended Access List dialog box 6-59
Edit External Filter dialog box 21-41
Edit Extranet VPN dialog box
overview 25-66
Edit FastTrack Class Map dialog box 17-28, 21-19
Edit Fidelity dialog box 39-13
Edit File Object dialog box 34-37
Edit FlexConfig dialog box 7-30
Edit FTP Class Map dialog box 17-28
Edit FTP Map dialog box 17-42
Edit Gnutella Class Map dialog box 17-28, 21-19
Edit Group Member dialog box 29-21
Edit GTP Map dialog box 17-45
Edit H.323 Class Map dialog box 17-28, 21-19
Edit H.323 Map dialog box 17-51, 21-34
Edit HSI Endpoint IP Address dialog box 17-54
Edit HSI Group dialog box 17-53
Edit HTTP Class Map dialog box 17-28, 21-19
Edit HTTP Map dialog box 21-34
ASA 7.1.x, PIX 7.1.x, FWSM 3.x, IOS devices
Entity Length tab 17-58
Extension Request Method tab 17-61
General tab 17-57
overview 17-56
Port Misuse tab 17-62
RFC Request Method tab 17-60
Transfer Encoding tab 17-63
ASA 7.2+ and PIX 7.2+ devices 17-64
Edit ICQ Class Map dialog box 17-28, 21-19
Edit IKEv1 Proposal dialog box 26-10
Edit IKEv2 Proposal dialog box 26-14
Edit IMAP Class Map dialog box 17-28, 21-19
Edit IMAP Map dialog box 21-34
Edit IM Class Map dialog box 17-28
Edit IM Map dialog box 21-34
ASA and PIX device 17-70
IOS device 17-73
Edit Inspect/Application FW Rule wizard
Address and Port page 17-13
Inspected Protocol page 17-17
Match Traffic page 17-11
Edit Inspect Parameter Map dialog box 21-31
Edit Interfaces dialog box 12-13
Edit IP Options Map dialog box 17-75
Edit IPsec Pass Through Map dialog box 17-80
Edit IPSec Transform Set dialog box 26-27
Edit IPv4 Pool Object dialog box 6-92
Edit IPv6 Map dialog box 17-77, 17-91
Edit IPv6 Pool Object dialog box 6-93
Edit Kazaa2 Class Map dialog box 17-28, 21-19
Edit Key Server dialog box 29-19
Edit Language dialog box 34-56
Edit LDAP Attribute Map dialog box 6-46
Edit LDAP Attribute Map Value dialog box 6-47
Edit Load Balancing Parameters dialog box 27-17
Edit Local Web Filter Class Map dialog box 17-28, 21-19
Edit Local Web Filter Parameter Map dialog box 21-38
Edit MAC Address Pool Object dialog box 6-94
Edit Map Value dialog box 6-47
Edit Match Condition and Action dialog box
DNS policy maps 17-36
ESMTP policy maps 17-40
FTP policy maps 17-43
GTP policy maps 17-49
H.323 (IOS) policy maps 21-35
H.323 policy maps 17-54
HTTP (Zone Based IOS) policy maps 21-35
HTTP policy maps 17-66
IM (Zone Based IOS) policy maps 21-35
IMAP policy maps 21-35
IM policy maps 17-71
IPv6 policy maps 17-78, 17-92
P2P policy maps 21-35
POP3 policy maps 21-35
SIP (IOS) policy maps 21-35
SIP policy maps 17-85, 17-95
Skinny policy maps 17-89
SMTP policy maps 21-35
Sun RPC policy maps 21-35
Web Filter policy maps 21-35
Edit Match Criterion dialog box
AOL class maps 21-21
DNS class maps 17-36
eDonkey class maps 21-21
FastTrack class maps 21-21
FTP class maps 17-43
Gnutella class maps 21-21
H.323 (IOS) class maps 21-22
H.323 class maps 17-54
HTTP (IOS) class maps 21-22
HTTP class maps 17-66
ICQ class maps 21-21
IMAP class maps 21-25
IM class maps 17-71
Kazaa2 class maps 21-21
Local Web Filter class maps 21-29
MSN Messenger class maps 21-21
N2H2 class maps 21-30
POP3 class maps 21-25
SIP (IOS) class maps 21-25
SIP class maps 17-85, 17-95
SMTP class maps 21-27
Sun RPC class maps 21-29
Websense class maps 21-30
Windows Messenger class maps 21-21
Yahoo Messenger class maps 21-21
Edit menu
Configuration Manager 1-31
Edit MSN Messenger Class Map dialog box 17-28, 21-19
Edit N2H2 Parameter Map dialog box 21-39
Edit N2H2 Web Filter Class Map dialog box 17-28, 21-19
Edit NAT Rule dialog box
ASA 8.3+ 24-37
Edit NetBIOS Map dialog box 17-81
Edit Network/Host dialog box
General tab 6-83
NAT tab 24-43
Edit Options dialog box 16-17
Edit P2P Map dialog box 21-34
Edit Permit Response dialog box 17-48
Edit Per-Session NAT Rule dialog box 24-48
Edit PIX/ASA/FWSM Web Filter Rule dialog box 18-5
Edit PKI Enrollment dialog box
CA Information tab 26-60
Certificate Subject Name tab 26-66
Enrollment Parameters tab 26-63
overview 26-58
Trusted CA Hierarchy tab 26-67
Edit Policy Assignments command 1-32
Edit Policy List Object dialog box 56-146
Edit POP3 Class Map dialog box 17-28, 21-19
Edit Port Forwarding List dialog box 34-40
Edit Port List dialog box 6-102
Edit Prefix List Entry dialog box 56-151, 56-153
Edit Prefix List Object dialog box 56-149, 56-151
Edit Protocol Info Parameter Map dialog box 21-33
Edit Regular Expression dialog box 17-108
Edit Regular Expression Group dialog box 17-108
Edit Route Map Entry dialog box 56-140
Edit Route Map Object dialog box 56-139
Edit Row command 1-31
Edit Rule Section dialog box 12-22
Edit Security Association Dialog Box 25-58
Edit Selected Deployment Method dialog box 8-30
Edit Server dialog box
Protocol Info Parameter maps 21-34
Edit Server Group dialog box 15-19
Edit Service dialog box 6-103
Edit Services dialog box 12-13
Edit Signature dialog box 39-15
Edit Signature Parameter—Component List dialog box 39-29
Edit Signature Parameters dialog box 39-24
Edit Single Sign On Server dialog boxes 34-42
Edit SIP Class Map dialog box 17-28, 21-19
Edit SIP Map dialog box 17-83, 17-93, 17-102, 17-103, 21-34
Edit Skinny Map dialog boxes 17-87
Edit SLA Monitor dialog box 51-10
Edit Smart Tunnel Auto Signon Entry dialog box 34-72
Edit Smart Tunnel Auto Signon Lists dialog box 34-71
Edit Smart Tunnel Lists dialog box 34-66, 34-69
Edit SMTP Class Map dialog box 17-28, 21-19
Edit SMTP Map dialog box 21-34
Edit SNMP Map dialog box 17-90
Edit Sources dialog box 12-11
Edit SSL VPN Customization dialog box 34-51
Applications 34-60
Copyright Panel 34-58
Custom Panes 34-61
Full Customization 34-59
Home Page 34-62
Informational Panel 34-57
Language 34-54
Logon Form 34-56
Logout Page 34-63
Title Panel 34-53
Toolbar 34-59
Edit SSL VPN Gateway dialog box 34-64
Edit Standard Access Control Entry dialog box 6-64
Edit Standard Access List dialog box 6-59
Edit Sun RPC Class Map dialog box 17-28, 21-19
Edit Sun RPC Map dialog box 21-34
Edit TCP Map dialog box 58-22
Edit TCP Option Range Dialog Box 58-25
Edit Text Object dialog box 7-32
Edit Time Range dialog box 6-71
Edit Traffic Flow dialog box 58-18
Edit Translated Address dialog box 24-30
Edit Transparent EtherType dialog box 23-7
Edit Transparent Firewall Rule dialog box 23-5
Edit Transparent Mask dialog box 23-7
Edit Trend Content Filter Class Map dialog box 17-28, 21-19
Edit Trend Parameter Map dialog box 21-42
Edit Unified Access Control Entry dialog box 6-67
Edit Update Server Settings dialog box 11-52
Edit URL Domain Name dialog box 21-45
Edit URLF Glob Parameter Map dialog box 21-45
Edit URL Filter Parameter Map dialog box 21-43
Edit User Credentials dialog box 36-19
Edit User dialog box 12-12
Edit User Group dialog box
Advanced PIX 6.3 settings 34-82
Browser Proxy settings 34-87
Client (IOS) settings 34-78
Clientless settings 34-83
Client VPN Software Update (IOS) settings 34-81
DNS/WINS settings 34-77
General settings 34-75
IOS Xauth Options settings 34-80
overview 34-73
Split Tunneling settings (Easy VPN/remote access IPSec VPN) 34-77
SSL VPN Connection settings 34-88
SSL VPN Full Tunnel settings 34-84
SSL VPN Split Tunneling settings 34-86
Technology settings 34-73
Thin Client settings 34-84
Edit VDI Server dialog box 34-15
Edit Virtual Sensor dialog box 38-7, 38-8
Edit VPN dialog box
Device Selection tab 25-32
Edit Endpoints dialog box 25-34
Endpoints tab 25-34
High Availability tab 25-52
Name and Technology tab 25-30
overview 25-28
Edit Web Access Control Entry dialog box 6-65
Edit Web Filter Map dialog box 21-47
Edit Web Filter Options dialog box 18-9
Edit Web Filter Type dialog box 18-8
Edit Websense Parameter Map dialog box 21-39
Edit Websense Web Filter Class Map dialog box 17-28, 21-19
Edit Web Type Access List dialog box 6-59
Edit Windows Messenger Class Map dialog box 17-28, 21-19
Edit WINS Server dialog box 34-90
Edit WINS Server List dialog box 34-89
Edit Yahoo Messenger Class Map dialog box 17-28, 21-19
Edit Zones dialog box 12-13
eDonkey class map objects
creating 21-16
match criteria 21-21
EIGRP routing
defining interface properties 67-10
defining routes 67-9
EIGRP Routing Policy page 67-13
Interface dialog box 67-16
Interfaces tab 67-15
on Cisco IOS routers 67-8
PIX/ASA/FWSM
advanced settings 56-34
Filter Rule configuration 56-40
Filter Rules tab 56-39
Interface configuration 56-48
Interfaces tab 56-47
neighbor configuration 56-42
Neighbors tab 56-41
policy 56-32
redistribution configuration 56-44
Redistribution tab 56-42
Setup tab 56-36
Summary Address configuration 56-46
Summary Address tab 56-45
redistributing routes 67-12
Redistribution Mapping dialog box 67-18
Redistribution tab 67-17
Setup dialog box 67-14
Setup tab 67-13
e-mail
blocking spam using zone-based firewall rules 21-27
preventing DoS attacks 21-27
e-mail notifications
configuring SMTP server 1-27
PIX/ASA/FWSM
recipient set-up 54-8
syslog messages 54-8
embedded event manager
add/edit action configuration 54-7
add/edit applet 54-5
add/edit syslog configuration 54-7
ASA 54-3
Enable/disable NAT rules 24-35, 24-47
Enable PIM and IGMP
PIX/ASA/FWSM 55-1
Encapsulating Security Protocol (ESP) encryption algorithm 26-29
encoding rules
defining for SSL VPN (ASA) 31-55
encryption algorithms
3DES (Triple DES) 26-6
AES (Advanced Encryption Standard) 26-6
DES (Data Encryption Standard) 26-6
in IKE proposals 26-6
endpoints and protected networks
configuring dial backup 25-40
defining in GET VPN topologies 25-60
defining in VPN topologies 25-34
VPN Interface tab 25-36, 25-50
equal-cost multi-path 22-4
Error Writing to Server deployment errors 9-16
ESMTP
configuring for inspection rules 17-20
ESMTP policy map objects
creating 17-22
match conditions and actions 17-40
properties 17-39
EtherChannel
Create and Edit IDSM EtherChannel VLANs dialog boxes 68-49
defining IDSM VLANs 68-44
deleting IDSM VLANs 68-45
EtherChannels
ASA 46-9
edit assigned interface 46-12
LACP 46-12
load balancing 46-13
evaluation license
upgrading to permanent license 10-16
event
lists 54-9
add/edit 54-10
syslog class
add/edit 54-11
syslog message ID
add/edit 54-11
Event Action Filters page 40-7
Event Action Overrides page 40-13
event actions, IPS
configuring filter rules 40-4
configuring network information 40-17
configuring OS maps 40-21
configuring overrides 40-13
configuring settings 40-23
configuring target value ratings 40-17
example filter rule 69-67
filter rule attributes 40-9
filter rules policy 40-7
filter rules tips 40-6
overview 40-1
possible actions 40-2
process overview 40-1
Event Management page 11-27, 11-35
CPU Throttling Policy dialog box 11-33
event manager applet 54-3
Event Manager service
configuring 69-30
managing 69-30
monitoring event store disk space 69-35
monitoring status 69-31
selecting devices to monitor 69-34
starting and stopping 69-30
status icon colors 69-31
events
archiving (backing up) the event data store 69-36
configuring firewall devices (ASA, FWSM) 69-28
configuring IPS devices 69-29
copying 69-53
CS-MARS 72-48
looking up 72-43
looking up policies based on related events 72-47
Netflow support for policy lookup 72-49
viewing access rule events 72-44
viewing IPS signature events 72-46
ensuring time synchronization 69-27
Event Viewer
clearing filters 69-48
context menu 69-49
cross-launching from HPM 69-58
filtering by column 69-45
filtering by events 69-47
filtering overview 69-43
looking up 69-55
looking up policies based on related events 69-54
refreshing event table 69-44
selecting time range 69-43
text searches (quick filter) 69-47
using time slider with filtering 69-44
viewing access rule events 69-56
viewing IPS signature events 69-57
examining details 69-53
examples of analysis
mitigating botnet activity 69-65
monitoring and mitigating botnet activity 69-61
monitoring botnet activity using ASDM 69-64
monitoring botnet activity using Event Viewer 69-62
monitoring botnet activity using Report Manager 69-64
monitoring identity-aware firewall policies 13-27
monitoring TrustSec policies 14-17
overview 69-58
removing false positive IPS events 69-66
understanding botnet syslog events 69-61
user access to server blocked 69-59
performing operations on 69-49
properties 69-18
recovering the event data store 69-36
saving to a file 69-53
understanding Event Viewer access control 69-4
viewing 69-1
Event Viewer
archiving (backing up) the event data store 69-36
arranging views 69-38
ASA devices, configuring to provide events 69-28
columns 69-18
configuring color rules 69-40
configuring Event Manager service 69-30
copying events 69-53
creating custom views 69-41
cross-launching from HPM 69-58
deleting custom views 69-43
editing view name and description 69-41
ensuring time synchronization 69-27
Event Monitoring window 69-14
events
context menu 69-49
historical and real-time lookup 69-55
looking up 69-55
event table
customizing appearance 69-39
event details pane 69-26
refreshing 69-44
time slider 69-25
toolbar 69-16
examining event details 69-53
examples of analysis
mitigating botnet activity 69-65
monitoring and mitigating botnet activity 69-61
monitoring botnet activity 69-62
monitoring identity-aware firewall policies 13-27
monitoring TrustSec policies 14-17
overview 69-58
removing false positive IPS events 69-66
understanding botnet syslog events 69-61
user access to server blocked 69-59
features
historical views 69-2
overview 69-1
policy navigation 69-3
real-time views 69-2
views and filters 69-3
File menu reference 69-9
filters
advantages of using network/host objects 69-67
clearing 69-48
column based 69-45
event based 69-47
overview 69-43
submission requirements for policy objects 69-68
text searches (quick filter) 69-47
time range 69-43
time slider 69-44
floating views 69-38
FWSM devices, configuring to provide events 69-28
IPS devices, configuring to provide events 69-29
limits of 69-4
looking up Security Manager policies based on events 69-54
managing service 69-30
monitoring event store disk space 69-35
monitoring status 69-31
opening views 69-38
overview 69-7
performing operations on 69-49
preparation for use 69-27
recovering the event data store 69-36
saving events 69-53
saving views 69-42
selecting devices to monitor 69-34
settings 11-27, 11-35
starting or stopping the Event Manager service 69-30
status icon colors 69-31
switching between IP addresses and host object names 69-39
switching between real-time and historical views 69-42
syslogs 69-6
troubleshooting
Event Viewer Unavailable message 11-27, 11-36, 69-30
policy objects not available for filtering 69-68
understanding access control 69-4
using 69-37
using views 69-37
viewing access rule events 69-56
viewing IPS signature events 69-57
view list 69-12
View menu reference 69-10
Event Viewer command 1-38
exclusive domains
configuring for IOS devices 18-10
Exit command 1-31
Exit command (Report Manager) 70-8
exiting
Cisco Security Management Suite server 1-12
CiscoWorks Common Services 1-12
Security Manager 1-11, 1-12
expiration dates
configuring for access rules 16-22
export
device inventory
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
HPM data 71-31
IPS event action overrides 40-13
IPS event filter rules 40-4, 40-7
policy objects 6-23
reports 70-28
shared policies 10-12
Export Devices or Policies commands 1-30
Export Inventory dialog box 10-6
Export Map command 1-33
External Product Interface dialog box 36-27
External Product Interface policy 36-26
F
factory-default configurations 46-2
failover
Active/Active
command replication 50-4
configuration synchronization 50-3
add new context to group 2 50-8
configuring in site-to-site VPN 25-52
edit bridge group 50-17
FWSM 50-13
advanced settings 50-16
PIX/ASA 50-17
Add Failover Group 50-25
settings 50-21
PIX/ASA/FWSM 50-10
active/active 50-2, 50-3
active/standby 50-2
bootstrap configuration 50-26
configuration basics 50-5
configuring 50-1
interface configuration 50-23
interface MAC address 50-23
security context 50-26
stateful 50-3, 50-4
stateless 50-3
types of 50-2
understanding 50-1
PIX 6.3 50-10
interface configuration 50-12
stateful in site-to-site VPN 25-54
false negatives
definition of 39-23
false positives
definition of 39-23
FastTrack class map objects
creating 21-16
match criteria 21-21
feature sets 1-4
File menu
Configuration Manager 1-30
Event Viewer 69-9
Report Manager 70-8
file objects
attributes 34-37
selecting 34-39
files
deploying to 8-11
selecting or specifying 1-50
Filter Item dialog box 40-9
filter rules, event action (IPS)
attributes 40-9
configuring 40-4
example rule 69-67
exporting 40-4
policy 40-7
tips 40-6
filters
Event Viewer
clearing 69-48
column based 69-45
context menu 69-49
event based 69-47
overview 69-43
refreshing event list 69-44
selecting time range 69-43
text searches (quick filter) 69-47
using time slider 69-44
filtering selectors 1-45
filtering tables 1-48
HPM
column based 71-17
custom 71-18
filters (Event Viewer)
advantages of using network/host objects 69-67
overview 69-3
submission requirements for policy objects 69-68
Find and Replace dialog box 12-17
find and replace in rules policies 12-16
Find Map Node command 1-33
Find Node dialog box 35-12
FirePOWER
ASA module
detecting 72-21
FireSIGHT Management Center
starting from Security Manager 72-20
FireSIGHT Management Center command 1-37
Firewall
AAA IOS Timeout Values 15-30
firewall
AAA firewall
advanced settings 15-20
configuring 15-6
MAC exempt lists 15-26
AAA firewall policy
advanced settings 15-20
configuring 15-6
AAA page 15-28
AAA rules
configuring AAA firewall settings 15-6
configuring AuthProxy settings 15-9
configuring cut-through proxy (ASA) 13-23
configuring for ASA/PIX/FWSM devices 15-4
configuring for IOS devices 15-7
configuring identity aware 13-21
configuring security group aware 14-17
managing 15-1
properties 15-13
understanding 15-1
understanding how users authenticate 15-2
Access Control page 16-24
access controls
per user downloadable ACLs 16-27
access control settings
configuring settings 16-23
access rule
event analysis example, user access blocked 69-59
finding from CS-MARS events 72-47
finding from Event Viewer events 69-54
viewing related CS-MARS events 72-44
viewing related events 69-56
access rules
address requirements 16-5
configuring 16-7
configuring expiration dates 16-22
configuring identity aware 13-21
configuring security group aware 14-17
how deployed 16-5
import examples 16-44
importing 16-40
IPS blocking, affect of 43-4
managing 16-1
optimizing during deployment 16-46
sharing ACLs among interfaces 11-18
understanding 16-1
understanding device-specific behavior 16-4
understanding global 16-3
understanding requirements when using inspection 17-4
ACL naming conventions 12-5
adding rules 12-9
analysis reports 16-34
AuthProxy
configuring 15-9
AuthProxy settings policy
configuring 15-9
botnet traffic filter rules 19-9
combining rules
example 12-27
interpreting results 12-25
procedure 12-22
configuring policies in Map view 35-23
configuring settings 18-15
configuring settings policies in Map view 35-23
conflict detection 16-28
converting IPv4 rules 12-28
deleting rules 12-9
device types 46-1
disabling rules 12-20
editing rules 12-10
enabling rules 12-20
finding and replacing items in rules policies 12-16
Firewall ACL Setting dialog box 16-26
identity-aware policies
collecting user statistics 13-25
configuring 13-7
configuring cut-through proxy 13-23
configuring identity options 13-15
configuring rules 13-21
configuring the ASA 13-7, 14-8
enabling 13-8
filtering VPN traffic 13-26
identifying AD servers and agents 11-38, 13-8
managing 13-1
monitoring 13-27
overview 13-1
requirements 13-3
user identity acquisition 13-2
Inspection page 17-111
inspection rules
add/edit rule wizard 17-11, 17-13, 17-17
choosing interfaces 17-2
configuring 17-5
configuring identity aware 13-21
configuring security group aware 14-17
managing 17-1
preventing DoS attacks on IOS devices 17-5
selecting protocols 17-3, 17-17
understanding 17-2
understanding access rule requirements 17-4
inspection settings
configuring for IOS devices 17-111
introduction 12-1
IPv6 access rules
configuring expiration dates 16-22
sharing ACLs among interfaces 11-18
understanding global 16-3
MAC exempt lists, AAA firewall 15-26
managing rules tables 12-7
moving rules 12-19
object groups
expanding during discovery 12-35
optimizing network object groups during deployment 12-35
overview 12-1
per user downloadable ACLs 16-27
policy discovery 5-13
policy query
example report 12-34
generating reports 12-28
interpreting results 12-32
preserving ACL names 12-4
reference information for AAA rules 15-20
resolving access rule conflicts 16-34
resolving ACL naming conflicts 12-7
rule table sections 12-20
security group aware policies
configuring ISE settings 11-56
configuring rules 14-17
security group-aware policies
configuring 14-7
managing 14-1
system variables 7-9
transparent rules
adding or editing a rule 23-5
configuring 23-1
configuring passthrough for IOS devices 23-3
editing the EtherType 23-7
editing the mask 23-7
managing 23-1
Transparent Rules page 23-3
TrustSec firewall policies
configuring 14-7
managing 14-1
overview 14-1
TrustSec policies
monitoring 14-17
understanding NAT effects 12-3
understanding rule order 12-19
understanding rule processing order 12-2
using rules tables 12-8
Web Filter page 18-16
web filter rules
configuring for ASA, PIX, FWSM devices 18-2
configuring for IOS devices 18-10
managing 18-1
understanding 18-1
zone-based firewall
add/edit zones 21-53
advanced options 21-67
configuring PAM 21-69
configuring rules 21-13, 21-62
configuring settings 21-49
Content Filter tab 21-52
designing network zones 21-1
development overview 21-12
Global Parameters tab 21-50
page 21-50
protocol selection 21-68
rules table 21-58
tabs 21-49
VPN tab 21-50
WAAS tab 21-50
Zones tab 21-50
zone-based firewalls
changing the default drop rule 21-48
general recommendations 21-12
IPSec VPN 21-6
logging 21-1
overview 21-1
restrictions 21-3
Self zone 21-5
troubleshooting 21-54
understanding 21-3
understanding permit/deny and action 21-8
understanding services and protocols 21-11
VRF 21-7
Firewall AAA IOS Timeout Value Setting dialog box 15-30
Firewall AAA MAC Exempt Setting dialog box 15-27
Firewall ACL Setting dialog box 16-26
Firewall Device dialog box 43-14
Firewall Services Module
see FWSM 47-1
Fit to Window command 1-33
FlexConfig objects
adding to policies 7-35
ASA samples 7-20
Catalyst 6500/7600 samples 7-22
changing order in policies 7-35
changing variable values 7-35
Cisco IOS Software samples 7-22
CLI commands 7-2
configuring 7-25
configuring AAA for administrative introducers 63-84
creating 7-28
creating text objects 7-32
deleting variables 7-28
PIX firewall samples 7-23
previewing CLI 7-35
properties 7-30
property selector 7-34
removing from policies 7-35
router samples 7-24
samples 7-19
scripting language
example of looping 7-3
example of looping with if/else statements 7-4
example of two-dimensional looping 7-4
understanding 7-3
system variables
device 7-7
firewalls 7-9
remote access VPN 7-19
router 7-13
understanding 7-7
VPN 7-14
undefined variables 7-33
understanding 7-2
variables 7-5
variables, example 7-6
FlexConfig policies
adding objects 7-35
changing object order 7-35
changing variable values 7-35
configuring 7-25
configuring AAA for administrative introducers 63-84
editing 7-35
previewing CLI 7-35
removing objects 7-35
understanding 7-2
FlexConfig Policy page 7-36
FlexConfig Preview dialog box 7-38
FlexConfigs
creating (scenario) 7-25
managing 7-1
troubleshooting 7-38
FlexConfig Undefined Variables dialog box 7-33
float
report windows 70-30
view windows 69-38
floodguard 57-2
FQDN objects
creating 6-82
understanding 6-80
fragmentation
configuring settings in VPNs 26-31, 26-44
fragments settings 57-2
frequently asked questions
policy discovery 5-27
FTP class map objects
creating 17-22
match criteria 17-43
FTP policy map objects
creating 17-22
match conditions and actions 17-43
properties 17-42
full mesh topologies
description 25-4
partial mesh 25-5
full tunnel client access mode 30-5
FWSM
AAA support 6-28
about 46-1
adding SSL thumbprints manually 9-5
adding when using multiple-context mode 3-7
adding when using non-default HTTPS (SSL) port 3-7
Asymmetric Routing Groups 46-6
Bridge Groups
add/edit 46-62
bridge groups 47-3
changing deployment method to serial for multiple-context mode 9-17
configuring for event management 69-28
configuring FWSM endpoints in site-to-site VPNs 25-47
configuring transparent firewall rules 23-1
credentials 3-19
deleting security contexts 59-7
deployment failures after changing interface policies 9-16
deployment failures in multiple-context mode 9-16
deployment failures with large ACLs 9-17
Device Access
managing Resources 51-2
Resources 51-3
Resources, add/edit 51-4
discovering failover modules 3-7
Event Viewer support 69-4
Failover 50-13
advanced settings 50-16
edit bridge group 50-17
including in deployment jobs 8-28
interfaces
add/edit 46-31
configuring 46-3
General tab 46-33
IPv6 46-47, 46-73
IPv6, add/edit 46-52
IPv6, add/edit prefixes 46-54, 46-56
managing 46-26
packet capture, using 72-31
PDM 72-15
policy discovery 5-13
rollback, commands to recover from failover misconfiguration 8-68
rollback command conflicts 8-67
rollback restrictions for failover devices 8-65
rollback restrictions for multiple context mode 8-64
security contexts
configuration 59-8
selecting policy types to manage 5-11
setting up SSL (HTTPS) 2-3
SSL certificate configuration 11-22
TCP State Bypass 58-3
troubleshooting deployment 9-16
G
General
PIX/ASA/FWSM
security policies 57-1
General Configuration tab, SNMP policy for IPS 36-10
General page, device properties 3-41
General tab, IPS blocking policy 43-10
General tab (Translation Rules)
PIX/ASA/FWSM 24-32
generic routers 3-8
GET VPN
anti-replay, time based 29-11
configuring 29-12
configuring global ISAKMP and IPsec settings 29-16
configuring group members 29-20
cooperative key servers 29-7
defining group encryption 25-54
generating, synchronizing RSA keys 29-13
group members
adding 29-19
editing 29-21
IKE proposal 29-15
key servers
adding 29-19
editing 29-19
mandatory and optional policies 25-6
migrating to 29-23
overview 29-1
receive-only SAs 29-23
registration
choosing the rekey transport mechanism 29-6
configuring fail-close mode 29-8
registration process 29-4
SAs
passive SA mode 29-23
receive-only mode 29-23
security policy 29-10
supported platforms 25-9
troubleshooting 29-25
understanding 29-2
GET VPNs
group encryption policies
certificate authorization 25-58
security associations 25-58
global correlation
configuring 42-1
configuring DNS servers 36-24
configuring HTTP proxy server 36-24
configuring inspection and reputation 42-5
configuring network participation 42-7
configuring with Botnet Traffic Filtering 42-1
data collected 42-3
requirements and limitations 42-4
understanding 42-1
understanding network participation 42-3
understanding reputation 42-2
Global Search
using 1-42
Global Search command 1-31
global settings
remote access VPN
configuring 26-30
Gnutella class map objects
creating 21-16
match criteria 21-21
GRE (generic routing encapsulation) VPN
advantages of IPsec tunneling with GRE 27-3
configuring 27-5
configuring GRE modes 27-6
dynamically addressed spokes 27-5
implementation 27-3
overview 27-1, 27-2
prerequisites for successful configuration 27-3
supported platforms 25-9
understanding 27-2
GRE Dynamic IP
mandatory and optional policies 25-6
GRE Modes Page
DMVPN properties 27-12
GRE or GRE Dynamic IP properties 27-6
overview 27-1
Group Domain of Interpretation (GDOI) protocol 29-3
group encryption
defining in GET VPN topologies 25-54
Group Encryption Policy page (GET VPN) 25-54
group members
adding 29-19
communication flow 29-2
configuring fail-close mode 29-8
editing 29-21
GET VPN
registration process 29-4
security policy ACLs 29-10
group members (GET VPN)
configuring 29-20
Group Members page (GET VPN) 29-20
group policies
configuring 31-26
creating 31-28
understanding 31-27
VPNs
configuring bookmarks 31-83
configuring portal appearance 31-78
configuring WINS servers for file system access 31-88
customizing 31-77
post URL method and macro substitutions in bookmarks 31-84
smart tunnels 31-85
Group Policies page 31-26
groups
adding or removing devices 3-63
creating 3-62
deleting 3-63
understanding 3-60
working with 3-59
group types
creating 3-62
deleting 3-63
GTP map objects
Add Country Network Codes dialog box 17-48
Edit Country Network Codes dialog box 17-48
GTP Map Timeouts dialog box 17-48
GTP policy map objects
creating 17-22
match conditions and actions 17-49
properties 17-45
H
H.323 class map objects
IOS
creating 21-16
match criteria 21-22
match criteria 17-54
H.323 policy map objects
ASA/PIX/FWSM
creating 17-22
properties 17-51
IOS
creating 21-16
match conditions and actions 21-35
match conditions and actions 17-54
hash algorithms
in IKE proposals 26-6
MD5 26-7
SHA 26-6
Health & Performance Monitor command 1-38
Health and Performance Monitor
see HPM 71-1
viewing related events in Event Viewer 69-58
Health and Performance Monitor in Dashboard 72-2
help
accessing 1-52
Help About This Page command 1-38
helper addresses 62-14
Help menu
Configuration Manager 1-38
Help Topics command 1-38
Hide Navigation Window command 1-33
high availability (HA groups)
configuring in Easy VPN 28-2
configuring in site-to-site VPN 25-52
stateful/stateless failover 25-54
high availability policies
configuring in remote access VPNs 33-11
Histogram dialog box 41-13
histograms
configuring anomaly detection 41-11
understanding anomaly detection 41-9
Hit Count Details
example 16-38
Hit Count Details page 16-36
Hit Count Selection Summary Dialog Box 16-20
Hostname
PIX/ASA/FWSM 51-1
hostnames
Cisco IOS routers
defining 63-77
Hostname Policy page 63-78
overview 63-77
HPM
access control 71-3
Alerts
firewall 71-37
IPS 71-35
VPN 71-39
VPN, SNMP configuration 71-40
alerts 71-32
acknowledging 71-42
clearing 71-42
configuring 71-34
history 71-43
viewing 71-41
application window 71-6
Alerts display 71-32
Monitoring display 71-25
columns
Alert table 71-16
Device-related 71-8
showing/hiding 71-8
sorting 71-8
VPN-related 71-13
configuring for 71-4
custom views 71-24
device
monitoring 71-21
monitoring multiple contexts 71-3
priority monitoring 71-32
views 71-21
Device Manager
launching 71-3, 71-27
device manager
cross-launch 71-32
devices
managing 71-5
email notifications
configuring 71-34
export data 71-31
filters
column based 71-17
introduction 71-1
launching 71-4
List Filter 71-19
monitoring
device details 71-28
device status list 71-27
RA and S2S views 71-30
Summary 71-27
VPN details 71-28
VPN Summary list 71-27
overview 71-1
read time-out 2-3, 71-4
Remote Access
log-off user 71-30
settings page 11-36
tables
showing/hiding columns 71-8
sorting columns 71-8
trending 71-2
viewing related events in Event Viewer 69-58
views
closing 71-23
custom 71-24
docking 71-24
floating 71-24
list 71-21
opening 71-23
tiling 71-23
HTML file
export HPM data as 71-31
HTTP
Cisco IOS routers
AAA tab 63-32
Command Authorization Override dialog box 63-34
defining policies 63-29
HTTP Policy page 63-31
overview 63-28
Setup tab 63-31
PIX/ASA/FWSM 49-2
configuration 49-3
HTTP (ASA, PIX) class map objects
creating 17-22
HTTP (ASA7.1.x/PIX7.1.x/FWSM3.x/IOS) policy map objects
creating 17-22
properties 17-56
HTTP (ASA7.2+/PIX7.2+) policy map objects
creating 17-22
properties 17-64
HTTP (IOS) class map objects
creating 21-16
creating for zone-based firewall content filtering 21-36
match criteria 21-22
HTTP (Zone Based IOS) policy map objects
creating 21-16, 21-36
match conditions and actions 21-35
HTTP class map objects
match criteria 17-66
HTTP-FORM
settings in AAA server objects 6-44
HTTP policy
overriding HTTPS port number 3-47
sharing
HTTPS port number 3-47
HTTP policy map objects
match conditions and actions 17-66
HTTP proxy server
configuring for IPS global correlation 36-24
HTTP Response Code 500 deployment errors 9-16
HTTPS
setting up 2-3
troubleshooting certificate errors 9-5
hub-and-spoke topology
description 25-2
joined hub-and-spoke topology 25-5
tiered hub-and-spoke topologies 25-5
I
ICMP rules
PIX/ASA/FWSM 49-4
add/edit 49-5
ICMP settings
configuring on IOS routers 62-18
icons
Configuration Manager toolbar reference 1-39
event table toolbar reference 69-16
Event Viewer status color code 69-31
map elements 35-14
ICQ class map objects
creating 21-16
match criteria 21-21
identity-aware firewall policies
collecting user statistics 13-25
configuring 13-7
configuring cut-through proxy 13-23
configuring identity options 13-15
configuring layer 2 SGT imposition 46-44
configuring rules 13-21
configuring security group tagging 46-44
configuring the ASA 13-7, 14-8
enabling 13-8
filtering VPN traffic 13-26
identifying AD servers and agents 11-38, 13-8
managing 13-1
monitoring 13-27
overview 13-1
requirements 13-3
user identity acquisition 13-2
Identity Configuration wizard
Active Directory Agent Settings 13-13
Active Directory Settings 13-11
Preview 13-15
Identity Settings page 11-38
identity user group objects
creating 13-19
selecting 13-21
user identity acquisition 13-2
idle timeout, Security Manager client 11-10
IDM
device manager 72-15
IDSM
adding when using non-default HTTPS (SSL) port 3-7
Create and Edit IDSM Data Port VLANs dialog boxes 68-49
Create and Edit IDSM EtherChannel VLANs dialog boxes 68-49
credentials 3-19
defining Data Port VLANs 68-46
defining EtherChannel VLANs 68-44
deleting Data Port VLANs 68-47
deleting EtherChannel VLANs 68-45
deployment failures when changing data port VLAN running mode 9-17
IDSM Settings page 68-47
IDSM Slot-Port Selector dialog box 68-50
mode support limitations 68-43
troubleshooting deployment 9-16
understanding settings on Catalyst devices 68-43
IE 10 security settings 10-2
IGMP
PIX/ASA/FWSM
Access Group parameters 55-5
Access Group tab 55-5
enable 55-1
Join Group parameters 55-7
Join Group tab 55-7
page 55-2
parameters 55-4
Protocol tab 55-3
Static Group parameters 55-6
Static Group tab 55-6
ignore error message, configure Security Manager to 9-10
IKE (Internet Key Exchange)
comparing version 1 and 2 26-4
configuring IKE and IPsec policies 26-1
configuring IKEv2 authentication 26-68
configuring proposal 26-9
Diffie-Hellman modulus groups 26-7
encryption algorithms 26-6
hash algorithms 26-6
IKEv2 Authentication policy 26-70, 26-72
overview 26-2
selecting the IKE version for devices in site to site VPNs 26-26
understanding 26-5
IKE keepalive
understanding 26-33
IKE proposal objects
v1 properties 26-10
v2 properties 26-14
IKE proposals (policies)
in GET VPNs 29-15
IKEv2 Authentication dialog box 26-72
IKEv2 Authentication page 26-70
IKEv2 settings
configuring 26-37
configuring cookie challenges 26-37
IM (ASA7.2+/PIX7.2+) policy map objects
creating 17-22
properties 17-70
IM (IOS) policy map objects
creating 17-22
properties 17-73
IM (Zone Based IOS) policy map objects
creating 21-16
match conditions and actions 21-35
IM (Zone based IOS) policy map objects
creating 21-16
Image Management 73-1
supported versions 73-2
Image Manager 73-9, 73-16
abort installation job 73-35
Add Image 73-11
Bootstrapping Devices 73-8
bundled images 73-30
bundles 73-13
create 73-13
delete 73-15
rename 73-15
view images 73-14
compatible images 73-17
configuring install location 73-19
device memory 73-18
devices 73-16
Getting Started 73-1
Installation Job Summary 73-33
installation wizard 73-26
installing compatible images on devices 73-30
installing images on selected devices 73-31
job approval workflow 73-36
jobs 73-32
RAM 73-17
Repository 73-9
retry on installation failure 73-35
roll back 73-35
settings 11-41
supported image types 73-5
supported platforms 73-2
Troubleshooting 73-37
update validation 73-23
updating images on devices 73-20
Using 73-1
Admin Settings 73-6
View All Images 73-10
view device information 73-16
view installation job details 73-34
Image Manager command 1-38
images
view 73-10
image updates 73-20
IMAP
configuring for inspection rules 17-21
IMAP class map objects
creating 21-16
match criteria 21-25
IM applications
match conditions for zone-based firewalls 21-21
protocol information for IM application inspection 21-33
IMAP policy map objects
creating 21-16
match conditions and actions 21-35
IM class map objects
creating 17-22
match criteria 17-71
IM policy map objects
match conditions and actions 17-71
import
device inventory 3-31
device with policies 10-13
policy objects 6-23
Import Background Image dialog box 35-13
Import Rules wizard
Enter Parameters page 16-41
Preview page 16-43
Status page 16-42
inheritance
inheriting rules 5-47
understanding 5-4
understanding signature policies 39-3
versus assignment 5-6
Inherit Rules command 1-32
Inherit Rules dialog box 5-47
Inspect/Application FW Rule wizard
Address and Port page 17-13
Inspected Protocol page 17-17
Match Traffic page 17-11
inspection
deny rules 17-5
global correlation (IPS)
configuring 42-5
inspection map objects
understanding 6-78
inspection rules
ACL naming conventions 12-5
add/edit rule wizard 17-11, 17-13, 17-17
choosing interfaces 17-2
configuring 17-5
configuring custom protocol name 17-22
configuring DNS settings 17-19
configuring ESMTP settings 17-20
configuring fragment inspection 17-20
configuring identity aware 13-21
configuring in Map view 35-23
configuring RPC settings 17-21
configuring security group aware 14-17
configuring settings for IOS devices 17-111
configuring settings in Map view 35-24
configuring SMTP settings 17-20
deep inspection options
IMAP 17-21
POP3 17-21
deleting 12-9
disabling 12-20
editing 12-10
enabling 12-20
Inspection Rules page 17-8
managing 17-1
moving 12-19
preserving ACL names 12-4
preventing DoS attacks on IOS devices 17-5
selecting protocols 17-3, 17-17
understanding 17-2
understanding access rule requirements 17-4
understanding NAT effects 12-3
understanding processing order 12-2
Inspection Rules page 17-8
Inspection settings page 17-111
inspect maps
policy maps
Add Country Network Codes dialog box 17-48
Edit Country Network Codes dialog box 17-48
Inspect parameter map objects
properties 21-31
Inspect Parameters map objects
creating 21-16, 21-36
installing
Security Manager client 1-12
Integrated Local Management Interface (ILMI) 62-50
Interactive Authentication Configuration dialog box 15-24
Interface Name Conflict dialog box 6-78
Interface Properties dialog box 35-19
Interface Role Contents dialog box 12-14
interface role objects
creating 6-74
defining subinterfaces 6-76
distinguishing from interfaces 6-76
handling conflicts between role and interface names 6-78
Interface Role dialog box 6-75
specifying during policy definition 6-76
understanding 6-73
use when a single interface name is allowed 6-77
interfaces
adding or changing modules 3-40
ASA
edit EtherChannel-assigned interface 46-12
EtherChannels 46-9, 46-13
LACP 46-12
ASA/FWSM
IPv6 46-47, 46-73
IPv6, add/edit 46-52
IPv6, add/edit prefixes 46-54, 46-56
ASA 5505 46-6
ASA devices
Advanced tab 46-41
IP Type 46-58
Catalyst switches and 7600 Series routers
Access Port Selector dialog box 68-30
Create and Edit Interface dialog boxes-Access Port mode 68-9
Create and Edit Interface dialog boxes-Dynamic Port mode 68-18
Create and Edit Interface dialog boxes-Other mode 68-24
Create and Edit Interface dialog boxes-Routed Port mode 68-12
Create and Edit Interface dialog boxes-subinterfaces 68-22
Create and Edit Interface dialog boxes-Trunk Port mode 68-14
Create and Edit VLAN dialog boxes 68-28
Create and Edit VLAN Group dialog boxes 68-34
defining ports 68-6
deleting ports 68-7
generating names 68-6
Interfaces/VLANs page-Interfaces tab 68-8
Interfaces/VLANs page-Summary tab 68-3
Interfaces/VLANs page-VLAN Groups tab 68-33
Interfaces/VLANs page-VLANs tab 68-27
Service Module Slot Selector dialog box 68-35
Trunk Port Selector dialog box 68-31
understanding 68-5
VLAN Selector dialog box 68-35
Cisco IOS routers
Advanced Interface Settings dialog box 62-16
Advanced Interface Settings page 62-16
available types 62-2
Create Router Interface dialog box 62-8
defining advanced settings 62-13
defining basic settings 62-4
defining CEF interface settings 62-25
defining IPS module settings 62-22
deleting from 62-6
generating names 62-4
Interface Auto Name Generator dialog box 62-12
overview 62-1
Router Interfaces page 62-7
understanding helper addresses 62-14
configuring IOS IPS rules 45-9
configuring multiple contexts 59-3
distinguishing from interface roles 6-76
failover
MAC address 50-23
PIX/ASA/FWSM 50-23
PIX 6.3 50-12
IPS
configuring 37-6
configuring bypass mode 37-12
configuring CDP mode 37-12
configuring inline interface pairs 37-13
configuring inline VLAN pairs 37-14
configuring physical 37-9
configuring VLAN groups 37-15
deploying VLAN groups 37-5
inline interface mode 37-3
inline VLAN pair mode 37-3
interfaces policy 37-6
managing interface configurations 37-1
physical interface properties 37-10
promiscuous mode 37-2
roles 37-1
sensing modes overview 37-2
understanding 37-1
viewing summary 37-8
VLAN group mode 37-4
IP Type
PIX 6.3 46-30
PIX/ASA
allocation in security contexts 59-12
IP Type 46-58
PPPoE Users 46-71
redundant 46-8
subinterfaces 46-7, 46-15
VPDN groups 46-72
PIX/ASA/FWSM
add/edit 46-31
Advanced settings 46-68
configuring 46-3
contexts 46-5
DDNS update rules 52-19
enabling traffic between same security levels 46-70
General tab 46-33
manage 46-26
management access 49-6
understanding 46-3
PIX/ASA 7+ devices
MAC address 46-60
PIX 6.3
add/edit 46-28
routed and transparent 46-5
specifying during policy definition 6-76
specifying subinterfaces 6-76
throughput delay 62-18
Interface Selector dialog box (VLAN ACL Content) 68-42
Interfaces page (IPS) 37-6
Interface Specific Authentication Server Groups dialog box 31-16
Interface Specific Client Address Pools dialog box 31-12
inventory
deleting devices from 3-58
export devices
DCR, CS-MARS, Security Manager formats 10-6
device with policies 10-6
overview 10-6
supported CSV formats 10-9
using command line utility 10-10
import devices
device with policies 10-13
inventory, device
adding devices 3-6
adding devices from configuration files 3-22
adding devices from inventory file 3-31
adding devices from network 3-12
adding devices manually 3-26
device status view
working with 3-64
managing 3-1
testing device connectivity 9-1
troubleshooting device discovery failures 3-7
understanding 3-1
understanding contents 3-3
understanding device clusters 3-9
understanding generic devices 3-8
viewing inventory status 72-12
working with 3-36
Inventory Status command 1-35
Inventory Status window 72-13
Inverse ARP 62-61
inverse multiplexing over ATM (IMA) 62-40
IOS devices
configuring transparent firewall rules 23-1
remote access IPSec VPNs
user group policies 33-13
remote access IPsec VPNs
creating using wizard 30-36
remote access SSL VPNs
configuring bookmarks 31-83
configuring WINS servers for file system access 31-88
creating using wizard 30-32
remote access VPNs
configuring SSL VPN policies 33-14
Context Editor dialog box (IOS) 33-15, 33-16
Dynamic VTI/VRF Aware IPsec settings 33-7
high availability 33-11
IPsec proposals 33-4
SDM 72-16
IOS IPS
affect of load balancing 45-8
comparing to IPS appliances and service modules 36-2
configuration files 45-3
configuration overview 45-4
configuring 45-1
configuring general settings 45-7
configuring interface rules 45-9
configuring target value ratings 40-17
event actions
filter rule attributes 40-9
filter rules 40-4, 40-7
filter rules tips 40-6
network information 40-17
overrides 40-13
overview 40-1
possible actions 40-2
process overview 40-1
settings 40-23
getting started 36-1
initial preparation of router 45-5
lightweight signature engines 45-2
limitations and restrictions 45-3
selecting signature category 45-6
signatures
adding custom 39-19
cloning 39-21
configuring 39-4
defining 39-1
detailed information 39-2
editing 39-14
editing Meta engine component list 39-29
editing or tuning parameters 39-23
enabling or disabling 39-14
engines 39-20
exporting 39-9
inheritance 39-3
parameters list 39-24
policy 39-4
shortcut menu 39-10
understanding 39-1
viewing update level 39-9, 39-13
understanding 45-1
understanding subsystems and revisions 45-2
IOS Software Release 12.1 and 12.2
managing routers 61-3
IOS Web Filter Exclusive Domain Name dialog box 18-14
IOS Web Filter Rule and Applet Scanner dialog box 18-13
IP address
supporting dynamic 3-36
IP addresses
network masks 6-81
specifying in policies 6-87
IP Intelligence
settings 11-41
IP Intelligence dialog box 72-36
IP Intelligence in Report Manager 72-37
IP Intelligence Settings in Dashboard 72-2
IP Intelligence using Quick Launch 72-36
IP Intelligence widget 72-37
IP Options policy map objects
creating 17-22
properties 17-75
IPS
IPS Module router interface settings policies 62-22
MPC rule wizard
tab 58-8
PIX/ASA/FWSM
identity-aware rules 13-21
rules 58-5
IPS alerts
properties 69-18
IPS Certificates dialog box 44-10
IPS command 1-34
IPS Devices
selecting for Event Viewer