- User Guide for Cisco Security Manager 4.8
- Table of Contents
- Preface
-
- The Basics of Using Security Manager
- Getting Started with Security Manager
- Preparing Devices for Management
- Managing the Device Inventory
- Managing Activities
- Managing Policies
- Managing Policy Objects
- Managing FlexConfigs
- Managing Deployment
- Troubleshooting Device Communication and Deployment
- Managing the Security Manager Server
- Configuring Security Manager Administrative Settings
-
- Firewall Services and NAT
- Introduction to Firewall Services
- Managing Identity-Aware Firewall Policies
- Managing TrustSec Firewall Policies
- Managing Firewall AAA Rules
- Managing Firewall Access Rules
- Managing Firewall Inspection Rules
- Managing Firewall Web Filter Rules
- Managing Firewall Botnet Traffic Filter Rules
- Working with ScanSafe Web Security
- Managing Zone-based Firewall Rules
- Managing Traffic Zones
- Managing Transparent Firewall Rules
- Configuring Network Address Translation
-
- VPN Configuration
- Managing Site-to-Site VPNs: The Basics
- Configuring IKE and IPsec Policies
- GRE and DM VPNs
- Easy VPN
- Group Encrypted Transport (GET) VPNs
- Managing Remote Access VPNs: The Basics
- Managing Remote Access VPNs on ASA and PIX 7.0+ Devices
- Managing Dynamic Access Policies for Remote Access VPNs (ASA 8.0+ Devices)
- Managing Remote Access VPNs on IOS and PIX 6.3 Devices
- Configuring Policy Objects for Remote Access VPNs
- Using Map View
-
- IPS Configuration
- Getting Started with IPS Configuration
- Managing IPS Device Interfaces
- Configuring Virtual Sensors
- Defining IPS Signatures
- Configuring Event Action Rules
- Managing IPS Anomaly Detection
- Configuring Global Correlation
- Configuring Attack Response Controller for Blocking and Rate Limiting
- Managing IPS Sensors
- Configuring IOS IPS Routers
-
- PIX/ASA/FWSM Device Configuration
- Managing Firewall Devices
- Configuring Bridging Policies on Firewall Devices
- Configuring Device Administration Policies on Firewall Devices
- Configuring Device Access Settings on Firewall Devices
- Configuring Failover
- Configuring Hostname, Resources, User Accounts, and SLAs
- Configuring Server Access Settings on Firewall Devices
- Configuring FXOS Server Access Settings on Firepower 2100 Series Devices
- Configuring Logging Policies on Firewall Devices
- Configuring Multicast Policies on Firewall Devices
- Configuring Routing Policies on Firewall Devices
- Configuring Security Policies on Firewall Devices
- Configuring Service Policy Rules on Firewall Devices
- Configuring Security Contexts on Firewall Devices
- User Preferences
- Index
Configuring FXOS Server Access Settings on Firepower 2100 Series Devices
The FXOS Server Access section contains pages for configuring FXOS server access on Firepower 2100 Series devices; FXOS Server Access is under Device Admin in the Device or Policy selector.
Note FXOS Server Access is not applicable for devices other than Firepower 2100 Series devices.
The Firepower 2100 Series devices supported by ASA and Cisco Security Manager are:
HTTPS Page
The HTTPS page allows you to configure the device to access the FXOS server through HTTPS. When you deploy configurations with this protocol, Cisco Security Manager encrypts the configuration file before sending it to the device.
- (Device view) Select Platform > Device Admin > FXOS Server Access > HTTPS from the Device Policy selector.
- (Policy view) Select PIX/ASA/FWSM Platform > Device Admin > FXOS Server Access > HTTPS from the Policy Type selector. Select an existing policy from the Shared Policy selector, or create a new one.
Add and Edit HTTPS Dialog Boxes
Use the Add HTTPS Configuration dialog box to create the HTTPS rules. The security appliance will automatically poll this server for image and configuration updates.
The Edit HTTPS Configuration dialog box is identical to the Add HTTPS Configuration dialog box. The following descriptions apply to both.
You can access the Add and Edit HTTPS Configuration dialog boxes from the HTTPS Page.
SSH Page
Use the Secure Shell page to configure port that permit FXOS server access to a Firepower 2100 Series device using the SSH protocol. The rules permit SSH access to a specific IP address and netmask.
- (Device view) Select Platform > Device Admin > FXOS Server Access > SSH from the Device Policy selector.
- (Policy view) Select PIX/ASA/FWSM Platform > Device Admin > FXOS Server Access > SSH from the Policy Type selector. Select an existing policy from the Shared Policy selector, or create a new one.
Add and Edit SSH Dialog Boxes
Use the Add SSH Configuration dialog box to create the SSH rules. The security appliance will automatically poll this server for image and configuration updates.
The Edit SSH Configuration dialog box is identical to the Add SSH Configuration dialog box. The following descriptions apply to both.
You can access the Add and Edit SSH Configuration dialog boxes from the SSH Page.
SNMP Page
SNMP is an application layer protocol that facilitates the exchange of management information between network devices. You can use the SNMP page to configure the Firepower 2100 Series devices for monitoring by SNMP.
- (Device view) Select Platform > Device Admin > FXOS Server Access > SNMP from the Device Policy selector.
- (Policy view) Select PIX/ASA/FWSM Platform > Device Admin > FXOS Server Access > SNMP from the Policy Type selector. Select an existing policy from the Shared Policy selector, or create a new one.
Add and Edit SNMP Dialog Boxes
Use the Add SNMP Configuration dialog box to create the SNMP rules. The security appliance will automatically poll this server for image and configuration updates.
The Edit SNMP Configuration dialog box is identical to the Add SNMP Configuration dialog box. The following descriptions apply to both.
You can access the Add and Edit SNMP Configuration dialog boxes from the SNMP Page.