|
|
Whenever you create or modify your network policy, you need to generate and publish the device-specific command sets for those changes to take effect on the Policy Enforcement Points.
Cisco Secure Policy Manager uses the policies applied to the objects in the Security Policy Enforcement branch in conjunction with the network topology and routing information contained in the Network Topology tree to generate the device-specific commands. Additionally, you can define additional commands to be published to the devices as prologue commands (which are sent to the device before the generated commands are sent) or epilogue commands (which are sent to the device after the generated commands are sent).
Upon installation of Cisco Secure Policy Manager, the default method of command set publication is set to "manual," which means that you need to approve each device's set of generated commands before publishing it to the device. You can change this default setting to automatically publish the command sets as they are generated. However, this option is not recommended for any but the most basic of network topologies. Refer to Learn More About Policy Distribution Points, for more information. You can also override the default command publication on a per-device basis.
The following checklist provides an overview of the command generation, verification, and publication process. Before you publish your command sets, you should become familiar with these steps and the various options for performing them.
Each step, described in the Step column, may contain several sub-steps and should be performed in the order presented. References to the specific procedures used to perform each step appear in the Reference column.
| Step | Reference | |
|---|---|---|
| 1. Understand Distribution Point and Publishing Order Restraints The selection of a Policy Distribution Point for a Policy Enforcement Point can be restricted by your network topology layout. Before you publish to your devices, you should verify that you have selected a valid Policy Distribution Point. In addition, the order in which you publish your command sets to the various Policy Enforcement Points on your network can affect your ability to successfully publish all generated command sets. Therefore, you must study the common scenarios that can disrupt command distribution to ensure that you publish your generated command sets in an order that does not disrupt the ability to publish to all your Policy Enforcement Points. | |
| 2. Set the Default Command Publication Method Depending on your network topology and the number of Policy Enforcement Points that you are managing with Cisco Secure Policy Manager, you must determine whether you can automatically publish the generated command sets or if you must publish the command sets manually. | "Specifying Policy Update Default" section "Specifying the Command Set Approval Method in the Command Console Panel" section (per device) |
| Within Cisco Secure Policy Manager, two settings are available for selecting the publishing method: a global default value that applies to all newly created Policy Enforcement Points, and a per-Policy Enforcement Point setting available in the Command panel. |
|
| 3. Generate Command Sets Before Cisco Secure Policy Manager actually begins managing a Policy Enforcement Point, you must use the Save and Update command on the File menu to generate the commands. Each time you perform a Save and Update operation, Cisco Secure Policy Manager generates new command sets for each Policy Enforcement Point defined in your Network Topology tree. The resulting command sets are presented in the Pending Commands field in the Command panel for each Policy Enforcement Point. | |
| 4. Verify Command Sets You can verify the command sets that will be sent to the Policy Enforcement Points before they are actually sent if you have not set Cisco Secure Policy Manager to automatically publish the command sets when you perform a Save and Update operation. The command sets will be located in the Pending Commands field in the Command Panel for each Policy Enforcement Point. | |
| 5. Add Custom Commands to the Command Sets Cisco Secure Policy Manager enables you to add custom commands on a per-device basis. The custom commands enable you to set features on the Policy Enforcement Point that are not controlled directly by Cisco Secure Policy Manager. Prologue commands are commands that are sent to the Policy Enforcement Point before the system-generated commands are sent. Epilogue commands are commands that are sent to the Policy Enforcement Point after the system-generated commands are sent. | |
| 6. Publish Command Sets If you have not set the commands to be published automatically by a Save and Update operation, you must manually approve and publish the command sets for each device. | |
| 7. Verify that the Command Sets were Published Successfully After you have approved your command sets and initiated the publishing process, you can verify that they were successfully published to the Policy Enforcement Point or detect when problems arise. The last step involved in publishing command sets is to determine that the command set that you wanted published to a Policy Enforcement Point is actively running on that gateway object. Cisco Secure Policy Manager provides status information during the publishing phase to assist you in making this determination. |
Within the Cisco Secure Policy Manager system, the Policy Distribution Point plays a critical role. This component performs the following tasks:
These command sets can be published securely using secure protocols, such as PIX Secure Telnet, or the Policy Distribution Point can use an IPSec tunnel to publish the command sets securely to the Policy Enforcement Points that it controls.
Because each type of Policy Enforcement Point has its own control agent within the Policy Distribution Point component, a Policy Distribution Point can control more than one Policy Enforcement Point type and multiple Policy Enforcement Points of a specific type. For example, a single Policy Distribution Point can control three IOS Routers and four PIX Firewalls if configured to do so. However, in scenarios where a Policy Distribution Point controls more than one Policy Enforcement Point, it is critical to consider the placement of the primary server or secondary server on which the Policy Distribution Point resides in relation to the Policy Enforcement Points that you want it to control. In addition, some Policy Enforcement Points have restrictions with respect to which interface(s) in the device can be used to configure them. In such cases, considering the limitations of the Policy Enforcement Point can also help you determine the correct placement of Policy Distribution Points on your network.
Because the Policy Distribution Point component is installed on all Cisco Secure Policy Manager hosts, you can always alter the way that you want to configure your distributed security system. Just as you can enable or disable a Policy Monitor Point for use as a valid option in configuring your security system, you can also enable or disable a Policy Distribution Point. Cisco Secure Policy Manager uses the selection of a Policy Distribution Point to ensure that the communication between a selected Policy Distribution Point and the Policy Enforcement Points that it controls are permitted. The security policies and IPSec Tunnel Groups that enable these communications are automatically generated and maintained by Cisco Secure Policy Manager.
You can resolve many issues that can affect your ability to deploy network security policies to Policy Enforcement Points by carefully planning the placement of Policy Distribution Points within your network. The benefits of careful planning and placement include the following:
Because you can have more than one Policy Distribution Point on your network, you must consider the selection of a Policy Distribution Point on a per-Policy Enforcement Point basis. The best way to make this selection is to understand the scenarios that can be problematic with regard to command distribution and to understand the effects of device-specific changes that you want to make after the initial deployment.
The first thing to determine when selecting a Policy Distribution Point is the traffic flows for the communications that occur between the Policy Distribution Point and all the Policy Enforcement Points that it controls. Next, you must consider the other Policy Distribution Points on your network and their required traffic flows. It is imperative that these traffic flows do not cross.
When such traffic flows cross, they can only cross at a gateway object, which is referred to as a concentrating gateway object for the remainder of this discussion. If that concentrating gateway object is a managed gateway object, it identifies a possible point of failure in the publishing of command sets, as the policies managing that gateway object can be altered as well. Since concentrating gateway objects represent points along the path between one or more Policy Enforcement Points and a Policy Distribution Point, these concentrating gateway objects can potentially be updated before the farther Policy Enforcement Points are provided with command sets that reflect the changes on the concentrating gateway object. This case is most likely to occur if you have enabled automatic publishing of the command sets by selecting Automatic under Command Approval in the Options dialog box (available on the Tools menu) or in the Command panel of a specific Policy Enforcement Point.
Figure 10-1 presents a simple topology that identifies crossing traffic flows from a single Policy Distribution Point.

In this example, the HQ Router acts as a concentrating gateway object when the Policy Distribution Point attempts to publish the generated command sets to the routers on Site A or Site B. Therefore, the only way to ensure that the traffic flows to the Site A and Site B routers are not broken is to publish to those outermost managed gateway objects before you publish to the HQ Router.
You can also have crossing traffic flows in topological scenarios that have multiple Policy Distribution Points, as illustrated in Figure 10-2.

In this case, the traffic flows that you must protect against being terminated are the traffic flows between the primary servers and the secondary servers of Cisco Secure Policy Manager. This problem only arises in scenarios where you have a distributed installation type for Cisco Secure Policy Manager.
A third, and unsupported, traffic flow crossing also involves a distributed installation scenario. In this case, two or more Policy Distribution Points publish to different Policy Enforcement Points, and one of the managed Policy Enforcement Points acts as the concentrating gateway object. Figure 10-3 illustrates this crossing traffic flow.

In such cases, Cisco Secure Policy Manager does not support the intelligent synchronization of command distribution across such concentrating gateway objects. In this configuration, PDPa is oblivious to the needs of PDPb during the time that PDPb is publishing the generated command set for Gw2. As a result, PDPa could publish command sets that disrupt or disable the ability for PDPb to publish command sets to Gw2.
You can construct network topologies for which you should not use automatic command distribution. The problem lies in the order that command sets are downloaded to various Policy Enforcement Points. The problem occurs when a Cisco Secure Policy Manager server attempts to publish command sets to an external Policy Enforcement Point from behind an internal Policy Enforcement Point that translates the server's real address. In some cases, the automatically downloaded command sets can fail and prevent the download of generated command sets to some Policy Enforcement Points in the topology.
Figure 10-4 assumes that you have a network topology in which you have defined three Cisco Secure PIX Firewalls (called Outside Gw, Middle Gw, and Inside Gw in this example) and that the Cisco Secure Policy Manager host (PDP) that distributes command sets to each of these Policy Enforcement Points resides upstream from Inside Gw. Now assume that you have defined a mapping rule on either Middle Gw or Inside Gw that performs a one-to-one static translation for the addresses of PDP.

![]() |
Warning You cannot define address hiding rules that hide Cisco Secure Policy Manager hosts from the Policy Enforcement Points that they are expected to manage. Defining such rules guarantees that the device-specific command sets cannot be published to the managed gateway objects for which Cisco Secure Policy Manager is responsible. |
In this case, if you distribute the commands to Inside Gw or Middle Gw before you distribute them to Outside Gw, Outside Gw becomes unreachable by PDP. Even though the command set generated for Outside Gw understands the static translation rule, the command set to be replaced does not. Therefore, Outside Gw does not know to allow administrative updates from the translated PDP address.
![]() |
Note The automatic command distribution to Outside Gw fails only when a change to the mapping rules occurs on Inside Gw or Middle Gw. In other words, it can occur when you add, delete, or modify an existing mapping rule for the Cisco Secure Policy Manager host, PDP. Once you use the manual distribution method to change the mapping rules, you can return to the automatic distribution method until a similar change occurs. |
In this example, if the address of the PDP is not translated on any Policy Enforcement Points or it is translated only on Outside Gw, automatic updates would work fine, because in that case order does not matter.
You can specify either a manual or automatic policy update default.
To specify manual or automatic policy update default, perform the following task:
Result: The Options dialog box appears.

Step 2 To select a policy update default, select one of the two options under Policy Update Options.
Step 3 To accept your changes and close the Options dialog box, click OK.
Step 4 To save any changes that you have made, click Save on the File menu.
From the Command panel, you can specify the method that you want to use for approving command sets generated by Cisco Secure Policy Manager. Approving the generated command sets is the step that precedes publishing the commands to their corresponding Policy Enforcement Points. This feature enables you to follow an administrative policy that matches the needs of your organization's security policy, as well as to select a method that ensures the publishing order is correct.
To specify an approval method for command sets generated by Cisco Secure Policy Manager, perform the following task:
Step 2 To view the Command panel, point to Properties, and click Command on the shortcut menu.
Result: The Command panel appears in the View pane.
Step 3 To specify which method to follow for approving commands that are generated for this Policy Enforcement Point, click that method under Command Approval.

Three approval methods exist:
Step 4 To accept your changes and close the selected panel, click OK.
Step 5 To save any changes that you have made, click Save on the File menu.
To generate the device-specific command sets that will be published to your Policy Enforcement Points, you must first perform a Save and Update operation on your work.
![]() |
Note If you are not ready to apply changes in network policy to your network and you only want to save the work in progress, use Save. |
![]() |
Caution You should enable Consistency Check prior to all Save and Update operations as a safeguard against applying inconsistent configurations that may lead to network security risks. |
To save current changes and update the active network policy, perform the following task:
Result: The System Inconsistencies panel appears in the View pane.

Step 2 To specify the occurrence of a Consistency Check, click an option under Automatic Checking in the System Inconsistencies panel.
You can select from three options for Automatic Checking.
Step 3 To confirm your selection for Automatic Checking, click OK on the System Inconsistencies panel.
If you selected Disabled, a dialog box displays a message informing you that this selection can possibly compromise system integrity and/or system security. Click Yes to confirm your selection.
Step 4 To save current changes and update network policy, click Save and Update on the File menu.
Current configurations in the GUI client are checked for errors in consistency. If errors are detected, the Save and Update operation will be aborted. If no errors are detected, current configurations will be saved to the Primary Policy Database and network policies will be updated and enforced across your network.
From the Command panel, you can review the command set that Cisco Secure Policy Manager generates for the selected Policy Enforcement Point. This feature enables you to review and modify the generated command set before it is published to the selected Policy Enforcement Point.
To review the generated command set for the selected Policy Enforcement Point, perform the following task:
Step 2 To view the Command panel, point to Properties, and click Command on the shortcut menu.
Result: The Command panel appears in the View pane.
Step 3 To review the Pending Commands command set, select that option under Command Review/Edit.

Result: The command set that Cisco Secure Policy Manager generated for the selected Policy Enforcement Point appears in the Commands/Messages box. Review these commands to ensure that they satisfy your organization's security policy. You can use the scroll bars to review the full set of commands.
![]() |
Tips To expand the Commands/Messages box when reviewing the generated command sets, click the << button at the bottom of the Command panel. To collapse the Command/Message box so that you can select a different command set, click the >> button at the bottom of the Command panel. |
Step 4 To review the Prologue command set, select that option under Command Review/Edit.

Result: The Prologue commands appear in the Commands/Message box.
Step 5 To review the Epilogue command set, select that option under Command Review/Edit.

Result: The Epilogue commands appear in the Commands/Message box.
Step 6 To close the selected panel, click OK.
From the Command panel, you can manually enter commands for a Policy Enforcement Point. These commands enable you to configure Policy Enforcement Point settings that are not controlled by Cisco Secure Policy Manager (Cisco Secure Policy Manager only controls security and security-related settings).
Prologue commands are commands that will be sent to the Policy Enforcement Point before the commands generated by Cisco Secure Policy Manager. Epilogue commands are commands that will be sent to the Policy Enforcement Point after the commands generated by Cisco Secure Policy Manager. You can specify one or both types of commands for each Policy Enforcement Point.
To enter prologue or epilogue commands for the selected Policy Enforcement Point, perform the following task:
Step 2 To view the Command panel, point to Properties and click Command on the shortcut menu.
Result: The Command panel appears in the View pane.
Step 3 To enter prologue commands, select Prologue under Command Review/Edit. To enter epilogue commands, select Epilogue under Command Review/Edit.
If you had previously specified prologue or epilogue commands for the selected Policy Enforcement Point, those commands appear in the Commands/Messages box. If you had not previously entered prologue or epilogue commands for the selected Policy Enforcement Point, the Commands/Messages box is blank.
Step 4 To enter the commands, type the commands in the Commands/Messages box in the same manner as you would at the command line of the Policy Enforcement Point (or in a text configuration file for the Policy Enforcement Point). For information about the commands available for the selected Policy Enforcement Point, refer to the manufacturer's documentation.
![]() |
Note When constructing prologue and epilogue command sets for IOS, you must make sure the command sets start and finish in the IOS config-mode. Additionally, the following types of commands should be followed by the exit command: crypto map crypto isakmp policy ip nat pool route-map |
Step 5 To accept your changes and close the selected panel, click OK.
Step 6 To save any changes that you have made, click Save on the File menu.
From the Command panel, you can manually approve the command set that Cisco Secure Policy Manager generates for the selected Policy Enforcement Point. This feature enables you to review and modify the generated command set before it is published to the selected Policy Enforcement Point. More importantly, it enables you to control the publishing order if you are managing more than one Policy Enforcement Point with Cisco Secure Policy Manager. This ability is important because it helps you ensure that commands published to one Policy Enforcement Point do not deny the requisite communications to other Policy Enforcement Points before you can approve and publish the command sets for those Policy Enforcement Points.
To manually approve the generated command set for the selected Policy Enforcement Point, perform the following task:
Step 2 To view the Command panel, point to Properties, and click Command on the shortcut menu.
Result: The Command panel appears in the View pane.
Step 3 To review the Pending Commands command set, verify that command set is selected under Command Review/Edit.
The command set that Cisco Secure Policy Manager generated for the selected Policy Enforcement Point appears in the Commands/Messages box. Review these commands to ensure that they satisfy your organization's security policy. You can use the scroll bars to review the full set of commands.
Step 4 To approve the selected command set after you review it, click Approve Now under Command Approval.

Result: The pending command set is immediately published to the selected Policy Enforcement Point. The Status box message changes to "Processing completed."
Step 5 To accept your changes and close the selected panel, click OK.
Step 6 To save any changes that you have made, click Save on the File menu.
To verify the publishing status of the generated command set for the selected Policy Enforcement Point, perform the following task:
Step 2 To view the Command panel, point to Properties, and click Command on the shortcut menu.
Result: The Command panel appears in the View pane.
Step 3 To determine the current state of the publishing phase, refer to the message in the Status box.
The Status box displays interactive messages about the publishing phase, such as attempting to connect, upload complete (no errors), etc. If warnings or messages are generated, you can review these messages in the Distributions Status message box.

Step 4 To review the Distribution Status messages, select that option under Command Review/Edit.
Result: The Distribution Status messages appear in the Commands/Messages box.
These messages indicate the status and errors detected when the command set that is currently loaded was published to the Policy Enforcement Point. Included in this status are the actual commands published to the Policy Enforcement Point by Cisco Secure Policy Manager and any responses provided by the Policy Enforcement Point. An example error message is "Could not connect to device. Device not responding: connection failed in 1 seconds."
![]() |
Tips To expand the Command/Message box when reviewing the command/message sets, click the << button at the bottom of the Command panel. To collapse the Command/Message box so that you can select a different command/message set, click the >> button at the bottom of the Command panel. |
Step 5 To close the selected panel, click OK.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu May 25 13:30:43 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.