cc/td/doc/product/ismg/policy/ver20
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

A


approving command sets   10-23

C


checklist   10-2
generating and publishing command sets   10-2
security policy   1-10

Command Console panel
epilogue commands   10-21
prologue commands   10-21
tasks   10-23
approving command sets   10-23
entering epilogue commands   10-22
entering prologue commands   10-22
reviewing generated command sets   10-19
specifying command approval method   10-16
verifying the publishing status   10-24

command sets
generating   10-1, 10-17
publishing   10-1, 10-23

composite decision trees   8-6



consistency check   10-17
setting   10-17

D


decision trees   8-3
components of   1-2
understanding   8-3

Default Policies folder   7-3

documentation
feedback   xiv

E


epilogue commands   10-22
entering   10-22

Example Policies folder   7-2

F


folders   6-1
about   6-1
Default Policies   7-3
Example Policies   7-2
System Policies   7-3
tasks   6-2
creating   6-3
moving an object to or from   6-4

G


generating command sets   10-1

I


inheritance   9-4

N


network object groups   5-1
about   5-1
organizing   6-1
tasks   5-4
creating   5-4
modifying   5-6

Network Object Groups branch   5-1

network policy   10-17
updating   10-17

network service bundles   4-1
about   4-1
tasks
creating   4-2
modifying   4-4
organizing   6-1

Network Service Bundles branch   4-1
tasks
creating   4-2
modifying   4-4

Network Service Library   3-2, 3-4
about   3-2

network services   3-1
about   3-1
Network Services Library   3-2
service wizard   3-3
tasks
adding a service   3-4
defining a new service   3-5
modifying service settings   3-7

Network Services branch   3-1
tasks   3-4
defining a new service   3-5
modifying service settings   3-7

P


PIX Firewall
command support status   A-1
aaa command   A-1
alias command   A-1
arp command   A-1
auth-prompt command   A-1
conduit command   A-2
configure command   A-2
debug command   A-2
disable command   A-2
enable command   A-2
enable password command   A-2
established command   A-2
exit/quit command   A-2
failover command   A-3
filter command   A-3
fixup protocol command   A-3
floodguard command   A-3
global command   A-3
groom command   A-3
help command   A-3
hostname command   A-4
interface command   A-4
ip address command   A-4
kill command   A-4
link/linkpath/age command   A-4
logging command   A-4
mtu command   A-4
name/names command   A-4
nameif command   A-5
nat command   A-5
outbound/apply command   A-5
pager command   A-5
passwd command   A-5
ping command   A-5
radius-server command   A-5
reload command   A-5
rip command   A-6
route command   A-6
service command   A-6
session command   A-6
show command   A-6
snmp-server command   A-6
static command   A-6
syslog command   A-6
tacacs-server command   A-7
telnet command   A-7
terminal command   A-7
tftp-server command   A-7
timeout command   A-7
uauth command   A-7
url-cache command   A-8
url-server command   A-7
virtual command   A-8
who command   A-8
write command   A-8
xlate command   A-8

Policy Builder   8-1, 8-11

policy builder
about   8-1
components of the decision tree   1-2
destination-based policies   8-10
simple decision trees   8-6
source-based policies   8-10
strategies for creating policy   8-11
tasks   8-12
adding a node   8-12
changing node type   8-15
changing text color   8-24
deleting a node   8-24
modifying node properties   8-16
specifying a service condition   8-21
specifying a source condition   8-17
specifying destination condition   8-17
specifying tunnel   8-22
understanding decision trees   8-3

Policy Distribution panel
definition of   10-5
deployment guidelines   10-6
selecting control for a Policy Enforcement Point   10-7
troubleshooting   10-8, 10-13
avoid loss of connectivity   10-10
crossover traffic examples   10-8
distribution ordering   10-13

policy enforcement   9-1, 9-6
about   9-1
inheritance   9-4
policy evaluation rules   9-2
strategies   9-6
tasks
adding a network object   9-9
creating a folder   9-9
enforcing policy   9-10



Policy Enforcement branch   9-1, 9-9
inheritance   9-4
policy evaluation rules   9-2
tasks   9-8
adding a network object   9-9
enforcing policy   9-10
removing a policy   9-12

policy evaluation rules   9-2

Policy Update   10-17
automatic   10-15
changing the default   10-15
manual   10-15

Policy Update default   10-15

prerequisites   viii

prologue commands   10-22
entering   10-22

protocol definitions   2-1
about   2-1
configuring   2-3
protocol layers   2-2

protocol layers   2-2

publishing command sets   10-1

R


reviewing generated command sets   10-19

S


security policies   7-1
about   7-1
scope of   1-8
understanding   1-1

security policy abstracts   7-1
tasks
creating   7-4
modifying   7-5
organizing   6-1

Security Policy Abstracts branch   7-1
Default Policies folder   7-3
Example Policies folder   7-2
System Policies folder   7-3
tasks   7-4
creating a security policy abstract   7-4
modifying a security policy abstract   7-5
organizing security policy abstracts   6-1

service and support   xii

services   3-1
about   3-1
modifying service settings   3-7
service wizard   3-3

service wizard   3-3

specifying a tunnel   8-22

System Policies folder   7-3

T


Technical Assistance Center
warranty or maintenance contract   xiii

U


updating policy   10-17

Use Tunnel node   8-22
specifying a tunnel   8-22

W


warranty   xiii

wizards
service wizard   3-3

hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu May 25 13:26:59 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.