cc/td/doc/product/ismg/policy/ver21
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

A


Accessing Installation Manager   B-5

address hiding   A-16

alerts
See notifications

audit records   1-3

Autostart   A-3

B


bootstrap settings   1-2

C


Cisco Router/Firewall   1-2
importing existing commands   A-24

Cisco Secure Integrated Software   1-2

Cisco Secure PIX Firewall   1-2

Cisco Secure Policy Manager
demo
See Cisco Secure Policy Manager demo
installing
canceling installation   2-1
client-server system   2-9
distributed system   2-22
space available   2-5
space required   2-5
standalone system   2-2
local maintenance method
discussion of   B-4, B-5
logging on
Cisco Secure Policy Manager authorization   B-2
local versus remote log on   B-1, B-2
log on procedures   B-1
reinstalling
discussion of   B-4
prerequisites (what you need to reinstall)   B-8
upgrading
backing up and restoring existing configuration data   B-7
discussion of   B-4
prerequisites (what you need to upgrade)   B-6
sequence to follow for a distributed system   B-6
using the local maintenance method   B-7

Cisco Secure Policy Manager demo
installing
Autostart sequence   B-3
installation folder   B-3
installation procedure   B-2

Cisco Secure VPN Client
Installing   A-5

Cisco VPN Gateway   1-2

Client   1-27

Client-Server System
description   1-4
figure   1-8
preparation worksheet   1-16
topology scenario   1-7

customer service and support   x

D


Database
overriding the IP address when NAT is performed by Policy Enforcement Point   2-20

database key   1-3
exporting   2-8
exporting to disk   2-15
NAT   2-20
override IP address   2-20
specifying location   2-20

Database subsystem   1-3

Demo
description   1-5

Deployment Guidelines   1-9

digital certificate   A-5

Distributed System
description   1-4
figure   1-9
preparation worksheet   1-23
topology scenario   1-8

DMZ   1-6

documentation
feedback   xii
latest version   ix
related   ix

document conventions   viii

Dynamic Host Control Protocol   A-10

E


encryption
between Cisco Secure Policy Manager hosts   1-10
between the Policy Enforcement Point and Cisco Secure Policy Manager host   1-10

F


feature sets
installed on a target host   1-3

G


general security issues
Windows NT time-out   A-12

Generation subsystem   1-3

graphical user interface   1-3

H


hardware requirements
minimum   A-2

I


installation
setup program   2-1

Installation Manager
See Cisco Secure Policy Manager, downgrading/reinstalling/uninstalling/upgrading

Installation Options
choosing   1-6
Client-Server System   1-5
demo   1-5
Distributed System   1-5
Standalone System   1-4

IOS
supported versions   1-2

IPSec VPN tunnels   1-7, 1-8

L


license disk
password   2-18
specifying location for installation   2-17

license key
license disk   2-4

M


MAPI
definition of   A-8
installing Windows Messaging   A-8

Monitoring subsystem   1-3

N


notifications   1-13
e-mail   A-7
from the Monitoring subsystem   1-3
pager   A-7
See also MAPI
See also TAPI

NTFS
converting from FAT   A-3

P


PIX   A-15

PIX Firewall   A-15
bootstrapping procedures   A-15
importing existing commands   A-18
worksheet   A-16

Policy Administrator   1-3, 1-27

Policy Enforcement Point   1-1

Policy Monitor   1-3

Policy Proxy   1-3, 1-4

Policy Proxy-Monitor   1-4

Policy Server   1-3

Primary Database
change default port   2-7

Proxy subsystem   1-4

public key encryption   A-5

R


reinstalling
using Installation Manager   B-9

Reporting subsystem   1-3

Requisite Software
HTML Help 1.22 update   A-3
Microsoft Internet Explorer version 5   A-3
Service Pack 5 for Windows NT   A-3

S


SafeNet/Soft-PK   A-6

secondary database   1-3

service and support   x

Software Requirements   A-2
Requisite Software   A-3

Space Available   2-12

Standalone System
description   1-4
figure   1-7
preparation worksheet   1-11
topology scenario   1-6

Supported Policy Enforcement Points   1-2

Syslog
UDP   1-10

Syslog data   1-10

T


TAPI
definition of   A-8
functionality   A-8

target host   1-10, A-3
IP address   A-10

TCP/IP protocol
installing   A-4
verifying functionality   A-5

Technical Assistance Center
warranty or maintenance contract   xi

Telnet   A-14

Time-out setting
changing   A-12

Topology
relating to an installation option   1-6

Topology Scenario   1-6

U


uninstalling
sequence to follow for a distributed system   B-10
using Installation Manager   B-11
using local maintenance   B-10

Uninstalling Cisco Secure Policy Manager   B-10

V


Virtual Private Networking   A-5

W


warranty   xi

Windows Messaging   A-8

Windows NT
disabling DHCP   A-11
See also general security issues
startup time-out   A-12

Windows NT Account
creating   A-13
for administrative use during install   2-1

Worksheets   1-10

hometocprevnextglossaryfeedbacksearchhelp
Posted: Sun Jun 4 16:59:39 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.