Table of Contents
Index
- Accessing Installation Manager B-2
- additional documentation xii
- address hiding A-7
- alerts
- See notifications
- box components checklist x
- Cisco Connection Online xi
- Cisco Security Manager
- components checklist x
- demo
- See Cisco Security Manager demo
- deployment guidelines
- hypothetical scenario A-2
- distributed system
- benefits A-4
- discussion of 1-3
- drawbacks A-4
- encryption between distributed feature sets A-5
- feature sets 1-3
- hypothetical scenario A-5
- installation sequence 2-3
- See Cisco Security Manager, installing
- types of organizations suited for A-4
- downgrading
- backing up and restoring existing configuration data B-11
- prerequisites (what you need to downgrade) B-6
- sequence to follow for a distributed system B-6
- using the Installation Manager B-11
- using the Installation Manager and a backup file B-8
- using the local maintenance method B-10
- using the local maintenance method and backup file B-7
- installation options
- network topology considerations A-3, A-4, A-5
- PIX Firewall deployment considerations A-7
- See also Cisco Security Manager, installing
- installing
- canceling installation 2-1
- exporting the database key 2-6
- installation options 2-2, 2-3
- Key Location panel 2-3
- overriding the IP address when NAT is performed by PIX Firewall 2-4
- space available 2-4
- space required 2-4
- when to override the IP address A-6
- licensing
- See also license key
- local maintenance method
- discussion of B-1, B-2
- logging on
- local versus remote log on 2-7
- log on procedures 2-7
- Policy Manager authorization 2-7
- overview of product 1-1
- reinstalling
- discussion of B-1
- prerequisites (what you need to reinstall) B-12
- using the Installation Manager B-14
- using the local maintenance method B-13
- standalone system
- discussion of 1-2
- hypothetical scenario A-3
- limitations A-3
- organizations suitable for 1-2
- See Cisco Security Manager, installing
- target computer A-3
- where to position with respect to PIX Firewall A-4, A-5
- uninstalling
- sequence to follow for a distributed system B-15
- using the local maintenance method B-15
- upgrading
- backing up and restoring existing configuration data B-4, B-6
- discussion of B-1
- prerequisites (what you need to upgrade) B-3
- sequence to follow for a distributed system B-4
- using the Installation Manager B-5
- using the local maintenance method B-4
- Cisco Security Manager demo
- installing
- Autostart sequence 2-8
- installation folder 2-8
- installation procedure 2-8
- compatibility
- issues with beta software 1-22
- confirming network integrity 1-22
- database key
- See Primary Policy Database key
- document conventions xi
- general performance issues
- monitoring point A-7
- UDP traffic A-7
- general security issues
- address translation/hiding issues A-6
- controlling physical access 1-22
- deploying Cisco Security Manager on unprotected networks A-7
- encryption 1-4
- exporting the Primary Policy Database key 2-6, A-6
- Windows NT time-out 1-19
- hardware requirements
- minimum 1-5
- recommended 1-5
- Installation Manager
- See Cisco Security Manager, downgrading/reinstalling/uninstalling/
upgrading
- IP addresses
- for all inbound and outbound traffic 2-5
- license key
- backup 1-11
- license disk 2-2
- multiple PIX Firewall license 1-11
- See also licensing
- single PIX Firewall license 1-11
- storing 1-22
- MAPI
- definition of 1-8
- installing Windows Messaging 1-8
- notifications
- discussion of 1-2
- e-mail 1-8
- pager 1-8
- See also MAPI
- See also TAPI
- NTFS 1-10
- converting from FAT 1-10
- PIX Firewall
- importing existing commands 1-15
- preparing for Cisco Security Manager
- See PIX Firewall worksheet
- preparing PIX Firewall for Cisco Security Manager
- See PIX Firewall worksheet
- Syslog data
- See general security issues A-5
- PIX Firewall Setup Wizard
- failover A-4
- PIX Firewall worksheet 1-23
- Policy Distribution / Monitor Point
- See also Cisco Security Manager, feature sets
- target computer 1-3
- Policy Distribution Point
- See also Cisco Security Manager, feature sets
- target computer 1-3, A-5
- Policy Manager
- default account 2-5
- See also Cisco Security Manager, feature sets
- target computer 1-3
- Policy Monitor Point
- See also Cisco Security Manager, feature sets
- target computer 1-3
- Primary Policy Database
- change default port 2-6
- install sequence 1-4
- key 1-4
- See also Cisco Security Manager, feature sets
- target computer/server 1-3
- Primary Policy Database key
- discussion of 1-4
- key location 2-4
- storing 1-22
- servers
- primary 1-4
- secondary 1-4
- software requirements 1-6, 1-10
- Syslog data
- See general security issues
- TAPI
- definition of 1-8
- functionality 1-8
- TCP/IP protocol
- verifying functionality 1-7
- UDP traffic
- See general performance issues
- Windows NT
- DHCP 1-20, 2-4
- disabling DHCP 1-21
- See also general security issues
- startup time-out 1-19







Posted: Fri Feb 25 12:51:13 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.