cc/td/doc/product/ismg/security
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

A


Accessing Installation Manager     B-2

additional documentation     xii

address hiding     A-7

alerts
See notifications

B


box components checklist     x

C


Cisco Connection Online     xi

Cisco Security Manager
components checklist     x
demo
See Cisco Security Manager demo
deployment guidelines
hypothetical scenario     A-2
distributed system
benefits     A-4
discussion of     1-3
drawbacks     A-4
encryption between distributed feature sets     A-5
feature sets     1-3
hypothetical scenario     A-5
installation sequence     2-3
See Cisco Security Manager, installing
types of organizations suited for     A-4
downgrading
backing up and restoring existing configuration data     B-11
prerequisites (what you need to downgrade)     B-6
sequence to follow for a distributed system     B-6
using the Installation Manager     B-11
using the Installation Manager and a backup file     B-8
using the local maintenance method     B-10
using the local maintenance method and backup file     B-7
installation options
network topology considerations     A-3, A-4, A-5
PIX Firewall deployment considerations     A-7
See also Cisco Security Manager, installing
installing
canceling installation     2-1
exporting the database key     2-6
installation options      2-2, 2-3
Key Location panel     2-3
overriding the IP address when NAT is performed by PIX Firewall     2-4
space available     2-4
space required     2-4
when to override the IP address     A-6
licensing
See also license key
local maintenance method
discussion of     B-1, B-2
logging on
local versus remote log on     2-7
log on procedures     2-7
Policy Manager authorization     2-7
overview of product     1-1
reinstalling
discussion of     B-1
prerequisites (what you need to reinstall)     B-12
using the Installation Manager     B-14
using the local maintenance method     B-13
standalone system
discussion of     1-2
hypothetical scenario     A-3
limitations     A-3
organizations suitable for     1-2
See Cisco Security Manager, installing
target computer     A-3
where to position with respect to PIX Firewall     A-4, A-5
uninstalling
sequence to follow for a distributed system     B-15
using the local maintenance method     B-15
upgrading
backing up and restoring existing configuration data     B-4, B-6
discussion of     B-1
prerequisites (what you need to upgrade)     B-3
sequence to follow for a distributed system     B-4
using the Installation Manager     B-5
using the local maintenance method     B-4

Cisco Security Manager demo
installing
Autostart sequence     2-8
installation folder     2-8
installation procedure     2-8

compatibility
issues with beta software     1-22

confirming network integrity     1-22

D


database key
See Primary Policy Database key

document conventions     xi

G


general performance issues
monitoring point     A-7
UDP traffic      A-7

general security issues
address translation/hiding issues     A-6
controlling physical access     1-22
deploying Cisco Security Manager on unprotected networks     A-7
encryption     1-4
exporting the Primary Policy Database key     2-6, A-6
Windows NT time-out     1-19

H


hardware requirements
minimum     1-5
recommended     1-5

I


Installation Manager
See Cisco Security Manager, downgrading/reinstalling/uninstalling/
upgrading

IP addresses
for all inbound and outbound traffic     2-5

L


license key
backup     1-11
license disk     2-2
multiple PIX Firewall license     1-11
See also licensing
single PIX Firewall license     1-11
storing     1-22

M


MAPI
definition of     1-8
installing Windows Messaging     1-8

N


notifications
discussion of     1-2
e-mail     1-8
pager     1-8
See also MAPI
See also TAPI

NTFS     1-10
converting from FAT     1-10

P


PIX Firewall
importing existing commands     1-15
preparing for Cisco Security Manager
See PIX Firewall worksheet
preparing PIX Firewall for Cisco Security Manager
See PIX Firewall worksheet
Syslog data
See general security issues     A-5

PIX Firewall Setup Wizard
failover     A-4

PIX Firewall worksheet      1-23

Policy Distribution / Monitor Point
See also Cisco Security Manager, feature sets
target computer     1-3

Policy Distribution Point
See also Cisco Security Manager, feature sets
target computer     1-3, A-5



Policy Manager
default account     2-5
See also Cisco Security Manager, feature sets
target computer     1-3

Policy Monitor Point
See also Cisco Security Manager, feature sets
target computer     1-3

Primary Policy Database
change default port     2-6
install sequence     1-4
key     1-4
See also Cisco Security Manager, feature sets
target computer/server     1-3

Primary Policy Database key
discussion of     1-4
key location     2-4
storing     1-22

S


servers
primary     1-4
secondary     1-4

software requirements     1-6, 1-10

Syslog data
See general security issues

T


TAPI
definition of     1-8
functionality     1-8

TCP/IP protocol
verifying functionality     1-7

U


UDP traffic
See general performance issues

W


Windows NT
DHCP     1-20, 2-4
disabling DHCP     1-21
See also general security issues
startup time-out     1-19

hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Feb 25 12:51:13 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.